Hacker Newsnew | past | comments | ask | show | jobs | submit | simmons's commentslogin

I was in this same situation earlier this year with one machine that was using a license attached to my Microsoft account. From what I read online, I thought I was freeing up the license by running "slmgr /upk" and "slmgr /cpky" on the old machine, but I guess not. I was eventually able to get the license transferred to the new machine, but only after a very painful morning of working with an MS support person.

I learned that there are two ways of buying a Windows 11 license. One way results in getting a traditional license key that can be reliably transferred, and the other way (tying the license to your Microsoft account) risks losing your license. :( I'm very careful to only buy licenses the former way, now.


So... what's the former way?

It's just a matter of buying from the right web page at Microsoft's web site. At least as of June, I was able to buy a license with a traditional license key here:

https://www.microsoft.com/en-us/p/windows-11-pro/dg7gmgf0d8h...


I would love to hear your other theories!

I don't think it would exactly be "create a fork of this repo", but if a developer invests significant time and effort solving hard problems where the solutions are implemented in the released source, once an LLM model is trained on it, then someone else could quickly and easily have the LLM generate a new program that implements the novel solutions. Whether this is a problem or not may depend on the motivations of the developer, but this potential for IP laundering may very well begin influencing the licenses and methods of distribution that people choose.

(Of course, I suppose at some point AI will be able to analyze and learn from binary executables or obfuscated source...)


Very cool! I had an MC-10 when I was a little kid. It was my first computer, and I didn't know anyone else who had one. I didn't have the book with this Arctic Adventure program, but I had another book with an adventure game you could type in. [1] I stayed up past my bedtime and spent significant time typing it in. However, after typing in much of the program, I encountered my very first "out of memory" error. I was astonished that 4KB of RAM wouldn't be enough, and that I was going to need a better computer!

I clearly had the wrong book for that computer. ;)

[1] https://www.retroprogrammez.fr/listings/aventure/cia/


2002 Honda Accord. An immensely reliable car that is built to last, and is inexpensive to maintain.


Neat! I sometimes play around with the idea of reverse engineering and transcompiling a tiny game that I think was probably written in Turbo Pascal 4.0. Maybe 4.0 supported optimizations, but this program seems to have been compiled in a debug mode. (At least, it seems to have no optimization, and has the default {$S+} stack overflow checking at the start of every function.) The lack of optimization makes it (and perhaps other programs written in Turbo Pascal) a really attractive artifact to experiment with transcompiling. When I realized that only the first segment was the actual game, and the other three segments corresponded to standard units used for I/O (etc.), which could be harder to analyze, I realized I could just omit those segments and replace them with new functions suitable for the transcompilation target. Maybe some day I'll get around to finishing it.

Good luck!


Thank you!

It's similar with Turbo Pascal 3.0, but there's only one segment since it's a good old COM file. The compiler just copies its own first ~10000 bytes, comprising the standard library, and splices the compiled result to the end.

I can see how this makes transcompilation relatively straightforward, although the real mode 16-bit code is a bit unpleasant with all the segment stuff going on, so you might as well just decompile :D. It's very possible that similar instructions will be emitted in 3.0 and 4.0 for the same source input.

My program also has the stack checking calls everywhere before calling functions. I think that people using Pascal weren't worried about performance that much to begin with, so they didn't bother disabling it.


> In high school, we had a Netware 3.12 environment, and the Guest account was enabled, albeit with very limited privileges. But for some reason, Guest could still use NET SEND, which popped up a little message in the bottom row of the destination machine's display. > ...Nobody noticed that these messages came from GUEST

You mention Netware, but as I recall the Netware function you describe was just "SEND" and "NET SEND" was a Microsoft networking thing. (But maybe there was some integration between the two after my experience with Netware, who knows.)

I mainly wanted to say, as someone who used/abused a Netware network in high school, I disassembled the SEND program and discovered that the username included in the message is not authenticated at all -- the IPX (or NETX, I forget which) software interrupt just took a string, and the SEND executable formatted the username into this string. So by crafting your own SEND program that used the software interrupt directly, you could easily forge any username you wanted. So you could very easily send a message from "ADMIN". :)

This should not be construed as a confession of any network shenanigans that may or may not have occurred at my high school. ;) :D :)


> You mention Netware, but as I recall the Netware function you describe was just "SEND" and "NET SEND" was a Microsoft networking thing.

It's entirely possible that it wasn't part of Netware, I don't remember the hard details as it was a very long time ago. However, it worked in DOS text-mode (we rarely ran Windows), and my impression was that Microsoft didn't do much network-aware stuff until well into Windows. So that's why I thought of it as a Novell thing rather than a Microsoft thing.

> the username included in the message is not authenticated at all

Oh.... oh dear.


I believe that Netware had NET SEND before Microsoft had any networking at all. But maybe I’m wrong. Certainly NT had a netware compatible stack, but this was way after netware blazed the trail.


Wow, the mention of SLS takes me back. SLS was the first Linux distribution I ever used. (Not counting the very early days of manually extracting tar archives of userspace binaries to make a system...) I remember passing around the precious shoebox of SLS floppies from person to person in high school. :)


Seems like it wasn’t just you: it was the first proper Linux distro in the world:

https://en.m.wikipedia.org/wiki/Linux_distribution


I thought I was the only one who preferred David Lynch's Dune. I'm glad to find out I'm not alone. I explain to people that it depends on if you're a bigger David Lynch fan or a Frank Herbert fan. I have nothing against Herbert, but I guess there's something about Lynch's work that speaks to me, even a movie like Dune that he himself hated.


I am Herbert "fan". I think Lynch captured better the religious part, the mysticism of Dune. Without this, Dune is just another first person shooter.


Even outside of gaming, people's needs are going to vary a great deal. Some people are sensitive to refresh rates, some people really need great color reproduction, etc.

But since you asked what I optimize for... I'm cheap, and tend to opt for inexpensive, no-frills, but reliable 4K monitors. I have several Philips 278E 27-inch 4K monitors. I don't see these on Amazon any more, so maybe this model has been discontinued, but they ran about $250 USD or so. I use a couple on my main workstation for coding, my wife has a couple (that are secondary to an Apple Studio Display), and I have a floating one for the workbench. I find this model to be a sweet spot for my needs. They aren't as beautiful as an Apple display, but they're sufficient.

Potential cons include no camera (I have a separate camera on top, although it sometimes obscures some of the display due to narrow bezels), lousy speakers (I use headsets), and they seem oddly sensitive to electrical fields in the environment (for example, they'll turn off momentarily if I static shock myself on something nearby).


It's not completely clear to be that the original poster did anything nefarious. (Although the Stack Overflow post has been deleted, so I don't know what was mentioned there.) It seems to me that section 10.3 could cover termination due to a mundane administrative detail via "You cease being an authorized developer".

For example, my developer profile is slated for removal in a few weeks because I haven't provided a verified phone number and email address that can be publicly available for the world to see. (And I don't care to, since I haven't used this developer account in years, and I'm not actively doing Android development.) Does this mean I'll be barred for life?


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: