Jump to content
New Members Read more... ×

Search the Community

Showing results for tags 'keys'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 10 results

  1. Hi guys, I'm here with a general topic which concerns everybody. Softwares We install various softwares for trials or personal use, and face various difficulties during installation, activation and usage. My intention to start this topic is to help community members to help each other on WINDOWS Platform. Here you may ask our community members for help in any aspects of windows softwares, be it installation, activation or even keys support (if available). Here I suggest a minimal list of softwares once you install windows (Suggestions solicited): * Office (Microsoft, Openoffice etc.) * PDF (Acrobat, Nitro etc.) * Screen Capture (Techsmith Snagit, Faststone Capture etc.) * Browsers (Chrome, Firefox etc.) * Anti-virus (Avast, Kaspersky, F-Secure etc.) * Virtualisation (VMware, Virtualbox etc.) * Photo- editing ( ??? ) * Video-editing ( ??? ) * File explorers * Duplicate finders * Backup and sync * Social apps * Downloaders So, start asking and helping each other... Happy helping to you all....
  2. Gotcha Data Backup This is a tool I created many years ago to provide Data Backup capabilities from within the WinPE Environment as well as within a running Windows Environment. It can also detect Windows installations on External or slaved drives as well. It is useful for users that will be reinstalling a computer or when they need to transfer their data to a new computer. GotchaDATA.exe is a completely portable file. It should work in any windows version from Windows 2000 and newer. It should work in most if not all WinPE Environments. It does not require any .NET installations. Gotcha Data Backup is meant to backup all of the most important areas of the user profiles. For instance... Desktop, Documents, Downloads, Videos, Music, Pictures, Favorites, Internet Favorites/Bookmarks, Microsoft Office PST Files and profile settings, Mapped Drives, and more. It also has the ability to backup some important System Files and settings. For instance... Windows and Microsoft Office Product Keys, System Drivers, Fonts, WiFi Profiles, and so on. A great advanced capability is the option to Move files instead of Copy files. This comes in handy if you will be reinstalling a computer without formatting the drive. Since Gotcha will quickly be able to move the files you need backed up into a folder on the same drive very quickly. This can save you hours gathering the backup if you use the normal copy operation that other backup tools use. Once you have created your backup you will notice it creates a folder in the location you chose called "Gotcha!". In this folder you will have a new file called GotchaRESTORE.exe which is what you will use when you are logged into the Windows User account you wish to restore data to. It will ask you for the path of the Backup. Just browse into this "Gotcha!" folder and select the Dated folder of your backup. Next you just select the profile you will be backing up. Now select any System or User files you wish to restore. Gotcha does not restore Product Keys... so you can browse through your dated backup folder and find the "System\Keys.ini" file which has the keys in it. Also Drivers are backed up in "System\Drivers". You will be able to restore them using the built in Windows method for restoring Drivers. Changelog: Recently added code to scan desktop shortcuts to remove internet browser shortcuts that are routing to an external website. To help prevent the spread of viruses to the new system. This is only in beta at the moment and will be improved upon in the future. I plan to use code from my Uninfector program to implement virus scanning into the backup process Re-Compiled GotchaDATA.exe with a new digital signature to help prevent false positives in some antivirus programs. If you get any false positives from your antivirus programs please submit it to them so they can whitelist GotchaDATA.exe. HOMEPAGE DOWNLOAD regards
  3. Master Keys for Wallet Ransomware Posted to BleepingComputer Forums (May 18, 2017) Decryption keys for Wallet ransomware have been posted to the BleepingComputer online forums. It is not clear exactly why the malware creators have released the keys. The ransomware family of which Wallet is a part often releases keys when it has switched to a new extension. The attackers may also have surmised that they are not going to make any more money from that particular variant. Source
  4. Users are reporting success activating clean installations of Windows 10 using old license keys, and specifically those that apply to Windows 7, Windows 8, and Windows 8.1. This method continues to work even after the Creators Update, which is the second major upgrade to Windows 10 since it was made available to the public in July 2015 (the first one was the Anniversary Update). Microsoft made it known that Windows 7 and Windows 8/8.1 users would have a full year to upgrade their PCs to Windows 10 at no cost. Technically that offer expired around nine months ago. Be that as it may, users have been finding ways to install Windows 10 for free or at a lower cost than purchasing a brand new license. One of those ways is by taking advantage of Microsoft's grace period for anyone who uses assistive technologies. Microsoft continues to offer free upgrades in such cases, and since this is based on the honor system—Microsoft does not take any steps to verify that a user qualifies—it is up to each user's own moral compass whether to go this route or not. With Microsoft still allowing Windows 10 to activate with old Windows keys, users may find it less expensive to purchase a Windows 7 or Windows 8/8.1 license online. We did a quick web search and were able to find a Windows 7 Pro OEM key for less than $10. Whether using an old key is completely legal or not is up for debate. There is also the risk of Microsoft could update its servers to block Windows 10 activations with old Windows keys. We'd be surprised if it did, as Microsoft seems much more interested in getting as many people on Windows 10 as possible. It has a longer term game plan in mind, with a stated goal of having 1 billion active Windows 10 devices in the next 15 months. At present, there are 400 million active Windows 10 devices, according to Microsoft's latest official update. Article source
