You're welcome.
If you consider using a non-legit version of windows, make certain that you check the sha-1 coding to make certain it has not been tampered with. The best way to steal personal information is to inject a virus into your system behind windows.
Personally, stay away from torrents as peer to peer is about the easiest way to get nabbed for stealing copy written data.
If the sha-1 or hash check does not match the official release, I'd advise not using it. There's slic modifications you can make to create an activated version or depending on the version of windows run a KMS server. If you're not tech savvy, stick with legit programs. It will make your life easier. Especially since everything runs off of the base windows system...if that is not working correctly, then the computer may not function for what you need it to do.