WheelsTV is a video production company, specializing in automotive media . Based in Boston and Groton, Massachusetts, WheelsTV creates and distributes original content for websites, mobile, IPTV platforms, and Video On Demand . Patent-pending products including Top200 Test Drives, 1:00 on ONE Vehicle Profiles, and POV (Pre-Owned Vehicle) Reviews. These products serve as consumer tools in the search for purchasing a vehicle.
40-473: WheelsTV's distribution partners include Amazon Vehicles, Covideo, DealerVision, fusionZONE, Multicom, Intellacar, Team Velocity Marketing and franchised auto dealers across North America. WheelsTV's interactive video test drive report lineup is the largest in the world. Over 6,000 videos covering model years 2008 to present. Videos combine WheelsTV's original footage, shot professionally on America's roads and closed courses and OEM -sourced B roll . This footage
80-408: A x ) + 1 {\displaystyle Hash=(Hash\%BitFieldMax)+1} . Where BitFieldMax is the maximal value that may be stored in the bit-field in question, e.g. 1023 for a 10-bit bit-field, and 'x % y' denotes the remainder of the division of x by y. This results in values between 1 and BitFieldMax. The obtained value is then stored in the respective bit-field. The bit-field related to
120-406: A software key, serial key or activation key , is a specific software-based key for a computer program . It certifies that the copy of the program is original. Product keys consist of a series of numbers and/or letters. This sequence is typically entered by the user during the installation of computer software, and is then passed to a verification function in the program. This function manipulates
160-651: A car, then car restorers and collectors consider those to be the OEM parts. Other-brand parts would be considered aftermarket, such as Champion spark plugs, DieHard batteries, Kinsler fuel injectors, and BMP engine blocks and heads. Many auto parts manufacturers sell parts through multiple channels, for example to car makers for installation during new-vehicle construction, to car makers for resale as automaker-branded replacement parts, and through general merchandising supply chains. Any given brand of part can be OEM on some vehicle models and aftermarket on others. Microsoft
200-480: A company that produces parts and equipment that may be marketed by another manufacturer. However, the term is ambiguous, with several other common meanings. It sometimes means the maker of a system that includes other companies' subsystems, an end-product producer, an automotive part that is manufactured by the same company that produced the original part used in the automobile's assembly, or a value-added reseller . When referring to auto parts, OEM typically refers to
240-492: A different requirement regarding installation media from Direct OEMs. While a clean retail media of Windows can be installed and activated on these devices with OEM keys (most commonly using the SLP key that's embedded in to the system firmware already), actual OEM recovery media that was created by the PC manufacturer (not system-builder, nor retail Windows versions) typically only works on
280-619: A fake key is used with an expansion pack, the server may ban legitimate keys from the original game. Similarly, with Valve's Steam service, all products the user has purchased are bound into the one account. If this account is banned, the user will lose access to every product associated with the same account. This "multi-ban" is highly controversial, since it bans users from products which they have legitimately purchased and used. Bans are enforced by servers immediately upon detection of cracks or cheats, usually without human intervention. Sometimes, legitimate users are wrongly deemed in violation of
320-432: A function that returns the first eight bytes of an SHA-1 message digest. Then one round of decryption looks as follows. L' = R ^ First-8(SHA-1(L + Key)) R' = L The result of the decryption is 16 bytes of plaintext, which are together with the 17th unencrypted byte which will be interpreted as four double words in little endian byte order followed by
360-440: A permanent ban. Players who wish to continue use of the software must repurchase it. This has inevitably led to criticism over the motivations of enforcing permanent bans. Particularly controversial is the situation which arises when multiple products' keys are bound together. If products have dependencies on other products (as is the case with expansion packs ), it is common for companies to ban all bound products. For example, if
400-791: A pre-owned dealers' inventory. A POV video covers an entire generation of a particular vehicle and points out potential problems that might arise in each year of a generation. To create this product, available data is gathered on each vehicle including information from actual consumer experiences as reported to J.D. Power and Associates , government and private testing agencies, and independent analysts. These findings are combined with archival footage, from WheelsTV's library, OEM footage, and IIHS and NHTSA crash test data. WheelsTV can be found on its B2B site: WheelsTVShowroom.com and on various social platforms including Facebook, YouTube, Linkedin and Twitter. Original equipment manufacturer An original equipment manufacturer ( OEM ) generally refers to
440-432: A product is shipped with missing or invalid keys, then the product itself is useless. For example, all copies of Splinter Cell: Pandora Tomorrow originally shipped to Australia without product keys. There are many cases of permanent bans enforced by companies detecting usage violations. It is common for an online system to immediately blacklist an account caught running cracks or, in some cases, cheats. This results in
SECTION 10
#1732872617958480-594: A single byte. H1 and H2 specify the hardware configuration that the Installation ID is linked to. P1 and P2 as well as the remaining byte P3 contain the Product ID associated with the Installation ID. The Product ID consists of five groups of decimal digits, as in AAAAA-BBB-CCCCCCC-DDEEE. The mapping between the Product ID in decimal representation and its binary encoding in the double words P1 and P2 and