  5. Is the Redmond company lying? cause it sure looks so At the end of 2015, it came to light that Microsoft was hoarding everyone's encryption keys for Windows 8, 8.1 and 10 devices, and storing them on its servers. The revelation came to light thanks to a The Intercept investigation, the same news agency which became famous after publishing the vast majority of Edward Snowden's NSA-related documents. Reporters discovered and confirmed with Microsoft that the company was shipping devices with disk encryption turned on by default, and was automatically uploading this encryption key to a user's OneDrive account if he ever logged in on the device using his Microsoft account. While not everybody uses their Microsoft credentials to log in on his laptop, some people had no way of turning this feature off, more precisely those using Windows Home editions. For people using the Pro and Enterprise editions, there's a guide on how to disable this behavior. Did Microsoft ever help the FBI, NSA, or other US agency? But Microsoft's somewhat questionable method of gathering these disk encryption keys is not the problem. The issue, in context of the recent FBI vs. Apple standoff, is if Microsoft has ever caved in to a law enforcement agency's request and released any of these encryption keys so investigators could unlock a suspected criminal's device. In an email to Lorenzo Franceschi-Bicchierai, reporter for Vice, the Redmond company has said that until now, they have not provided any customer disk encryption key to any law enforcement agency. This doesn't mean that the company won't provide one if law enforcement agents produce a warrant, which most companies do honor, including Apple. Unless law enforcement agencies make outrageous requests for universal encryption keys in their products, most companies would have no problem abiding with these requests. It's just surprising that Microsoft wasn't contacted until now, especially if we take into account the company's huge OS market share. Article source
  6. Microsoft wants the personal details of a Comcast subscriber that has activated thousands of copies of Windows 7, Windows 8, Windows Server and Office 10 using stolen or abused codes. The company has asked a federal judge permission to serve Comcast with a subpoena to identify the pirate. So far Microsoft has been unable to trace the pirate that activated thousands of stolen Office and Windows keys. According to Computerworld, the keys were stolen from Microsoft’s supply chain and a single IP address was used to activate the products. The only information Microsoft was able to obtain about the pirate is the used IP address and the date and time of each attempt of the user to activate the stolen keys. Therefore the company wants the personal details of the owner of the IP address which belongs to a Comcast subscriber. Also, if the actual ISP of the user is a Comcast downstream ISP, Microsoft wants that ISP’s name and the right to subpoena that firm as well. If Microsoft is able to find the pirate he will have to pay all general, special, actual, and statutory damages for pirating the software. Article source
  7. In 2012, New Zealand police seized computer drives belonging to Kim Dotcom, copies of which were unlawfully given to the FBI. Dotcom wants access to the seized content but the drives are encrypted. A judge has now ruled that even if the Megaupload founder supplies the passwords, they cannot subsequently be forwarded to the FBI. During the raid more than two years ago on his now-famous mansion, police in New Zealand seized 135 computers and drives belonging to Kim Dotcom. In May 2012 during a hearing at Auckland’s High Court, lawyer Paul Davison QC demanded access to the data stored on the confiscated equipment, arguing that without it Dotcom could not mount a proper defense. The FBI objected to the request due to some of the data being encrypted. However, Dotcom refused to hand over the decryption passwords unless the court guaranteed him access to the data. At this point it was revealed that despite assurances from the court to the contrary, New Zealand police had already sent copies of the data to U.S. authorities. In May 2014, Davison was back in court arguing that New Zealand police should release copies of the data from the seized computers and drives, reiterating the claim that without the information Dotcom could not get a fair trial. The High Court previously ruled that the Megaupload founder could have copies, on the condition he handed over the encryption keys. But while Dotcom subsequently agreed to hand over the passwords, that was on the condition that New Zealand police would not hand them over to U.S. authorities. Dotcom also said he couldn’t remember the passwords after all but may be able to do so if he gained access to prompt files contained on the drives. The police agreed to give Dotcom access to the prompts but with the quid pro quo that the revealed passwords could be passed onto the United States, contrary to Dotcom’s wishes. Today Justice Winkelmann ruled that if the police do indeed obtain the codes, they must not hand them over to the FBI. Reason being, the copies of the computers and drives should never have been sent to the United States in the first place. While the ruling is a plus for Dotcom, the entrepreneur today expressed suspicion over whether the FBI even need the encryption codes. “NZ Police is not allowed to provide my encryption password to the FBI,” he wrote on Twitter, adding, “As if they don’t have it already.” Source
