Microsoft Corporation Published: June 2009 Volume Activation helps Volume Licensing customers automate and manage the activation process. This document is for information technology (IT) implementers who have planned a Volume Activation deployment and are now ready to review and perform the procedures needed for that deployment. This guide is presented in sections. This guide also has been. This guide describes Microsoft® Volume Activation deployment concepts. Volume Activation consists of two technologies—Key Management Service (KMS) and Multiple Activation Key (MAK)—that allow Volume Licensing customers to activate Volume License editions of the Windows® 7 and Windows Server® 2008 R2 operating systems. The Volume Licensing Service Center at provides more information about Volume Licensing. When planning to use Volume Activation, an organization must choose KMS, MAK, or any combination of the two. The activation methods chosen depend on the needs of the organization and the network infrastructure. For more information about planning a Volume Activation deployment, see the Note This guide provides Volume Activation deployment guidance for the Windows 7 and Windows Server 2008 R2 operating systems. ![]() ![]() This guide does address interoperability between both generations of products, however. For more information about deploying Volume Activation for Windows Vista® and Windows Server 2008, see. Note This guide describes procedures that run scripts and make changes to the registry. These rights can be delegated to selected information technology (IT) implementers, and the rights to change product keys and perform activations can even be assigned to users, although Microsoft does not recommend this practice. If activation fails, see the for troubleshooting help. The guide includes an error code reference with steps for resolving common issues. 2013 review keygen activation Microsoft Windows Server 2008 R2 Enterprise serial 2013 office 2008 retina. The hack works to “activate” Windows 7 by bypassing. ![]()
0 Comments
Digital Security Pro Help protect yourself against today’s digital threats—identity theft, viruses and more—plus family controls to help keep your kids safe. Help protect yourself against today’s digital threats—identity theft, viruses and more—plus family controls to help keep your kids safe. Key service highlights include Key service highlights include • Lifelock Identity Theft Protection • Lifelock Identity Theft Protection • McAfee Internet Security • McAfee Internet Security • McAfee Safe Family • McAfee Safe Family. Plan covers hardware failures due to defects in material or workmanship, normal wear and tear or power surges. Laptop plans also cover Accidental Damage from Handling (ADH). Minimum systems requirements, monthly charges, 30-day waiting period and maximum 12-month rolling claims limit apply. $89 service fee may apply. Preexisting conditions not covered. Replacement devices and parts may be new or refurbished and of the same or like model. Not available in all areas. Key service highlights include Key service highlights include • Comprehensive multi-device protection • Comprehensive multi-device protection • 24/7 claims support • 24/7 claims support • Accidental damage coverage • Accidental damage coverage. Security Shield is a fake antivirus program that uses Trojans and fraud security web sites to promote itself. Security Shield or also known as the SecurityShield virus, can easily get inside the system via through Trojan infection. This harmful Trojan will exploit certain software weak spot found to gain secret access on the target PC. With the use of scam web sites, this malware will automatically scan victim’s PC and post an alert of possible infection. Then it will prompt to download and install Security Shield as the needed software to remove detected threats. No matter how one has obtained this fake AV, its effect once installed on the computer is very devastating. It will block your access to Internet and prevents running of any software. To push user in obtaining the full version of this fake security tool, it will pop-up fake alerts from time-to-time. It may be hard to remove Security Shield once it set itself on the system. It is capable of configuring a self-start to run the software when Windows starts. Once loaded, it has the ability to kill any installed anti-virus program and block your entire security software. With these damages made on to the system, there is a slight option that it can be removed with the normal software uninstall process. So far, the best way to remove Security Shield and other rogue product is by using a trusted anti-malware program as stated in the guide below. Valid antivirus program can also help in removing malicious files that are hidden on the system folder that are linked with Security