520-435: A variety of manufacturers ( Dell , HP , ASUS , Acer , Lenovo , Wistron , Inventec , Supermicro , Compal Electronics , Quanta Computer , Foxconn , Pegatron , Jabil , Flex , etc.). These OEMs commonly use a procedure known as System Locked Pre-installation , which pre-activates Windows on PCs that are to be sold via mass distribution. These OEMs also commonly bundle software that is not installed on stock Windows on
560-471: Is a popular example of a company that issues its Windows operating systems for use by OEM computer manufacturers via the bundling of Microsoft Windows . OEM product keys are priced lower than their retail counterparts, especially as they are purchased in bulk quantities, although they use the same software as retail versions of Windows. They are primarily for PC manufacturer OEMs and system builders, and as such are typically sold in volume licensing deals to
600-415: Is approximately two minutes and includes vehicle information essential to consumer purchases and ownership. Information includes vehicle specifications, fuel economy , class , size , passenger capacity, standard and optional features, safety features , and warranty information. POVs are a subset of WheelsTV Video Reports. POVs review vehicles that are no longer in production, and are likely to be found in
640-427: Is combined with scripts researched and written by automotive journalists, voiced by professional voice-over artists, and edited by a professional video editor . All videos are OEM compliant. WheelsTV Video Reports WheelsTV Video Reports provide consumers with essential vehicle purchasing information by giving car shoppers the ability to easily search, research, share and compare cars, trucks and SUV's. The run time
680-404: Is divided into 5 groups of six digits each with 2 digits at the end, which takes the form of XXXXXX-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XX. The installation ID is regenerated every time msoobe.exe is ran. The right most digit in each group of the installation ID is a check digit. Removing the check digits results in a 41-digit decimal encoded 136 bit multi precision integer , which
720-684: Is required. If bit 31 of H2 indicates that our computer supports a docking station, only seven of the ten bit-fields mentioned above are compared. The bit-fields corresponding to the SCSI host adapter, the IDE controller, and the graphics board are omitted. Of these remaining seven bit-fields, only up to three may change without requiring re-activation. Some of the most effective product key protections are controversial due to inconvenience, strict enforcement, harsh penalties and, in some cases, false positives. Some product keys use uncompromising digital procedures to enforce
760-406: Is stored in little endian byte order as a byte array . The lower 16 bytes of the Installation ID are encrypted, whereas the most significant byte is kept in plaintext. The cryptographic algorithm used to encrypt the Installation ID is a proprietary four-round Feistel cipher . Since the block of input bytes passed to a Feistel cipher is divided into two blocks of equal size, this class of ciphers
800-546: Is stored in little endian byte order in an array of 15 bytes. Of these 15 bytes the least significant four bytes contain the Raw Product Key in little endian byte order. The least significant bit is removed by shifting this 32-bit value to the left by one bit position. The eleven remaining bytes form a digital signature, allowing verification of the authenticity of the Product Key by means of a hard-coded public key. To obtain
840-473: Is tied to the PC motherboard which it is initially installed on, and there is typically no transferring the key between PCs afterward. This is in contrast to retail keys, which may be transferred, provided they are only activated on one PC at a time. A significant hardware change will trigger a reactivation notice, just as with retail. Direct OEMs are officially held liable for things such as installation/recovery media, and as such were commonly provided until
SECTION 20
#1732872617958880-524: Is typically applied to input blocks consisting of an even number of bytes in this case the lower 16 of the 17 input bytes. The round function of the cipher is the SHA-1 message digest algorithm keyed with a four-byte sequence. Let + denote the concatenation of two byte sequences, ^ the XOR operation, L and R the left and right eight-byte input half for one round, L' and R' the output halves of said round, and First-8()
920-443: The MD5 message digest algorithm and picking the number of bits required for a bit-field from predetermined locations in the resulting message digest. Different predetermined locations are used for different bit-fields. In addition, a hash result of zero is avoided by calculating H a s h = ( H a s h % B i t F i e l d M
960-449: The CCCCCCC component, a check digit is appended, and the check digit that is chosen such that the sum of all digits, including the check digit, is divisible by seven. For verifying a Product Key, more than one public key is available. If verification with the first public key fails, the second is tried, etc. The DD component of the Product ID specifies which of the public keys in this sequence
1000-445: The PC model line that was designed for it. For example, a recovery disc/USB for a Toshiba Satellite P50-B will only work on that model, and not a Satellite S55T. OEMs rely on their ability to drive down the cost of production through economies of scale . Using an OEM also allows the purchasing company to obtain needed components or products without owning and operating a factory. Product key A product key , also known as
1040-567: The amount of RAM available to the operating system is calculated differently from the other bit-fields as shown in the table. Note that the amount of RAM is retrieved by calling the GlobalMemoryStatus() function, which reports a few hundred kilobytes less than the amount of RAM physically installed. So, 128 MB of RAM would typically be classified as "between 64 MB and 127 MB". wpa.dbl is the RC4 -encrypted database that stores, expiration information,
