On Thu, 18 Feb 2010 21:37:25 +0000 James Bensley jwbensley@gmail.com wrote:
I would of guessed not without knowing the algorithm used to generate the key, time to get your reverse engineering hat on!
Work out what kind of hash/encryption is used first, and then I don't know, use the date+time+MAC_ADDRESS+MoBo_Serial# and see what you come up with etc etc
This has got me wondering how many unique ID numbers there are in a machine that could be used in this particular calculation.
Steve.