Shield. Screenshot Images: These images are the versions of Security Shield. Security Shield ‘Protect Your PC In New Level’ is the newest version. Update: May 26, 2012 Security Shield now spreads a new version. It carries a different kind of interface. See image below. The malware is more harmful than ever because of a rootkit Trojan that comes with it. Technical Details and Additional Information: Security Shield is Also Detected As: Trojan.Win32.Heur.Gen (ByteHero), Trojan-Dropper.Win32.Dapato.upm (Kaspersky), Trojan.FakeAV!rem (PCTools), Trojan.FakeAV (Symantec) Damage Level: Medium Systems Affected: Windows 9x, 2000, XP, Vista, Windows 7 Malware Behavior Once Security Shield is running on the computer, it will never stop producing fake security alerts. These deceiving techniques attempts to persuade users to purchase the registered version of this malicious product. Some of the false information it will provide are the following: Security Shield Firewall Alert Security Shield has prevented a program from accessing the Internet. “iexplore.exe” is infected with “Trojan-Spy.Win32.Agent”. ![]() This worm has tried to use “iexplore.exe” to connect to remote host and send your credit card information. Harmful software detected Security Shield has detected malicious software that may cause PC crash. Click Remove All button below to remove them now. Warning message from your Internet browser. This page is under virus attack. This may crash your system. New database updates are available Automatic updating is required for real time system protection against new viruses, Trojans and worms. Option: Activating Security Shield The malware will block running of any programs. It also prevents access to Internet particularly anti-virus web sites. Execution of Windows tools like Task Manager, Registry Editor and Control Panel is similarly block by the rogue program. Activating the program using the registration key below will regain access to the mentioned services. Once activated, downloading of necessary program to scan and remove Security Shield is now possible. Use the registration code below. If it prompts for email address, you can input any email address. Activation Code: 64C665BE-4DE7-423B-A6B6-BC0172B25DF2 Step 1: Scan the computer with recommended removal tool 1. First thing you should do is reboot the computer in Safe Mode with Networking to avoid Security Shield from loading at start-up. NOTE: You will need to or BOOKMARK this procedure, as we have to restart the computer during the removal process. Remove all media such as Memory Card, cd, dvd, and USB devices. ![]() Then, restart the computer and please do the following: Boot in Safe Mode on Windows XP, Windows Vista, and Windows 7 system a) Before Windows begins to load, press F8 on your keyboard. B) It will display the Advanced Boot Options menu. Select Safe Mode. Start computer in Safe Mode using Windows 8 and Windows 10 a) Close any running programs on your computer. B) Get ready to Start Windows. On your keyboard, Press and Hold Shift key and then, click on Restart button. C) It will prompt you with options, please click on Troubleshoot icon. D) Under Troubleshoot window, select Advanced Options. E) On next window, click on Startup Settings icon. F) Lastly, click on Restart button on subsequent window. ![]() Aug 16, 2012. Procedure 1: Activate Security Shield 2012 and run virus scan. For users with technical skills in dealing with computer problems, executing this manual removal is enough to stop the malware. However, we highly recommend running anti-malware scan to remove other hidden files. For users who are not. Check out Verizon's comprehensive Internet Essentials plans for trusted and reliable internet security, device protection and premium technical support today! G) When Windows restarts, present startup options with numbers 1 - 9. Select 'Enable Safe Mode with Networking' or number 5. H) Windows will now boot on Safe Mode with Networking. Proceed with virus scan as the next step. Download the Removal Tool and save it on your Desktop or any location on your PC. When finished downloading, locate and double-click the file to install the application. Windows' User Account Control will prompt at this point, please click Yes to continue installing the program. Follow the prompts and install as 'default' only. There are no changes needed during the installation process. Malwarebytes Anti-Malware will launch for the first time. It is necessary to proceed with software update. After downloading updates, please click on Scan on the left sidebar. Choose Threat Scan on scanner's console to ensure that it thoroughly check the PC for any presence of Security Shield and other forms of threats. Click the Start Scan button to begin. Once the scan has completed, Malwarebytes Anti-Malware will issue a list of identified