1080-431: The byte P3 is summarized in the following table. EEE = Random value The Product key takes the form as XXXXX-XXXXX-XXXXX-XXXXX-XXXXX. Each character is one of the following 24 letters and digits: B C D F G H J K M P Q R T V W X Y 2 3 4 6 7 8 9 The 25 characters of the Product Key form a base-24 encoding of the binary representation of the Product Key. The Product Key is a multi-precision integer of roughly 115 bits, which
1120-426: The confirmation ID of an activated installation, the bit-field values representing the current hardware configuration, and the bit-field values representing the hardware configuration at the time of product activation, etc. The current hardware configuration is automatically updated each time the hardware configuration is modified in order to reflect the changes, while the values representing the hardware configuration at
1160-406: The images of Windows that will be deployed with their PCs (appropriate hardware drivers , anti-malware and maintenance software, various apps, etc.). Individuals may also purchase OEM "system-builder" licenses for personal use (to include virtual hardware ), or for sale/resale on PCs which they build. Per Microsoft's EULA regarding PC manufacturers and system-builder OEM licenses, the product key
1200-403: The key is valid, Windows 95 performs the following checks: If all checks pass, the product key is valid. Consequently a product key of 000-0000000 would be considered valid under these conditions. Windows 95 OEM keys take the form XXXXX-OEM-XXXXXXX-XXXXX. Windows XP uses an installation ID, product ID, and a product key for activation. The installation ID is a 50 digit decimal string that
1240-493: The key sequence according to a mathematical algorithm and attempts to match the results to a set of valid solutions. Standard key generation, where product keys are generated mathematically, is not completely effective in stopping copyright infringement of software , as these keys can be distributed. In addition, with improved communication from the rise of the Internet , more sophisticated attacks on keys such as cracks (removing
WheelsTV - Misplaced Pages Continue
1280-412: The late-2000s. These were phased out in favor of recovery partitions located on the primary storage drive of the PC (and available for order from the manufacturer upon request) for the user to repair or restore their systems to the factory state. This not only cut down on costs, but was also a consequence of the gradual obsolescence and phasing out of optical media from 2010 onward. System builders also have
1320-455: The license agreement. Product keys are somewhat inconvenient for end users. Not only do they need to be entered whenever a program is installed, but the user must also be sure not to lose them. Loss of a product key usually means the software is useless once uninstalled, unless, prior to uninstallation, a key recovery application is used (although not all programs support this). Product keys also present new ways for distribution to go wrong. If
1360-559: The license, and banned. In large cases of false positives, they are sometimes corrected (as happened in World of Warcraft . ) However, individual cases may not be given any attention. A common cause of false positives (as with the World of Warcraft case above) is users of unsupported platforms. For example, users of Linux can run Windows applications through compatibility layers such as Wine and Cedega . This software combination sometimes triggers
1400-490: The manufacturer of the original equipment, that is, the parts which are then subsequently assembled and installed during the construction of a new vehicle. In contrast, aftermarket parts are those made by companies other than the OEM, which might be installed as replacements or enhancements after the car comes out of the factory. For example, if Ford used Autolite spark plugs , Exide batteries, Bosch fuel injectors , and Ford's own engine blocks and heads when building
1440-451: The need for a key) and product key generators have become common. Because of this, software publishers use additional product activation methods to verify that keys are both valid and uncompromised. One method assigns a product key based on a unique feature of the purchaser's computer hardware, which cannot be as easily duplicated since it depends on the user's hardware. Another method involves requiring one-time or periodical validation of
1480-410: The product key with an internet server (for games with an online component, this is done whenever the user signs in). The server can deactivate unmodified client software presenting invalid or compromised keys. Modified clients may bypass these checks, but the server can still deny those clients information or communication. Windows 95 retail product keys take the form XXX-XXXXXXX. To determine whether
1520-436: The remaining ten bit-fields is present, the respective bit-field contains a non-zero value describing the component. A value of zero marks the hardware component as not present. All hardware components are identified by a hardware identification string obtained from the registry. Hashing this string provides the value for the corresponding bit-field. The hash result is obtained by feeding the hardware identification string into
1560-447: The time of product activation is fixed. When judging whether re-activation is necessary, the bit-field values of the current hardware configuration is compared to the hardware configuration at the time of activation. All bit-fields with the exception of the unused field and the 'dockable' field are compared. If more than three of these ten bit-fields have changed in the current hardware configuration since product activation, re-activation
1600-402: Was successfully used to verify the Product Key. The hardware configuration linked to the Installation ID is represented by the two double words H1 and H2. For this purpose, the double words are divided into twelve bit-fields. If docking is possible, the activation mechanism will be more tolerant with respect to future hardware modifications. If the hardware component corresponding to one of
#957042