Feb 1 2014

Windows 7 activation doesnt work and SLMGR –REARM reached its limits.

by admin

First of all – Go to: Controll panel \ Programs and Features.

Then press View installed updates, wich you have on the left side.
Search for Update for Windows 7 called: KB971033.
Uninstall it if you got it installed.

You can reset your rearm count up to 4 times, each “slmgr /rearm” command give you another 30 days everytime your rearm count is over use the following instructions to reset your rearms count back to 4:

Instructions:
Be careful if you dont get it right your going to have to do a clean install

1) Stop the Software Protection service -sppsvc:
Run: services.msc – look for “Software Protection” service and right click on it > Stop).

2) Move your tokens.dat to your desktop
Go to: C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SoftwareProtectionPlatform

3) Move the files with “.C7483456-A289-439d-8115-601632D005A0” extention to your desktop
they are hidden, so you need to ajust so you can see hidden files.
Go to C:\Windows\System32

4) Start the Software Protection service

5) Open command prompt as admin and run “slmgr /dlv”

6) Stop the Software Protection service again.

7) Put the files on your desktop back to their place and and replace them.
C:\Windows\ServiceProfiles\NetworkService\AppData\ Roaming\Microsoft\SoftwareProtectionPlatform
C:\Windows\System32

8) Install your default product key.
Open command prompt as admin and run “slmgr /ipk XXXXX-XXXXX-XXXXX-XXXXX-XXXXX”
change “XXXXX-XXXXX-XXXXX-XXXXX-XXXXX” to your edition default key:
Ultimate – D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV
Professional – HYF8J-CVRMY-CM74G-RPHKF-PW487
Home Premium – RHPQ2-RMFJH-74XYM-BH4JX-XM76F
Home Basic – YGFVB-QTFXQ-3H233-PTWTJ-YRYRV
Starter – 7Q28W-FT9PC-CMMYT-WHMY2-89M6G

9) Reboot your computer.

10) Open command prompt as admin and run “slmgr /dlv” again, and you will see that your rearms has been reseted.


Dec 21 2013

Zylr.se – two weeks

by admin

After only two weeks with www.zylr.se running on the web.

333 visits and 157 uniq visitors.

This shows me – that there at least is a interest of this kind of site.

Ill try keep up the writing!


Dec 18 2013

Zylr.se

by admin

Launched a new website, dedicated to League of Legends.

http://www.zylr.se


Jul 24 2013

CentOS tcl-devel is missing

by Zylr

yum -y install tcl-devel


May 31 2013

apt-get update – release file expired

by Zylr

I was goin to update the server today when i walked up on this problem:

E: Release file expired, ignoring http://debian.lth.se/debian/dists/squeeze-updates/Release (invalid since 3d 1h 22min 1s)

Howto fix:

You can use this command to pass the errors:
apt-get -o Acquire::Check-Valid-Until=false update

or remove the complain source from: /etc/apt/sources.list


Jan 19 2013

Streaming

by admin

Im streaming my games at the moment, currently playing League of legends.

Check me out – give me support!

http://nova.xtreem.se/?page_id=196

http://twitch.tv/zylr


Oct 30 2012

Kill processes from the command prompt in Windows 7 & Windows 8

by admin

Start the commandopront as administrator.

Take out the processlist with: tasklist

Kill the processes with: taskkill /F /IM process.exe

taskkill [/s Computer] [/u Domain\User [/p Password]]] [/fi FilterName] [/pid ProcessID]|[/im ImageName] [/f][/t]

Parameters
/s Computer : Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain \ User : Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password : Specifies the password of the user account that is specified in the /u parameter.
/fi FilterName : Specifies the types of process(es) to include in or exclude from termination. The following are valid filter names, operators, and values.


Aug 10 2012

Google has to pay 22,5 milion dollars

by admin

Setting fines, the highest ever, which has been condemned by the U.S. Trade Commission, FTC, for violations of its orders and instructions. The sum imposed under a deal between Google and the FTC.

Google denies the crime, but the FTC refers to the U.S. Department of Justice, accusing Google of placing the cookies in the Safari users’ computers. Meanwhile, Google will be represented to users that the search giant did not intend to track their movements via cookies, or to provide users with targeted ads. Yet there was just that, according to the FTC. Google has previously been severely criticized for tracking cookies from Safari, which was unveiled early this year.

In addition to fines ordered now Google also to disable cookies in users’ computers, plates and smart phones. The fine is determined after a deal with Google, says the FTC.

– Record amount of this settlement sends a clear signal to all companies that have received an order from the FTC issued against him.

– No matter how big or small it is, so all companies need to follow the FTC’s instructions and keep their promises on privacy to customers. Otherwise, they are forced to pay several times what it had cost to follow our instructions from the beginning, says Jon Leibowitz, Chairman of the FTC, in a statement.

For Google is fine itself a trifle, but it also gives the company negative publicity. A spokeswoman for Google says that the FTC’s judgment, old content posted before Apple had changed its rules on the handling of cookies.

– Google has now amended the hand and taken steps to remove all advertising cookies, but did not collect any personal information from Apple’s Web browser, she said.


Aug 10 2012

Blizzard battle.net server hacked

by admin

Source: Mike Morhaime @ Blizzard

Even when you are in the business of fun, not every week ends up being fun. This week, our security team found an unauthorized and illegal access into our internal network here at Blizzard. We quickly took steps to close off this access and began working with law enforcement and security experts to investigate what happened.

At this time, we’ve found no evidence that financial information such as credit cards, billing addresses, or real names were compromised. Our investigation is ongoing, but so far nothing suggests that these pieces of information have been accessed.

Some data was illegally accessed, including a list of email addresses for global Battle.net users, outside of China. For players on North American servers (which generally includes players from North America, Latin America, Australia, New Zealand, and Southeast Asia) the answer to the personal security question, and information relating to Mobile and Dial-In Authenticators were also accessed. Based on what we currently know, this information alone is NOT enough for anyone to gain access to Battle.net accounts.

We also know that cryptographically scrambled versions of Battle.net passwords (not actual passwords) for players on North American servers were taken. We use Secure Remote Password protocol (SRP) to protect these passwords, which is designed to make it extremely difficult to extract the actual password, and also means that each password would have to be deciphered individually. As a precaution, however, we recommend that players on North American servers change their password. Please click this link to change your password. Moreover, if you have used the same or similar passwords for other purposes, you may want to consider changing those passwords as well.

In the coming days, we’ll be prompting players on North American servers to change their secret questions and answers through an automated process. Additionally, we’ll prompt mobile authenticator users to update their authenticator software. As a reminder, phishing emails will ask you for password or login information. Blizzard Entertainment emails will never ask for your password. We deeply regret the inconvenience to all of you and understand you may have questions. Please find additional information here.

We take the security of your personal information very seriously, and we are truly sorry that this has happened.


Jul 9 2012

Information leaking apps on appleappstore.

by admin

Only a couple of hours after release of the russian iphone app ”Find and Call”, it was removed from appstore.

The reason is that the security company Kaspersky Lab discovered that the app copied the user’s address book and sent it back to the creator of the app server.

By using the information in users’ address books would cause maker send spam to all contacts with the download link to the app. Only hours after the Kaspersky Lab issued a warning, Apple removed the app.

The app has also released a version for Android at Google Play, even Google acted quickly and removed it from its app store.