threats. Mark all threats and click on Quarantine Selected. If it prompts to restart the computer, please reboot Windows. Step 2: Ensure that no more files of Security Shield are left inside the computer 1. Click on the button below to download Norton Power Eraser from official web site. Save it to your desktop or any location of your choice. After downloading, navigate its location and double-click on the NPE.exe file to launch the program. Norton Power Eraser will run. If it prompts for End User License Agreement, please click on Accept to proceed. On NPE main window, click on Advanced Options. We will attempt to remove 'Security Shield' by thoroughly scanning your current operating system. On next window, select System Scan and click on Scan now to perform standard scan on your computer. NPE will proceed with the scan. It will search for Trojans, viruses, and malware like Security Shield. This may take some time, depending on the number of files currently stored on the computer. When scan is complete. All detected risks are listed. Click on Fix Now to remove Security Shield and other known threats. Then, restart Windows if necessary. Step 3: Remove the Rootkit Trojan that installs Security Shield Rootkit Remover is a stand-alone utility developed by McAfee. It can be used to detect and remove rootkit Trojan that is associated with Security Shield. This tool can detect rootkit that is part of ZeroAccess, Necurs, and TDSS family. Download Rootkit Remover and save it to your desktop or any accessible location. Click the button below to begin the download. Locate the file rootkitremover.exe and double-click to run the program. When User Account Control prompts if you want to allow the program to make changes on the computer, please click Yes. Rootkit Remover instantly scans the computer and look for presence of Trojans, viruses, and rootkit that is related to Security Shield. Once it finishes scanning the computer, the tool will require you to restart Windows. Alternative Removal Procedures for Security Shield Use Windows System Restore to return Windows to previous state During an infection, Security Shield drops various files and registry entries. The threat intentionally hides system files by setting options in the registry. With these rigid changes, the best solution is to return Windows to previous working state is through System Restore. To verify if System Restore is active on your computer, please follow the instructions below to access this feature. Access System Restore on Windows XP, Windows Vista, and Windows 7 a) Go to Start Menu, then under ' Run' or ' Search Program and Files field, type rstrui. B) Then, press Enter on the keyboard to open System Restore Settings. C) Windows will display list of saved restore points. Select the most recent one to restore Windows to previous working and clean state. D) It may take some time to fully restore back-up files. Restart Windows when done. Open System Restore on Windows 8 and Windows 10 a) For Windows 8 user, go to Start Search, while on Windows 10, use the Start Menu Search and type rstrui. B) Click on the located program to open System Restore window. C) Windows will display list of saved restore points if it is active. Select the most recent one to restore Windows to previous working and clean state. D) It may take a while to fully restore back-up files. Restart Windows when done. If previous restore point is saved, you may proceed with Windows System Restore. Option 2: Security Shield manual uninstall guide IMPORTANT! Manual removal of Security Shield requires technical skills. Deleting system files and registry entries by mistake may result to total disability of Windows system. We advise you to perform a backup of registry before proceeding with this guide. Kill any running process that belongs to Security Shield. - Press Ctrl+Alt+Del on your keyboard. - When Windows Task Manager appears, look for Security Shield files (refer to Technical Reference) and click End Process. Delete all registry entries that belong to this malware. - Press [Windows Key]+R on your keyboard. - In the 'Open' dialog box, type regedit and press Enter. This will open registry editor. - Find and delete registry entries as mentioned in Technical Reference section. - Close registry editor. Changes made will be saved automatically. Scan the computer with antivirus program. - Connect to Internet and open your antivirus software. Please update to obtain the latest database and necessary files. - Restart the computer in Safe Mode. - Just before Windows logo begins to load press F8 on your keyboard. - On Windows Advanced Boot Options, select Safe Mode and press Enter. - Thoroughly scan the computer with your updated antivirus software. Delete all files dropped by Security Shield. - While still in Safe Mode, search and delete malicious