Unless i'm wrong, (and i usually am
), the script merely reports failure of Windows to accept the provided key. One way, or another, it does the job though...
This document, more-or-less describes how the XP key can be validated (among others)...
MSKey Readme... and this document (including references) helps someone understand what's discussed in the previous document:
Elliptic Curve Cryptography, Wikipedia2) Regarding the way the scripts get to be executed & deleted upon completion:There must be a more elegant way to execute vb scripts & wait for them to finish.
See if some of the code in this thread can be adjusted to your needs...
http://www.winasm.org/forum/index.php?showtopic=2096As always, good job - thanks for releasing the application with source!