*Can be run as a standalone application
*Works well with all system languages
*Custom OEM information can be installed
*Argument support for silent installs
*Can be used for pre-activation
*Application integrity checking
*Custom error handling
*Support for hidden partitions and complex setups
*Can work alongside Linux's GRUB or any other boot manager
*Works with TrueCrypt and many other types of hard drive encryption applications
*Add your own certificates and serials externally
*Offers certificate and serial installation only for users with an existing SLIC 2.1
*Automated system profiling (The application matches everything up for you)
The rundown
*Compatible with Windows 7 SP1 and all system updates
*Will run on x86 and x64 systems
*No core system files get modified
*No extra processes are run so you have nothing eating at your RAM
*All key parts of the exploit are encrypted with a custom encryption
*The exploit runs before Windows so it's harder for Microsoft to prevent
*The exploit patches all necessary tables making activation look authentic
*The application will select the best profile for your system during installation
*Each and every user has a unique version of the exploit installed on his/her system