files. Please refer to 'Technical Reference'. Make sure that you execute 'End Task' first before deleting the file. Otherwise, the system will not let you perform this action. Associated Files and Folders:%AppData% [random]%AppData% [random] [random].bat%AppData% [random] [random].cfg%AppData% [random] [random].exe%UserProfile% Desktop Security Shield.lnk%UserProfile% Start Menu Programs Security Shield.lnk Added Registry Entries: HKEY_CURRENT_USER Software Security Shield HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Run '[random]' Troubleshooting Guides Did Security Shield blocks your Internet access? It is usual that rogue program prevents user from downloading removal tools from the Internet. Thus, infected computer may be denied to access the Internet by making changes to computer's proxy, DNS, and Hosts file. To solve Internet connection problem, please see our guide in. Also, make sure that your Windows Host File is free from any malicious entries.. Well, I see that aside from “SystemTool” [which has a NICE PINKISH look! HA!] Security Tool has still MORE sister viruses [there is one other, I think it’s Windows Security or something or other here.] now.that “Get FULL protection” [yeah right, it is MORE like “Get FOOL INFECTION!” ha ha] legend [which they will be, only in a DIFFERENT way], is a DEAD give-away. On December 13, [great LUCKY number kiddies, RIGHT?], 2010, yesterday, I got.SYSTEM tool. We should do a kind of “Social Network” flick follow up about such virus causersonly it would have to be fictional.,ha ha ha like THOSE crooks would EVER should their face [well, a few in Maryland have been ID’d as A MAIN part.] We could do a sort of “Social Network” meets “Easy A” dealhgih school kids create virus, “uncool” types {Ellen Page or Emma Stone could play these] refuse to scam, prinicapl busts scammer,s or set it in in a workplace. Hollywood, getting any movie ideas here? Zobo, that is strange. Please check your Windows Hosts file it is under C: WINDOWS System32 drivers etc It should only have these entries: —– start here —– # Copyright (c) 1993-2009 Microsoft Corp. # This is a sample HOSTS file used by Microsoft TCP/IP for Windows. # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. # The IP address and the host name should be separated by at least one # space. # Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a ‘#’ symbol. # For example: # 102.54.94.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host # localhost name resolution is handled within DNS itself. # 127.0.0.1 localhost #::1 localhost 127.0.0.1 localhost —– end here —– If you find other items below 127.0.0.1 localhost, delete it. Microsoft can change it to default. Just click this link. Updated March 14th 2017 YouTube is home of tons and tons of great videos, and a lot of them are ideal for children to watch. It has everything from cartoons to TV episodes to science videos to early learning shows. Kids can easily find videos of their favorite characters to watch. While this can be a great way to keep a child occupied while on a long car ride or in a restaurant, what happens when the video is over and they start looking for other things to watch on their own? With over 100 hours of videos uploaded to YouTube every minute, it’s likely they could watch something that’s not suitable. After all, it’s not all funny cat videos. That’s why it’s a good idea to utilize YouTube’s parental controls. It’s already built in and does a decent job at providing a first line of defense against displaying inappropriate videos. Plus, it’s free. While there’s no guarantee that it can successfully ban all inappropriate videos, it does a good job of showing videos more suitable for kids. The parental controls on YouTube are referred to as Safety Mode. Once Safety mode is activated, the site uses age-restriction settings, community flagging, and other details to help filter videos that are unsuitable for kids. YouTube’s Safety mode is also connected to Google’s SafeSearch, so when you turn on Safety mode in YouTube you’re automatically activating the SafeSearch feature in Google. Since Safety mode is a browser feature once you turn it on, it remains on when you look for YouTube videos in that browser. So even if you’re not logged into your YouTube account and are searching YouTube for videos, Safety mode will still be working. Additionally, you’ll need to manually turn on Safety mode in all the browsers you use. So if you have more than one browser on your computer, you’ll need to launch each browser, visit YouTube, login and activate Safety mode. Similarly, you’ll also to need to individually turn on the feature on the different mobile devices you may use. To help keep your kids safe when watching videos on YouTube, we’ve provided a step-by-step process to turn on YouTube parental controls on