Dig up hidden CD Keys. You can't find the CD-ROM jewel case that belongs to your recently corrupted installation of Windows 95 (or Office, or the Plus pack, or Publisher, or some other Microsoft product). But you keep the disc pinned to a corkboard, so you're OK, right? But then you remember: these darn Microsoft products require that irritating CD Key to reinstall them--and the code disappeared with the jewel case. Well, actually, it isn't gone. Your previous installation of the software slapped the CD-Key code into the Registry. Here's where to find it: 1. Make sure you have a backup of the Registry. Do you get the picture? 2. Launch regedit by selecting Start/Run, typing regedit in the text box, and pressing Enter. 3. Under HKEY_LOCAL_MACHINE, scroll down to Software. 4. Find the Microsoft listing, and look for the directory that contains the software you need to reinstall. 5. Double-click the ProductID listing, and select the middle two number strings (for example, in 53491-460-1656111-49145, select 460-1656111). 6. Press Ctrl-C to copy the CD Key to the Clipboard; then paste it somewhere where you can reuse it. (Perhaps even copy all your keys to a text document, and print them for safekeeping, eh?) ** NOTE ** Most of the microsoft keys work for the different software applications they have. For Example: Win95 key works as a Microsoft Office 95 key or Plus Pack or NT.Main Page @ Matarese.com Acquiring Account Information @ Matarese.com Act2! by Symantec @ Matarese.comThis page was created Wed Aug 11 13:11:32 EDT 1999
Using Linux version 2.0.32 on an i586
All hacks / Annoyance @ Matarese.com Alt 2600 Group FAQ @ Matarese.com
Hacking Angelfire @ Matarese.com Anonymous E-Mail @ Matarese.com
Hacking BBS's @ Matarese.com List of Common Bugs @ Matarese.com
Things that go Bump on the Internet @ Matarese.com Expanding the capacity of Caller ID Boxes @ Matarese.com
The Matarese Circle @ Matarese.com Cops and Robbers | UNIX Security @ Matarese.com
Credit Carding Part I @ Matarese.com Exploits FAQ @ Matarese.com
Making Free Calls @ Matarese.com FTP Bouncing @ Matarese.com
Hackers Encyclopedia @ Matarese.com Hacking from Windows9x FTP @ Matarese.com
Hacking Tripod @ Matarese.com Hacking Web Pages @ Matarese.com
How to crack a UNIX password file. @ Matarese.com Hacking Servers : A Begginners Guide @ Matarese.com
Hacking Tutorial @ Matarese.com Hacking UNIX @ Matarese.com
How to Hack the WWWboard Message Board 2.0 @ Matarese.com Hackers Handbook @ Matarese.com
Guide to Harmless-Hacking @ Matarese.com All about security holes @ Matarese.com
Hacking Hotmail @ Matarese.com ]How to Hack from from Harlequin and Archangel @ Matarese.com
Improve security by breaking into your site @ Matarese.com Internet Security @ Matarese.com
IRC Hacking FAQ by Lord Somer @ Matarese.com Lan Technology Scorecard @ Matarese.com
Harmless Hacking - Linux @ Matarese.com Mail Spoofing Explained @ Matarese.com
Microsoft IIS Vulnerability @ Matarese.com Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com
Intresting Microsoft Access 7.0 Trick @ Matarese.com MS Money 2.0 Back Door @ Matarese.com
Mind Your Own Business (MYOB) @ Matarese.com This Hack is for the OptiChat Original Chat Room @ Matarese.com
Internet Outdials @ Matarese.com Introduction to the Internet Protocols @ Matarese.com
Analysis of QueSO Performance @ Matarese.com Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com
L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com Sniffer FAQ V 1.7 @ Matarese.com
SSPING/JOLT patches @ Matarese.com WORKING OUT-TELNETS @ Matarese.com
How do I post to a moderated newsgroup? @ Matarese.com What You Should Know About Computer Viruses @ Matarese.com
How can I protect myself from viruses and such? @ Matarese.com What is a trojan/worm/virus/logic bomb? @ Matarese.com
VMS Info (Password Cracking) @ Matarese.com HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM @ Matarese.com
Using web proxies to disguise your IP address @ Matarese.com
unix linux networking c c++ operating systems Copyright (C) 1999 - Matarese.com