In the past, they have provided keys directly such as those for ESET or injected their own key as in the case of Kaspersky or provided a separate key generated such as the one for Microsoft that covers not only Vista but Windows Server 2003 and Office.will most likely find a copy there. It is easier than tracking it down on jihadi sites and archive.org is a legit site.When they are not able to hack or crack a copy of software, many will revert to the use of illegally acquired credit cards. It is always quite cheap to buy software using someone else’s credit card just as it is easy to create a premium storage account for software downloads using the same method. Related content opinion The Sandbox - RSA Conference 2014 - San Francisco By Jeff Bardin Feb 24, 2014 3 mins Technology Industry IT Leadership opinion NY Times Story on Snowden Way Off the Mark Snowden story worthless - Basic IT protocols ignored - By Jeff Bardin Jul 05, 2013 2 mins Data and Information Security Network Security opinion Maskirovka Tactical, Operational, Strategic Deception "The Op is in Motion" By Jeff Bardin Apr 29, 2013 4 mins Physical Security IT Leadership opinion Is this gun smoking? Certified Unethical Training http://attrition.org/errata/charlatan/ec-council/eccouncil_emails.html By Jeff Bardin Mar 15, 2013 14 mins Social Engineering IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe