메모

정품 윈도우와 변조된 윈도우 차이점...펌

맘편한넘 2014. 2. 23. 23:08


 
 
 
 
 
 
Harrison Group White Paper:
 
Genuine Microsoft Products
Vs. Pirated Counterparts
 
 
 
 
 
Prepared by:
Case Braskamp
Jake Soffronoff
 
 
Date:  
August 26, 2011         
 
               Sponsored By:
 
 
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  2
 
       
Table of Contents
IN THIS WHITE PAPER ............................................................................................................................................ 3
EXECUTIVE SUMMARY ........................................................................................................................................... 4
COUNTERFEIT USERS MAKE SIGNIFICANT SACRIFICES .............................................................................................................. 5
METHODOLOGY ..................................................................................................................................................... 6
RESULTS ................................................................................................................................................................. 7
SECURITY ...................................................................................................................................................................... 7
Viruses, Worms and Trojans Found in Pirated Versions ........................................................................................ 7
Vulnerability Regardless of Channel ..................................................................................................................... 8
Pirated Software Often Unable to Download Updates ......................................................................................... 8
PERFORMANCE & PRODUCTIVITY ...................................................................................................................................... 8
Genuine Microsoft Users Experience Superior Performance than Users of Counterfeit Products ........................ 8
Genuine Microsoft Windows Boots Faster ............................................................................................................ 9
Genuine Microsoft Office is More Efficient to Use ................................................................................................ 9
Genuine Microsoft Provides Superior Intranet Performance ................................................................................ 9
Genuine Microsoft is Faster When Loading Popular Text-and-Graphics Heavy Web Pages ................................. 9
POWER CONSUMPTION & BATTERY LIFE ............................................................................................................................. 9
Genuine Microsoft is More Energy Efficient When Performing Processor-Intensive Tasks................................. 10
Genuine Microsoft is More Energy Efficient Both in and Coming out of Sleep Mode ......................................... 10
Genuine Microsoft Machines Enjoy Longer Battery Life ..................................................................................... 10
IN SUMMARY: IMPLICATIONS FOR COUNTERFEIT USERS ....................................................................................................... 11
How to Recognize Counterfeit Software ............................................................................................................. 11
Support for Windows XP and Office 2003 is in the Process of Being Phased Out ............................................... 11
Conclusion ........................................................................................................................................................... 12
APPENDICES......................................................................................................................................................... 12
APPENDIX I: METHODOLOGIES FOR PERFORMANCE & PRODUCTIVITY TESTS ............................................................................ 13
APPENDIX II: METHODOLOGIES FOR SECURITY TESTS........................................................................................................... 16
APPENDIX III: METHODOLOGIES FOR POWER CONSUMPTION TESTS ....................................................................................... 17
APPENDIX IV: HARDWARE CONFIGURATIONS..................................................................................................................... 19
APPENDIX V: SOFTWARE CONFIGURATIONS ....................................................................................................................... 20
 
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  3
 
       
In This White Paper
This  white  paper  presents  the  results  of  a  series  of  independently-run  tests  that  were  designed  to
discover differences between genuine and counterfeit installations of Microsoft software. It describes
the  variation  in  levels  of  security,  performance  and  power  consumption  that  were  found  between
genuine and pirated Microsoft software, and provides some discussion of the implications that these
findings have for business and everyday users alike.
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  4
 
       
Executive Summary
Despite the fact that, excluding price, people rank reliability and protection against viruses and malicious
code as the most valuable software attributes * , millions of everyday users and businesses entrust their
virtual worlds to software that they obtained from unaccountable resources. 
Many  users  may  believe  that  the  risks  associated  with  using  counterfeit  software  are  isolated  to
programs acquired from the web, but studies demonstrate that is not the case.  In fact, users obtain
problematic counterfeit software through a number of channels, including from hardware retailers that
pre-install it on the machines that they sell, or from purchases made at unauthorized retailers, street
markets or through online auctions or suppliers. 
 
In  order  to  investigate  the  potential  ramifications  of  using  pirated  software,  the  Harrison  Group
contracted  an  independent  technology  benchmarking  firm  to  run  and  collect  data  on  a  series  of
comparison tests between genuine Microsoft software and counterfeit versions that had been obtained
from the web, from hardware retailers and from street market stalls.  That data was then analyzed by
the  Harrison  Group  in  order  to  identify  any  security,  performance,  functionality  or  resource
consumption differences that existed between the various software packages.
Genuine users enjoy a safer experience than counterfeit users
Our findings confirm that users of counterfeit software are, in fact, opening themselves up to risk of
infection by worms, Trojans and viruses. 24% of the machines running counterfeit software in our study
either became infected at installation, or independently downloaded and installed malicious software
upon  connection  to  the  internet.    Further,  we  received  malicious  software  from  each  of  the  three
popular distribution channels we tested – peer-to-peer downloads, purchases from street markets, and
purchases from hardware retailers that fail to use genuine Microsoft products.  Our results indicated
that the level of risk involved in using pirated software is considerable, and that the risk of exposure
remains high regardless of the software’s source.
                                                          
 
* IDC. (2011). The Risks to Consumers from Pirated Software. Framingham: www.idc.com.
Transferred from
another computer or
borrowed from a
friend
7.2%
Downloaded from a
peer-to-peer
network or web site
71.5%
Bought in a store,
from a street market,
or from an online
auction/ supplier
9.1%
Came with the
computer 
12.2%
Sources of Improperly
Licensed Software 1
n=550
Base = People known to respondents to use pirated software 
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  5
 
       
Genuine users enjoy superior performance and productivity than counterfeit users  
While  few  might  be  surprised  to  learn  that  using  pirated  products  comes  with  an  increased  risk  of
exposure  to  worms,  Trojans  and  viruses,  counterfeit  users  may  not  realize  that  they  risk  sacrificing
performance by failing to use genuine software.  
In a recent study, IDC found that 36% of consumers had installed software on their machines that had
slowed their computer so much that it had to be uninstalled, and 34% reported installing software that
would not run at all * . Our study reinforces these findings, confirming that genuine Microsoft users tend
to  enjoy  superior  performance  in  the  form  of  faster  boot  times,  faster  print  times,  faster  document
loading times, faster loading times when visiting popular text-and-graphics-heavy websites, and faster
intranet page loading times than users of counterfeit products.  The reduction in wait time for all of
these  common  tasks  adds  up  to  a  more  dynamic,  productive  and  satisfying  experience  for  users  of
genuine Microsoft products.  
Genuine users get power consumption benefits compared to counterfeit users
Another  sacrifice that  counterfeit  users may  not  realize  they  are making  is  in energy  efficiency.    We
found  that  computers  installed  with  genuine  Microsoft  products  tend  to  consume  less  energy  when
performing processor-intensive tasks, when in sleep mode, and when coming out of sleep mode than
their pirated counterparts, all of which adds up to longer battery life, reduced environmental impact,
and lower energy costs for consumers and businesses alike.
Counterfeit users make significant sacrifices
In  total,  our  results  indicate  that  counterfeit  users  pay  a  high  cost  for  the  low  price  of  counterfeit
software.  Users of pirated software are opening themselves up to the potential for both catastrophic
security breaches and significant losses in productivity and performance, regardless of the platform they
use, and regardless of whether the counterfeit software’s source is the web, a street market stall, or an
unprincipled hardware retailer.
 
  
                                                          
 
*  IDC. (2011). The Risks to Consumers from Pirated Software. Framingham: www.idc.com.
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  6
 
       
Methodology
The Harrison Group contracted an independent technology benchmarking firm to perform a number of
tests and collect data comparing genuine and pirated Microsoft products.  That data was then analyzed
by the Harrison Group to discover any variations in the levels of security, performance, functionality and
resource consumption that might exist between genuine and pirated Microsoft products.
The tests for this study were performed in May and June, 2011, by trained personnel using a variety of
genuine and counterfeit Windows and Office software. The different versions of Windows XP, Windows
7, Office 2003 and Office 2007 that were used came from some of the most popular channels of pirated
software  distribution,  including  peer-to-peer  file  sharing,  independent  hardware  dealers,  and  street
market stalls, and originated from a wide geographical area, including China and Eastern Europe.  The
software  was  installed  on  a  variety  of  computer  models  manufactured  by  a  representative  group  of
popular  brands  in  order  to  mitigate  the  effects  that  using  any  specific  hardware  configuration  might
have on the results.  
More  detail  on  the  specific  hardware  and  software  configurations,  as  well  as  on  the  testing
methodologies that were employed for this study, can be found in Appendices I-VI of this document.
 
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  7
 
       
Results
In a recent global survey of 25,000 computer users, 36% of consumers reported that they had needed to
uninstall software they had obtained in the past two years because it made their machines too slow,
34% reported installing software that wouldn’t run, 16% reported finding viruses on their computers,
and 15% reported having pop-up ads overrun their machines * .  Our test results corroborate what these
users report, and even indicate that the potential risks of using counterfeit software may be  greater
than some users believe.  
Security
Counterfeit users put themselves at risk by using pirated software, regardless of whether their software
is obtained through Peer-to-Peer file sharing, from a street market, or from a hardware retailer that fails
to install genuine Microsoft products on the machines they sell. 
Price excluded, the attribute that users value the most in their software is protection against viruses and
hackers * , yet millions of consumers and businesses still choose to install potentially-infected counterfeit
software on their computers.  Computer users are aware of the risks they’re taking: in a recent poll, 53%
of consumers said that they believe that pirated software is either much less secure or dangerously less
secure than properly licensed software, and further said that they believe that 55% of pirated software
web sites and 53% of pirated software from peer-to-peer sharing posed a security risk if used * . Despite
these well-known risks, 4 in 10 software installations today are still improperly licensed * .  
Our findings support the suspicion that users feel about the safety of counterfeit software: nearly one in
four  (24%)  of  the  pirated  operating  systems  in  our  study  either  became  infected  at  installation,  or
independently downloaded and installed malicious software upon connection to the internet.  Further,
we found worms, Trojans and viruses across both Windows XP and Windows 7 installations, indicating
that  no  pirated  platform  was  safe  from  threat,  and  across  all  of  the  distribution  channels  that  we
investigated, indicating that paying for a piece of counterfeit software from a market stall or hardware
retailer does not guarantee its safety. 
Viruses, Worms and Trojans Found in Pirated Versions
The  viruses  that we  found  in  counterfeit Microsoft  software  ranged  from  simple  worms  to  annoying
Trojans  to  particularly  malicious  and  fast-spreading  viruses.    Some  of  the  specific  threats  found  in
pirated Microsoft installations included:
  Helompy.A,  a  worm  that  spreads  itself  from  machine  to  machine  by  either  copying  itself  to
removable  media,  or  by  attaching  itself  to  emails  sent  from  the  user’s  account.  Worms  like
Helompy.A reduce computer performance and put those in contact with the user’s digital world
at risk of infection.
 
  Deeterohms.A, also known as Generic3_c.HHQ, a Trojan that downloads and installs adware on
an infected computer while masquerading as legitimate software.  This adware attempts to take
over  the  machine’s  User  Account  Controls  while  downloading  any  of  a  number  of  pieces  of
                                                          
 
*  IDC. (2011). The Risks to Consumers from Pirated Software. Framingham: www.idc.com.
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  8
 
       
software  to  the  machine  without  the  user’s  knowledge  or  consent.    Ultimately,  Trojans  like
Helompy.A  serve  as  an  obtrusive  drag  on  performance  while  opening  users  up  to  potential
threats through downloading unwanted software from the internet.
 
  Generic16.CJLD, a virus that deletes important files from any machine it infects while hijacking
the  OS  and  its  network  tools.    once  infected,  the  virus  opens  a  network  back  door  through
which hackers can access any data on computer, including personal and financial information. 
The virus then uses the backdoor to spread readily through local area networks and infect other
machines that are then open to the same risks.
While the level of harm inflicted by each threat varies, the existence of an unknown threat across all
platforms and channels of distribution should give users pause when deciding whether or not test their
luck with an unknown source.
Vulnerability Regardless of Channel
Those who purchase pirated software may feel that their seller has a vested interest in ensuring that the
software they buy is safe, but our results do not support that theory. While it would not come as a shock
to  most  that  we  found  viruses  and  Trojans  in  our  study’s  peer-to-peer  downloads,  we  also  received
infected software through purchases at street markets, and pre-installed on hardware that was sold by
retailers who failed to use genuine Microsoft products.
This work leads us to conclude that the level of risk involved in using pirated software is considerable,
and that the risk of exposure remains high regardless of the software’s source.
Pirated Software Often Unable to Download Updates
Regularly downloading updates for the software that users employ is a vital part of maintaining a secure
and  efficient  computing  experience.    one  in  four  of  the  counterfeit  versions  of  Microsoft  software
tested in our study was unable to download automatic Windows and Office updates, and one in five was
also unable to manually install Windows updates.  As with the risk of virus exposure, the inability to
download automatic updates was found across all platforms, and was found both in software that had
been downloaded for free and in software that had been purchased from a street market or hardware
retailer.
The  inability  to  download  updates  affects  users  by  preventing  them  from  patching  any  security
vulnerabilities that may exist in their software, by preventing them from incorporating updated features
that have been made available to paying customers, and eventually by leaving them with software that
is out of date and prone to attack.  By choosing to download or purchase counterfeit software, both
consumers  and  businesses  may  be  choosing  to  work  in  a  less  efficient  computing  environment  that
simultaneously opens them up to additional security risks.
 
Performance & Productivity
Genuine Microsoft Users Experience Superior Performance than Users of Counterfeit Products
Waiting  for  your  PC  to  boot,  waiting  for  documents  to  open,  waiting  for  the  printer  to  receive  your
documents, waiting for a web page to load – whether it comes in the form of one long wait or thousands
of smaller ones, it all adds up to lost productivity and a less elegant user experience. Genuine Microsoft
users enjoy faster boot times, smoother MS-Office performance, faster load times when visiting popular
text-and-graphics-heavy  websites,  and  faster  intranet  page  load  times  than  users  of  counterfeit
products, which all adds up to a more dynamic, productive and satisfying user experience.  
Genuine Microsoft Products Vs. Pirated Counterparts  

 
 
 
  9
 
       
Genuine Microsoft Windows Boots Faster
Perhaps the most universal and annoying wait of all is the time spent waiting for a computer to boot.  In
boot time tests, genuine Windows machines outperformed those with pirated installations 60% of the
time by an average of 56%.  Recapturing this time on a daily basis at work and at home would be a boon
for most users. Less time spent waiting is more time spent being productive, connecting with friends and
family, or having fun on your PC.
Genuine Microsoft Office is More Efficient to Use
Throughout your workday, you probably experience many small waits.  Waiting for documents to load,
waiting for your work to be sent to the printer – in the course of a normal workday, these small waits
can add up to a lot of time.  In a series of tests designed to measure these waits, we found significant
advantages for genuine users when performing a number of everyday tasks in Microsoft Office.
PCs running genuine Windows and MS-Office products outperformed their pirated counterparts 75% of
the  time  by  an  average  of  52%  when  opening  the  kinds  of  multiple-sheet  Excel  documents  that
businesses  use every  day.  Further,  in  tests measuring  the  time  it takes  to  print  500kb or  1mb Word
documents,  genuine  machines  were  faster  than  their  pirated  counterparts  in  half  (48%)  of  the  test
configurations by an average of 56%.  Considering the frequency with which these tasks are completed,
over  the  long  term  these  advantages  can  mean  significant  productivity  gains  for  businesses  and
consumers alike.
Genuine Microsoft Provides Superior Intranet Performance
Whether it’s sharing calendars or large-scale data sources, many modern businesses provide significant
amounts of information over intranet websites. In a series of tests measuring load times for intranet
websites,  genuine  Windows  products  demonstrated  far  superior  performance  than  their  pirated
counterparts – 67% of the time the genuine Microsoft products were an average of 100% faster.  Aside
from the peace of mind that using genuine products provides, this advantage could mean very large
productivity gains for enterprises for whom the use of internal websites is key to productivity.
Genuine Microsoft is Faster When Loading Popular Text-and-Graphics Heavy Web Pages
As  websites  have  evolved  over  time  to  include  more  graphics  and  information,  users  have  been
subjected to regular waits that can last from milliseconds to minutes. In a test measuring the time it
took to load popular Internet web pages that were heavy with text and graphics, PCs running genuine
Windows outperformed their pirated counterparts 59% of the time by an average of 46%.  By shortening
these waits, genuine users save a significant amount of time – and businesses gain worker productivity –
as they surf the net. 
 
Power Consumption & Battery Life
Computers  installed  with  genuine  Windows  and  Office  software  are  more  energy  efficient  than  their
pirated counterparts, which leads to lower energy costs for users, longer battery life for genuine Laptops,
and a more environmentally friendly experience for everyone.
Whether you are a road warrior who depends on that extra bit of battery life, or you are just trying to
control  costs,  energy  efficiency  is  an  area  of  concern  due  to  its  ramifications  on  battery  life,  energy
costs,  and  the  environmental  impact  of  computing.    A  majority  of  the  PCs  installed  with  genuine
Microsoft  Windows  and  Office  software  in  our  study  consumed  less  energy  and  exhibited  superior
battery life than their pirated counterparts.  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  10
 
       
Genuine Microsoft is More Energy Efficient When Performing Processor-Intensive Tasks
The genuine Microsoft installations in our study demonstrated significantly superior energy efficiency
than their pirated counterparts while performing processor-intensive operations.  
In a test measuring how much power is consumed while running processor-intensive programs for an
hour,  genuine  Windows  machines  outperformed  pirated  operating  systems  60%  of  the  time  by  an
average of 20%.  In a test measuring how much power is consumed when watching a high definition
movie,  half  (47%)  of  the  genuine-installed  machines  in  our  study  consumed  an  average  of  25%  less
power than their pirated counterparts. These drains add up to significant additional energy costs (and
adverse environmental impact) over the life of a computer and would negatively affect laptop users’
battery life, which is a particular concern business and media-inclined road warriors looking to squeeze
every ounce of performance from their machines while travelling or working in the field.
Genuine Microsoft is More Energy Efficient Both in and Coming out of Sleep Mode
Genuine Microsoft products are consistently more energy efficient than their pirated counterparts when
either in or coming out of sleep mode.
In a test measuring how much power is consumed by a computer when the operating system is in sleep
mode with no programs running, the machines installed with genuine Microsoft software outperformed
those with pirated installations more than half (62%) of the time by an average of nearly 8%. When
coming out of sleep mode, the genuine-installed machines consumed an average of 17% less power over
half  (53%)  of  the  time.    Considering  that many  people  routinely  leave  their machines  in  sleep  mode
instead of shutting down at the end of a session, these numbers can add up to a significant increase in
energy efficiency for genuine users over the life of an average computer.
Genuine Microsoft Machines Enjoy Longer Battery Life
In light of our results on power consumption, it was not surprising to find that laptops installed with
genuine Windows operating systems demonstrated significantly longer battery life in over half (56%) of
the test configurations in our study.  on average, these laptops experienced nearly 26 extra minutes of
computer use per charge, which would be a very nice pick up for those who need their machines to stay
“alive” while working remotely in order to remain productive, or for those who simply want to get the
most out of their machines.
 
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  11
 
       
 
In Summary: Implications for Counterfeit Users
Users of pirated Microsoft software open their digital worlds to threatening security vulnerabilities while
running the risk of sacrificing performance, productivity and energy efficiency. Our study demonstrates
that,  regardless  of  the  software  configuration  employed,  and  regardless  of  whether  the  counterfeit
software’s source is the web, a street market stall or an unprincipled hardware retailer, the low price of
using counterfeit software comes at a high cost.   How to Recognize Counterfeit Software * 
Our  research  makes  it  clear  that  the  risks  run  by  those  using  pirated  software  are  both  real  and
potentially costly.  There are several cues that can help those who are unsure about the legitimacy of
their Microsoft software to recognize counterfeit versions:
Source:  8-in-10  of  the  users  running  improperly  licensed  software  obtained  it  online
through a website or peer-to-peer network, purchased it through an online auction or
supplier, or purchased it through a street market or store.  In order to be sure that users
obtain genuine software, they should instead purchase it either directly from Microsoft,
or from an authorized Microsoft retailer.
Activation:  Genuine  Microsoft  software  requires  activation  and  validation  at
installation.    If  a  user  is  not  required  to  enter  a  genuine  Microsoft  product  key  at
installation, the chances are that they are installing counterfeit software.
Updates:  Users  running  genuine  Microsoft  software  receive  automatic  security  and
feature updates.  If a piece of software is unable to receive automatic updates, there is a
good  chance  that  it  is  not  genuine  and  that  it  is  therefore  vulnerable  to  sacrificed
performance and security threats.
Labeling:  Genuine  Microsoft  discs  are  labeled  with  a  hologram  and  come  with  a
certificate  of  authenticity.    Counterfeiters  are  now  able  to  convincingly  replicate
Microsoft’s sophisticated labeling, however, so the presence of a hologram should not
be used as the sole indicator of a piece of software’s validity.
Support for Windows XP and Office 2003 is in the Process of Being Phased Out
All users should be aware that in April, 2009 Microsoft moved the Windows XP and Office 2003 software
platforms from Mainstream to Extended support.  While users are still able to receive monthly security
updates, they are no longer able to make warranty claims or receive free technical support.   Further, In
April, 2014 all Windows XP and Microsoft Office 2003 support, including security updates and security-
related  hot-fixes,  will  be  terminated.  This  will  leave  anyone  still  using  Windows  XP  and  Office  2003
vulnerable  to  performance  and  security  threats,  and  those  most  at  risk  will  be  those  whose  pirated
software has left their machines the longest unprotected.
  
                                                          
 
*  IDC. (2011). The Risks to Consumers from Pirated Software. Framingham: www.idc.com
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  12
 
       
Conclusion
Given the risks identified in this study, all users – particularly businesses with long-term deployment
timeframes  –  would  be  well  served  to  upgrade  to  genuine  Microsoft  Windows  and  Office  products.
Employing genuine software allows users to protect the performance they experience and the security
of their personal and professional information.  All users should verify that the software that they run is
genuine,  and  if  it’s  not  they  should  acquire  an  upgrade  either  from  Microsoft  directly,  or  from  an
authorized Microsoft retailer.
Appendice s
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  13
 
       
Appendix I: Methodologies for Performance & Productivity Tests 
Test Measuring…  Testing Method
Average time to
open a multipage
Excel
spreadsheet.
Preconditions:
o  Put the test file on the desktop.
o  Set Excel Macro security to low.
o  Select Auto Scroll in Procmon’s edit menu.
o  Select Always on Top under Procmon Options.
Procmon filters added:
o  Process name: EXCEL.EXE. 
o  Operation: Process Start.
o  Operation: CloseFile.
Testing method:
1.  Open Procmon.
2.  Open multipage excel spreadsheet.
3.  When data stops scrolling for 5+ seconds record time reading from
last entry. 
4.  Subtract the process start time from the last entry time and record
the result.
5.  Repeat the test 5 times and record the average result.
Average time to
print a 500kb
Word document.
Preconditions:
o  Add a local printer.
Procmon filters added:
o  Operation: Create File.
o  Operation: Close File.
o  Path Contain: xxtestprintxx.
Testing method:
1.  Open Procmon.
2.  Open 500kb Word document (“xxtestprintxx”).
3.  Select File – Print. 
4.  Click on “Ok” to print.
5.  Subtract the process start time from the end time and record the
result.
6.  Repeat the test 5 times and record the average result.
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  14
 
       
Appendix I: Methodologies for Performance & Productivity Tests, Cont’d
Test Measuring…  Testing Method
Average time to
print a 1mb
Word document.
Preconditions:
o  Add a local printer.
Procmon filters added:
o  Operation: Create File.
o  Operation: Close File.
o  Path Contain: xxtestprintxx.
Testing method:
1.  Open Procmon.
2.  Open 1mb Word document (“xxtestprintxx”).
3.  Select File – Print. 
4.  Click on “Ok” to print.
5.  Subtract the process start time from the end time and record the
result.
6.  Repeat the test 5 times and record the average result.
Average time to
print a 5mb
Word document.
Preconditions:
o  Add local printer.
Procmon filters added:
o  Operation: Create File.
o  Operation: Close File.
o  Path Contain: xxtestprintxx.
Testing method:
1.  Open Procmon.
2.  Open 5mb Word document (“xxtestprintxx”).
3.  Select File – Print. 
4.  Click on “Ok” to print.
5.  Subtract the process start time from the end time and record the
result.
6.  Repeat the test 5 times and record the average result.
Average time to
load an intranet
web page.
1.  Use http://www.numion.com/Stopwatch/index.html to open and
close an intranet web page and record the time.
2.  Clear browsing history and cache before each test.
3.  Repeat the test 5 times and record the average result.
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  15
 
       
Appendix I: Methodologies for Performance & Productivity Tests, Cont’d
Test Measuring…  Testing Method
Average time to
load an intranet
web page heavy
with text.
1.  Use http://www.numion.com/Stopwatch/index.html to open and
close an intranet web page and record the time.
2.  Clear browsing history and cache before each test.
3.  Repeat the test 5 times and record the average result.
Average time to
load an intranet
web page heavy
with graphics.
1.   Use http://www.numion.com/Stopwatch/index.html to open a
graphic intranet web page and record the time to a log file. 
2.   Clear browsing history and cache before each test.
3.  Repeat the test 5 times and record the average result.
Average time to
load a commonly
visited internet
web page heavy
with graphics and
text.
1.  Use http://www.numion.com/Stopwatch/index.html to open
Internet Explorer and access http://www.microsoft.com.
2.  Clear browsing history and cache before each test.
3.  Repeat the test 5 times and record the average result.
 
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  16
 
       
Appendix II: Methodologies for Security Tests
Test Measuring…  Testing Method
Ability to install
automatic
Microsoft OS
updates.
1.  Set operating system to check for automatic updates.
2.  Check for automatic download of updates.
Ability to install
manual
Microsoft OS
updates.
1.  Search for manual updates on the Microsoft website.
2.  Download and run the manual updates.
3.  Check for download and installation of manual updates.
Boot time.
Preconditions:
o  Fresh install of OS under test. 
o  Install manufacturer’s hardware drivers.
o  Run all windows recommended updates.
o  No third party applications installed.
o  System configured to boot into windows without logon screen.
Testing method:
1.  Add a shortcut to notepad in windows startup.
2.  Launch Procmon.
3.  Select Options > Enable Boot Logging and select OK.
4.  Restart computer.
5.  Launch Procmon.
6.  Save the boot log to the desktop.
7.  Open the boot log file.
8.  Record the time of the first process start and the start time of
notepad.exe.
9.  Calculate boot time by subtracting the first boot time from the start
time of notepad.
10. Repeat the test 5 times and record the average result.
Presence of
viruses.
1.  Run AVG full virus scan.
2.  Monitor network traffic and analyze results to find irregularities.
 
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  17
 
       
Appendix III: Methodologies for Power Consumption Tests
Test Measuring…  Testing Method
Battery life
1.  Ensure that battery is fully charged.
2.  Configure Windows Media Player to loop playback.
3.  Disconnect the laptop from non-battery power supply and record
time.
4.  Play a looping HD AVI movie.
5.  Ping computer being tested from a second computer every 30
seconds, then record time when the ping test fails.
6.  Subtract the start time from the end time to get total battery life.
Time to recharge
its battery.
1.  Ensure that the battery is dead.
2.  Start a stopwatch.
3.  Plug in the machine to charge the battery.
4.  Stop the stopwatch when the computer's battery is fully charged,
record time.
Power
consumption
while running
processor
intensive
programs for an
hour. 
1.  Ensure that the laptop is sitting idle and that the battery is at least
charged to 75%.
2.  Calibrate JouleMeter software.
3.  Start Internet Explorer.
4.  Enter the names of the program executable to run (iexplore.exe).
5.  Save the data to a file. 
6.  Click "Start Saving"
7.  Play video from the Microsoft website to completion.
8.  Stop saving when the video has completed.
9.  Record power consumption.
10.  Repeat the test 5 times and record the average result.
Power
consumption
during sleep
mode.
1.  Remove the battery from the laptop.
2.  Connect the machine to a "Kill a Watt" measuring device.
3.  Boot the computer and let it go into sleep mode.
4.  Record the reading on the "Kill a Watt" device each minute for the
next 5 minutes.
5.  Repeat the test 5 times and record the average result.
Power
consumption
when coming out
of sleep mode.
1.  Remove the battery from the laptop.
2.  Connect the machine to a "Kill a Watt" measuring device.
3.  Boot the computer and let it go into sleep mode.
4.  Wake the computer up by pressing the power button.
5.  Record the highest "Kill a Watt" reading over the next minute.
6.  Repeat the test 3 times and record the average.
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  18
 
       
Appendix III: Methodologies for Power Consumption Tests, Cont’d
Test Measuring…  Testing Method
Power
consumption
when playing an
HD Movie.
1.  Remove the battery from the laptop.
2.  Connect the machine to a "Kill a Watt" measuring device.
3.  Boot up a high quality video and skip forward to the 30 minute
mark.
4.  Play the movie in full screen mode.
6.  Record the reading on the "Kill a Watt" device each minute for the
next 5 minutes.
5.  Repeat the test 5 times and record the average result.
 
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  19
 
       
Appendix IV: Hardware Configurations
Processor   RAM/Hard Drive
Intel Core 2 Duo 2.10  3gb/250gb
AMD II 2.29  3gb/250gb
Turion II 560 Dual 2.5  3gb/300gb
Pentium R 2.13  2gb/300gb
Intel Core 2 Duo 2.20  3gb/500gb
AMD II 2.19  1.74gb/300gb
 
  
Genuine Microsoft Products Vs. Pirated Counterparts  
 
 
 
  20
 
       
Appendix V: Software Configurations
Windows OS Versions Tested     MS-Office Versions Tested
Windows 7 Professional SP1 VL     Office Pro 2010 FPP
Windows 7 Professional SP1     Office Pro Plus 2010 VL
Windows 7 Ultimate SP1     Office Pro Plus 2010
Windows 7 Ultimate Themed Installation     Office Pro Plus 2010 FPP
Windows 7 Ultimate     Office Pro 2010 VL
Windows 7 Ultimate SP1 VL     Office Pro 2010
Windows 7 Ultimate VL     Office Pro 2003 FFP
Windows 7 Ultimate VL Minimal Installation     Office Pro 2003 VL
Windows 7 Ultimate VL Themed Installation      
Windows XP Professional SP3      
Windows XP Professional SP3 Themed Installation       
 
 

genuinemsproducts.pdf

genuinemsproducts.pdf
0.59MB