|
|
【軟體名稱】:Windows Loader v2.0.3 (x86/x64) by Daz
$ G/ G1 g" d/ o! {【軟體語言】:English0 Q" C; k! K. r4 Q' q+ f X- b
【軟體分類】:啟動破解
: ?# p, J% e0 N5 v, `" r! R: E【軟體格式】:RAR
( b; `( d: l; a& o【檔案大小】:1.5 MB0 {' t$ u# F* L9 L$ i7 k- C
【軟件介紹】:& p/ R( P5 {% n/ t5 k# m! O4 U: Y
( O/ H2 \: [$ D/ ]6 _) J
This is the loader application thats used by millions of people worldwide, well known for passing Microsoft's WAT (Windows Activation Technologies) and is arguably the safest Windows activation exploit ever created. The application itself injects a SLIC (Software Licensing Description Table) into your system before Windows boots, this is what fools Windows into thinking it's genuine.
; x6 X2 G7 Z4 e" T( n
! f2 a5 S( _5 s# A9 H3 n) J1 l$ }, wFeatures
# i0 ^- V1 g4 a$ b4 n TCan be run as a standalone application
1 o6 @4 [; N" w8 @( M6 I$ M! n- XWorks well with all system languages% X, B+ j7 ]. R J% ]+ `' g9 Q
Argument support for silent installs* o ~0 X2 Z+ j
Can be used for pre-activation" O6 d5 K" K, ^- @# n6 F% E
Application integrity checking
) L. @9 B f( D, w3 W) h3 p) t0 HCustom error handling
+ ]! }5 M( o: i6 S- b6 L+ ]Support for hidden partitions and complex setups
8 ] _: J* }1 g) w$ GCan work alongside Linux's GRUB or any other boot manager
, ]# {8 q1 s L) u: v3 @Works with TrueCrypt and many other types of hard drive encryption applications o& j, S' C, y4 }% V
Add your own certificates and serials externally# |3 w/ i) f$ p* o5 s% B1 F
Offers certificate and serial installation only for users with an existing SLIC 2.15 W# O) d- z3 P3 X
Automated system profiling (The application matches everything up for you)# s- G/ B( o/ N. u% {
( ?8 F' t- U4 [* }& W
The rundown
1 @% {4 P/ }$ j1 m. N% X, K% V+ P8 zThis will run on x86 and x64 systems ? check
0 _8 \3 q# O- R3 }( a+ pThis can activate all Windows versions at the same time, just install it on each ? check
1 \) x" j9 q3 D$ R" p, FNo core system files get modified ? check4 G/ O* f7 B1 V: F$ V! _7 A/ h( Q
No extra processes are run so you have nothing eating at your RAM ? check- D5 \8 x/ e v, a- t! }
All key parts of the exploit are encrypted with a custom encryption ? check2 y7 x' p' P8 M' Y6 F" \1 [
The exploit runs before Windows so it's harder for Microsoft to prevent ? check
+ z7 F" ~+ c, ?The exploit patches all necessary tables making activation look authentic ? check5 k! Q) `9 r) x! z6 d# J- X Z
The application will select the best profile for your system during installation ? check
0 ?9 X; R J4 {* Q- x% J8 WEach and every user has a unique version of the exploit installed on his/her system ? check2 l+ Y7 T/ S* W! ]& P% |2 W6 X
! a3 v- Y0 Z3 x HSupported operating systems) O; } r1 o+ C v
Windows 7 Ultimate0 h- |8 D8 N/ u# G/ }9 p
Windows 7 Professional, h: W) {( _5 k- \- v
Windows 7 Home Premium$ e& d3 t) @/ Q4 |: F
Windows 7 Home Basic
3 ]' u3 c) O8 O$ P# r; hWindows 7 Starter
8 M/ F. O: K: f% G7 \5 KWindows Vista Ultimate
& N& B: W4 j% Q6 V0 \5 O1 F; \Windows Vista Business* r# `% {. t( Y8 X r% x
Windows Vista Business N
# f! V! `8 E+ E- Q& V6 [' D: n6 ^Windows Vista Home Premium1 K0 [ x3 [4 M% U
Windows Vista Home Basic7 e6 q& ^3 V7 @( V+ \& }+ q
Windows Vista Home Basic N9 Z5 a L$ V( H( O3 \$ z
Windows Vista Starter' Q& e5 ?) }3 t8 A! d
Windows Server 2008 R2: Enterprise* a: B" i6 ~, j, \9 G9 E
Windows Server 2008 R2: Standard
8 Z6 l6 \; F7 D- zWindows Server 2008 R2: Foundation
5 J6 F1 v; [& O/ O) }- }4 w7 mWindows Server 2008: Enterprise* H6 L6 C# l u. \+ t
Windows Server 2008: Standard \! n& ?# F* N) i8 j7 W: @+ L8 }
Windows Server 2008: Foundation3 q- U* [1 S( D; j7 X
Windows Small Business Server 2008* y; `% l9 W, q1 R
) U; v" z! s- o. a M
% V$ r9 q5 }$ p' X# w/ B3 K" XVersion 2.0.3 (05/27/2011)
% j) u) @. g8 Y" t* Added a new GRLDR version1 v. ^2 C: i) N0 j4 f5 e3 _7 d' x
* Removed the prompt to ignore invalid SLIC's and have made the setting apply for Samsung systems only
8 d" V8 t9 F- Y7 b R7 j$ u. `* Other minor tweaks and fixes 0 U9 y- k3 w% {% c* G
. v( Y8 R: d4 _' N
|
|