  8. Google's Android Mobile operating system for smartphones and tablets have Google's own Play Store that provides its Android users the most visible way to access the world of millions of apps. App developers produce more than thousands of applications each year, but majority of newbie and unprofessional developers use unsafe, unreliable, and insecure coding practices, as many developers store secret keys in their apps that could potentially allow cybercriminals to steal users’ sensitive data. A team of researchers from the computer science department of the Columbia University havediscovered a critical security problem in the Google’s official Android app store from where millions of Android users download various apps. Researchers have found that most of the Android application developers often store their secret keys in their app's code, similar to usernames/passwords information, which could be then used by any bad actor to maliciously steal users’ information or resources from the service providers such as Amazon and Facebook. These vulnerabilities in the implementation of the Android applications can affect users even if they are not actively using the Android apps. Even "Top Developers" designated by the Google Play team as the best developers on Google Play, included these vulnerabilities in their apps, according to the researchers. Google play store contains millions of apps, including free and paid apps, and over 50 billion app downloads. “But no one reviews what gets put into Google Play—anyone can get a $25 account and upload whatever they want. Very little is known about what's there at an aggregate level," said Jason Nieh, professor of computer science at New York-based Columbia Engineering. Researchers built and make use of a tool called PlayDrone, the first scalable Google Play store crawler tool that uses various hacking techniques to deceive the security measures that Google uses to prevent indexing of its Google Play store content. One can successfully download Google Play store content and recover their sources. (Slides) (Download PlayDrone) "We have been working closely with Google, Amazon, Facebook and other service providers to identify and notify customers at risk, and make the Google Play store a safer place," said one of the researcher, Nicolas Viennot. "Google is now using our techniques to proactively scan apps for these problems to prevent this from happening again in the future." PlayDrone managed to download more than 1.1 million Android apps and decompile over 880,000 free applications and analyzing over 100 billion lines of decompiled code. WHAT GOOGLE SHOULD DO? With the widely spread platform of Android operating system in the mobile phones, no doubt it’s become an easy target for cybercriminals. Now, this weakness in the practices of apps development found on the official Google play store is icing on the cake for cybercriminals. I would not call it a vulnerability in the Google play store because its not flaw in their server or network, rather it’s the fault of app developers, who take their users’ data security as granted and Google itself, which approves apps with weak development practices and have never implement any strict guidelines to stop developers from doing so. Google should actively encourage and enforce new policy on the app developers, so that they give top priority to their users’ data security and any violations to the policy could lead to suspension of that developer’s licence. Source
  9. Nuclear Coffee Recover Keys 8.0.3.109 Enterprise + Portable Have you ever lost your keys? Perhaps, yes. In such case you can create duplicate or change the lock. What if you lost your activation keys for Windows operating system or other major software you recently purchased? It may costs you from hundreds to thousands dollars. For this reason we have created this software. With Recover Keys you simply diagnoze your system for all installed software and make a backup, print it or save to the text file. Recover Keys retrieve your lost software activation codes, product ID, show Auth. key, company and user name. This save you a lot of time and money. Key Features Scan your system for activation keys for Windows, Office, and more than 855 other software packagesBackup activation keys to a file or send them to printerScan your network computers for activation keysAnother Windows on HDD? No problem, Recover Keys can scan for activation keys on another operating system wtihout even booting it and even from non-bootable WindowsEasy and intuitive user interfaceAuto-updater will keep you always in touch with latest version and with new fresh database of supported software packagesWorks on Windows 2000/XP/Vista/7/8. 32 bit or 64 bit systemWebsite: http://recover-keys.com Language: ML Medicine: Crack Size: 37,50 / 39,60 Mb.
  10. Shadow Defender 1.3.0.455 Final (x32-x64) Eng/Rus + Keymaker + Keys Shadow Defender is an easy-to-use security solution (for Windows operating systems) that protects your PC/laptop real environment against malicious activity and unwanted changes. Shadow Defender can run your system in a virtual environment called 'Shadow Mode'. 'Shadow Mode' redirects each system change to a virtual environment with no change to your real environment. If you experience malicious activity and/or unwanted changes, perform a reboot to restore your system back to its original state, as if nothing happened. With Shadow Defender, you have the flexibility to specify which files and folders are permanently saved to the real environment. This ensures important files and folders are kept after a reboot.Try Shadow Defender for the most effective and easy-to-use security solution. Shadow Defender Features: Prevent all viruses and malware.Surf the internet safely and eliminate unwanted traces.Protect your privacy.Eliminate system downtime and maintenance costs.Reboot to restore your system back to its original state.Shadow Defender Users: Maintain a system free from malicious activity and unwanted changes.Test software and game installations in a safe environment.Protect against unwanted changes by shared users (suitable for workplaces and educational institutions).Version 1.3.0.455 What's Fixed: A bug related to File Exclusion List.Homepage: http://www.shadowdefender.com/ OS: Windows XP / Vista / 7 / 8 (x32-x64) Language: English / Russian Medicine: Keymaker / Keys Size: 3,58 Mb.
×