Click here to find books related to 'computer security'.


Dig up hidden CD Keys. 

You can't find the CD-ROM jewel case that belongs to your recently corrupted
installation of Windows 95 (or Office, or the Plus pack, or Publisher, or some other
Microsoft product). But you keep the disc pinned to a corkboard, so you're OK,
right? But then you remember: these darn Microsoft products require that irritating CD Key 
to reinstall them--and the code disappeared with the jewel case. 

Well, actually, it isn't gone. Your previous installation of the software slapped the
CD-Key code into the Registry. Here's where to find it: 

1. Make sure you have a backup of the Registry. Do you get the picture?

2. Launch regedit by selecting Start/Run, typing regedit in the text box, and pressing Enter.

3. Under HKEY_LOCAL_MACHINE, scroll down to Software.

4. Find the Microsoft listing, and look for the directory that contains the software 
   you need to reinstall.

5. Double-click the ProductID listing, and select the middle two number strings 
   (for example, in 53491-460-1656111-49145, select 460-1656111).

6. Press Ctrl-C to copy the CD Key to the Clipboard; then paste it somewhere where you 
   can reuse it. (Perhaps even copy all your keys to a text document, and print them for 
   safekeeping, eh?)


** NOTE **  Most of the microsoft keys work for the different software applications they have.

For Example: Win95 key works as a Microsoft Office 95 key or Plus Pack or NT.



This page was created Wed Aug 11 13:11:32 EDT 1999
Using Linux version 2.0.32 on an i586

Main Page @ Matarese.com Acquiring Account Information @ Matarese.com       Act2! by Symantec @ Matarese.com      

All hacks / Annoyance @ Matarese.com       Alt 2600 Group FAQ @ Matarese.com      

Hacking Angelfire @ Matarese.com       Anonymous E-Mail @ Matarese.com      

Hacking BBS's @ Matarese.com       List of Common Bugs @ Matarese.com      

Things that go Bump on the Internet @ Matarese.com       Expanding the capacity of Caller ID Boxes @ Matarese.com      

The Matarese Circle @ Matarese.com       Cops and Robbers | UNIX Security @ Matarese.com      

Credit Carding Part I @ Matarese.com       Exploits FAQ @ Matarese.com      

Making Free Calls @ Matarese.com       FTP Bouncing @ Matarese.com      

Hackers Encyclopedia @ Matarese.com       Hacking from Windows9x FTP @ Matarese.com      

Hacking Tripod @ Matarese.com       Hacking Web Pages @ Matarese.com      

How to crack a UNIX password file. @ Matarese.com       Hacking Servers : A Begginners Guide @ Matarese.com      

Hacking Tutorial @ Matarese.com       Hacking UNIX @ Matarese.com      

How to Hack the WWWboard Message Board 2.0 @ Matarese.com       Hackers Handbook @ Matarese.com      

Guide to Harmless-Hacking @ Matarese.com       All about security holes @ Matarese.com      

Hacking Hotmail @ Matarese.com       ]How to Hack from from Harlequin and Archangel @ Matarese.com      

Improve security by breaking into your site @ Matarese.com       Internet Security @ Matarese.com      

IRC Hacking FAQ by Lord Somer @ Matarese.com       Lan Technology Scorecard @ Matarese.com      

Harmless Hacking - Linux @ Matarese.com       Mail Spoofing Explained @ Matarese.com      

Microsoft IIS Vulnerability @ Matarese.com       Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com      

Intresting Microsoft Access 7.0 Trick @ Matarese.com       MS Money 2.0 Back Door @ Matarese.com      

Mind Your Own Business (MYOB) @ Matarese.com       This Hack is for the OptiChat Original Chat Room @ Matarese.com      

Internet Outdials @ Matarese.com       Introduction to the Internet Protocols @ Matarese.com      

Analysis of QueSO Performance @ Matarese.com       Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com      

L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com       Sniffer FAQ V 1.7 @ Matarese.com      

SSPING/JOLT patches @ Matarese.com       WORKING OUT-TELNETS @ Matarese.com      

How do I post to a moderated newsgroup? @ Matarese.com       What You Should Know About Computer Viruses @ Matarese.com      

How can I protect myself from viruses and such? @ Matarese.com       What is a trojan/worm/virus/logic bomb? @ Matarese.com      

VMS Info (Password Cracking) @ Matarese.com       HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM @ Matarese.com      

Using web proxies to disguise your IP address @ Matarese.com            

unix   linux   networking   c   c++   operating systems     Copyright (C) 1999 - Matarese.com