|
【軟體名稱】:Windows Loader v2.0.3 (x86/x64) by Daz
/ n$ P" Q7 g8 e: |7 D【軟體語言】:English' w8 ~$ x+ N a) T0 W+ A$ w1 m
【軟體分類】:啟動破解
2 o. C& F6 M+ `& B/ @, H【軟體格式】:RAR
" v: b( h# q; Z# w* H, X `2 ~【檔案大小】:1.5 MB
9 K' J2 _( {! r$ x9 X- }【軟件介紹】:
! o" f9 _. B2 V' U! i5 p: z0 G
; ]0 z, L u( S, x4 }This is the loader application thats used by millions of people worldwide, well known for passing Microsoft's WAT (Windows Activation Technologies) and is arguably the safest Windows activation exploit ever created. The application itself injects a SLIC (Software Licensing Description Table) into your system before Windows boots, this is what fools Windows into thinking it's genuine.
4 A3 J# r: e, Q$ O& @8 o7 ?+ Q/ W/ C/ @- \) k8 J
Features8 E0 P0 S# r2 t; Q* i
Can be run as a standalone application
' T2 ~: H0 b9 a3 F' a' ^Works well with all system languages
% h8 \0 B# A" x& q. M- a2 OArgument support for silent installs: Z/ e; U8 S+ n3 }: P/ D' C, P+ ^
Can be used for pre-activation) B9 y! q% U3 {$ D) w/ n& d
Application integrity checking
+ y9 `9 B) ~' R, f W2 P, X! M$ WCustom error handling# x1 o* I3 ~+ R7 ?4 G
Support for hidden partitions and complex setups
8 T/ _( `' p8 j5 gCan work alongside Linux's GRUB or any other boot manager2 V0 f/ J) p- _- W( `9 G3 c5 D
Works with TrueCrypt and many other types of hard drive encryption applications2 N' C& ]5 X j+ E
Add your own certificates and serials externally
" H7 G9 `! U- ^$ z2 u \4 tOffers certificate and serial installation only for users with an existing SLIC 2.19 [- E+ w! |) H% U+ ~- x9 \
Automated system profiling (The application matches everything up for you)
/ B5 D# z! a4 o. t, Z2 R$ @; t7 n" h6 n! x& b3 j
The rundown
% l( \) n. C: P" \# @5 K1 TThis will run on x86 and x64 systems ? check7 n# M( M7 X5 p
This can activate all Windows versions at the same time, just install it on each ? check6 F8 `2 p; T1 W6 u# I! g$ F: q
No core system files get modified ? check
# P/ z2 ]: H( c& T6 zNo extra processes are run so you have nothing eating at your RAM ? check8 @6 e* @9 G2 n% Z- ?, O4 V
All key parts of the exploit are encrypted with a custom encryption ? check" D4 o6 C+ i- v& X6 g% ~
The exploit runs before Windows so it's harder for Microsoft to prevent ? check3 @' J- O- t- L' ^6 I/ r
The exploit patches all necessary tables making activation look authentic ? check
: e, H- X; |& ]' K* n% PThe application will select the best profile for your system during installation ? check0 e7 c8 `; ^! i$ ~
Each and every user has a unique version of the exploit installed on his/her system ? check
/ b9 p( [& m' _- P; c
7 C% f1 b1 s* Q/ v- M* [1 NSupported operating systems# V5 y- k9 `2 b+ n4 |. m7 F0 M
Windows 7 Ultimate) P, g5 l- g$ ^
Windows 7 Professional/ S# G! n4 n3 W% z" ^/ `
Windows 7 Home Premium
9 v, p% E, j% ?$ ]+ vWindows 7 Home Basic
j3 ?- |) o$ qWindows 7 Starter
! A- K8 w( d$ c1 n; G- lWindows Vista Ultimate
: o0 z- { M, V, e- \$ t C6 RWindows Vista Business! l* y7 E" g W% o
Windows Vista Business N) k1 P( m$ P+ z9 Z X) a0 I4 q
Windows Vista Home Premium. ^6 V3 p$ \2 v& C8 ~
Windows Vista Home Basic
6 ~5 D' K+ s% b/ ^" rWindows Vista Home Basic N
7 _* s; c5 i7 Q b! E# u- a8 ?3 f) b- CWindows Vista Starter
( P* I- X+ p" F* B% A5 FWindows Server 2008 R2: Enterprise3 [* y+ A' {) P/ A
Windows Server 2008 R2: Standard0 m8 V0 Y. t# q* @
Windows Server 2008 R2: Foundation
1 F. Y5 d. X9 y& j/ sWindows Server 2008: Enterprise
$ p. [! P. Y$ y# g8 f" o4 TWindows Server 2008: Standard
2 Q# E B- j1 E9 p1 u# ]' O0 FWindows Server 2008: Foundation
1 n0 d) O e8 l/ h2 S" HWindows Small Business Server 2008
' R0 [9 `# |) S: y! I! g
: x7 S# M2 P; B# q, k* c# g3 i& g- T$ @( O1 K
Version 2.0.3 (05/27/2011)
) h' P* |+ l" j* Added a new GRLDR version
7 j# Z( w2 M. B" G4 |3 ]* Removed the prompt to ignore invalid SLIC's and have made the setting apply for Samsung systems only3 F7 D4 {, m* n0 ]5 U
* Other minor tweaks and fixes
4 t5 L4 w) G F% o' w
% g) Y m9 r w1 g% F1 p |
|