iPhones, iPads, computers, Android devices and on a mobile browser. How to Enable YouTube’s Safety Mode on Your Computer Turning on Safety mode in YouTube on your computer will help filter videos that may be inappropriate for children. As noted early, once you turn on Safety mode it will also activate SafeSearch in Google enabling even more YouTube parental controls. Launch a browser window and type in the web address bar. Click the blue Sign In button in the top right corner of the screen and follow the prompts to sign in. ![]() Once YouTube loads, scroll down to the bottom of the page and click the Safety button. Click On and then click the Save button. To lock these changes so no one can change them without your password, click “Lock safety mode on this browser.” You’ll be prompted to enter your password. Once that information is entered, the feature is locked and can only be unlocked by entering your password again. In this article I will cover a bit about how to set up Internet Explorer parental controls. To enable Internet Explorer parental controls, you will need to enable. How to set up parental controls with restrictions for iPhone or iPad. How to enable parental control restrictions on your iPhone or iPad. To use Parental Control restrictions, you need to enable them in Settings. It does involve creating a passcode to prevent anyone else, especially oh-so-clever kids, from just. Kids’ online security is a great concern for all parents. Here’s a simple look at how to enable parental control in Windows 8. Aug 18, 2017. To enable YouTube Safety Mode, follow these steps: 1. Log in to your Google or Youtube account. Go to the YouTube.com site in your web browser. Click on the Safety button near the bottom of the YouTube homepage. If you receive a message after clicking the on button that says 'You. You’ll know the parental controls are activated when you do a search. Stated at the top of the search results will be the phrase “Some results have been removed because Safety mode is enabled.” In this scenario, we used the Google Chrome browser to turn on YouTube parental controls. It’s the same steps for any browser you use once you login to YouTube with your user account. You’ll want to do this for any of the browsers on your computer that you think your kids might use to access YouTube. How to Set YouTube Parental Controls on an iPhone or iPod Touch If you tend to hand over your iPhone or iPod Touch to your kids to watch videos, you may want to enable parental controls. While there is a YouTube app for iPhones and iPod Touch devices, it doesn’t support the Safety mode feature. It does, however, have a SafeSearch option, which aids in the types of search results that will be returned. When it comes to filtering out inappropriate videos, Safety mode in YouTube is a much better option. Good news is you can still turn on Safety mode if you opt to have your kids watch YouTube using a browser. Here’s how to enable Safety mode on YouTube when using a browser window to watch videos. Launch the Safari browser and type in the web address bar. Tap the YouTube icon in the top left corner of the screen next to “Where to Watch,” and tap Sign in and follow the prompts to sign in. Once signed in, tap the YouTube icon in the top left corner and tap the setting gear wheel. Tap the “Off “text across from the Safety mode option under Settings. How to Enable YouTube App Parental Controls The only parental control available on the YouTube app is SafeSearch. Here’s how to put parental controls on the YouTube app on your iPhone or iPod Touch: 1. Launch the YouTube app and sign into your YouTube account. Tap the icon of three parallel bars in the top left corner of the screen and then tap the gear wheel icon to open Settings. In the drop down menu, tap “Don’t Filter” and when the SafeSearch Filtering setting appears tap “Strict.” How to Enable YouTube Parental Controls on iPad/iPad Mini Instead of handing over your smartphone to your child to watch a YouTube video, you may feel more comfortable having them use an iPad or an iPad Mini. At least with this device they can’t accidentally call one of your friends or coworkers. Here’s how to enable Safety mode and set parental controls on YouTube when using a mobile browser window to watch videos. Launch the Safari browser and type in the web address bar. Tap the YouTube icon in the top left corner of the screen and tap Sign in and follow the prompts to sign in. Once signed in, tap the YouTube icon in the top left corner and tap the setting gear wheel. Tap the “Off” text across from the Safety mode option under Settings. Set Up Parental Controls in YouTube App for iPad/iPad Mini The YouTube app available for the iPad and iPad Mini doesn’t support the Safety mode feature. Instead, you can activate the SafeSearch feature, which isn’t as robust as Safety