Jump to content

Office Key Not Working

Recommended Posts

21 minutes ago, toast1 said:

Many thanks for the suggestions.

Isn't there some risk downloading Office from 3rd party sites? Isn't there always the possibility of viruses etc.  

How would I know it is safe?

I once bought Office in Pantip Plaza, and found a virus in there.






I bought an Office 2019 key from eBay and used the Microsoft Office Deployment Tool to download and configure MS Office, obviously using Microsoft servers. It also gave me the ability to do a custom install, so I could install only the components I wanted. The media downloaded from the key vendor would only let me do a full install, with no way to delete individual components. Not sure if MS ODT works with Office 2013, but google will tell you.

Edited by Mutt Daeng
Link to post
Share on other sites

If you compare the hashes and they match then you can be pretty sure you have a 100% genuine and unmodified installation media.


If so, there is (next to) zero risk.

Link to post
Share on other sites
3 hours ago, toast1 said:

But - can you explain to me, what you mean by a hash?

Really surprised you're not taking advantage of UK-based discussion forums.


Why not simply google "Hash Check"?


Wikipedia: Integrity verification
File integrity can be compromised, usually referred to as the file becoming corrupted. A file can become corrupted by a variety of ways: faulty storage media, errors in transmission, write errors during copying or moving, software bugs, and so on.


Hash-based verification ensures that a file has not been corrupted by comparing the file's [currently calculated] hash value to a previously [independently] calculated [hash] value [of the original file]. If these values match, the file is presumed to be unmodified. Due to the nature of hash functions, hash collisions may result in false positives, but the likelihood of collisions is often negligible with random corruption.



Wikipedia: Watermark (data file)

A watermark stored in a data file refers to a method for ensuring data integrity which combines aspects of data hashing and digital watermarking. Both are useful for tamper detection, though each has its own advantages and disadvantages.


Data hashing

A typical data hash will process an input file to produce an alphanumeric string unique to the data file. Should the file be modified, such as if one or more bit changes occur within this original file, the same hash process on the modified file will produce a different alphanumeric. Through this method, a trusted source can calculate the hash of an original data file and subscribers can verify the integrity of the data. The subscriber simply compares a hash of the received data file with the known hash from the trusted source. This can lead to two situations: the hash being the same or the hash being different.

If the hash results are the same, the systems involved can have an appropriate degree of confidence to the integrity of the received data. On the other hand, if the hash results are different, they can conclude that the received data file has been altered.

This process is common in P2P networks, for example the BitTorrent protocol. Once a part of the file is downloaded, the data is then checked against the hash key (known as a hash check). Upon this result, the data is kept or discarded.


Digital watermarking

Digital watermarking is distinctly different from data hashing. It is the process of altering the original data file, allowing for the subsequent recovery of embedded auxiliary data referred to as a watermark.

A subscriber, with knowledge of the watermark and how it is recovered, can determine (to a certain extent) whether significant changes have occurred within the data file. Depending on the specific method used, recovery of the embedded auxiliary data can be robust to post-processing (such as lossy compression).

If the data file to be retrieved is an image, the provider can embed a watermark for protection purposes. The process allows tolerance to some change, while still maintaining an association with the original image file. Researchers have also developed techniques that embed components of the image within the image. This can help identify portions of the image that may contain unauthorized changes and even help in recovering some of the lost data.

A disadvantage of digital watermarking is that a subscriber cannot significantly alter some files without sacrificing the quality or utility of the data. This can be true of various files including image data, audio data, and computer code.

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    No registered users viewing this page.

  • Create New...