mode. It does offer some filtering when it comes to searching videos on YouTube. Here’s how to enable YouTube parental controls on an iPad or iPad Mini if you’ve downloaded the YouTube mobile app: 1. Launch the YouTube app and sign into your YouTube account. Tap the icon of three parallel bars in the top left corner of the screen and then tap the gear wheel icon to open Settings. In the drop down menu, tap “Don’t Filter” and when the SafeSearch Filtering setting appears tap “Strict.” How to Set Parental Controls for Android YouTube App Whether you use an Android smartphone or Android tablet, the steps are the same for each device to activate parental controls on YouTube. However, the Safety mode YouTube parental controls are only available in the browser. Android devices come with the YouTube app already installed on the phone. As is the case with the iOS YouTube app, in the Android YouTube app you can only turn on SafeSearch, which isn’t as powerful as Safety mode at hiding inappropriate content. Here’s how to activate parental controls in the YouTube mobile app on Android devices: 1. Launch the Android YouTube app and tap the YouTube icon in the top left corner of the screen and tap Sign in. Then follow the prompts to enter your YouTube account information. Tap the three vertical dots in the top right corner of the screen and tap Settings. Tap SafeSearch filtering and tap “Strict.” How to Activate Safety Mode Parental Controls in Android Using a Browser If you prefer to have your children watch YouTube with the Safety mode feature enabled, then you’ll want to have them view YouTube videos using a mobile browser on your Android device. When using the browser in Android, many models offer an option for opening YouTube in “Desktop View.” This is essentially the same as viewing YouTube in a browser window on your computer. If this is how you’ll watch YouTube videos on your phone, then you’ll need to sign into your YouTube account, scroll to the bottom of the page and click Safety at the bottom of the page to turn it on. The default is usually to launch the mobile YouTube site. This is how you turn on Safety mode on Android smartphones and tablets when viewing YouTube in a mobile web browser. Launch a browser window and type in the web address bar. Tap the YouTube icon in the top left corner of the screen and tap Sign in and follow the prompts to sign in. Once signed in, tap the YouTube icon in the top left corner and tap the setting gear wheel. Tap the “Off” text across from the Safety mode option under Settings. Setting Up YouTube Parental Controls Offers Peace of Mind It just takes a few steps to enable privacy controls on YouTube. The key is to make sure that all the places your child might access YouTube has this feature enabled. Although, the mobile apps only enable SafeSearch, it does help eliminate some inappropriate content from search results. If you desire even more security, you can always install parental control software on your computer and devices. However, the steps discussed here are an easy first step to setting up parental controls on YouTube so you can feel more comfortable letting your children watch YouTube. Watch Your Videos Anywhere. Joni Blecher, RealPlayer Blog Editor - Joni started covering technology back when cell phones didn't have color displays and quickly made a name for herself in the mobile industry as CNET's 'Cell Phone Diva.' In addition to covering everything mobile, she has launched and edited multiple blog sites. When Joni started appearing in product review videos, she fell in love with the story-telling format and honed her video skills to include producing and editing videos. Joni has made appearances on CNN, BBC, CNBC's Bulls Eye, and Good Day New York to discuss the latest in technology. When she's not spending her time writing or shooting video you can find her exploring and tasting the latest food trends. Follow her on Twitter. Overview of Parental Controls Changes for Windows 8 The purpose of this document is to give an overview of the changes to the Windows Parental Controls in Windows 8 and to enable third-party parental control solution providers to take advantage of these changes. This document assumes readers' familiarity with Parental Controls for Windows 7 and Windows Vista and will only reflect changes made to this functionality in Windows 8 that are relevant for third-party parental control solutions development. Key Design Decisions for Windows 8 Parental Control/Family Safety Changes Changes to Parental Controls introduced in Windows 8 continue the overarching goal of introducing feature enhancements and at the same time promoting third-party parental control solutions' coexistence with the in-box functionality. The changes are: • Use of Microsoft Family Safety to provide remote management and remote activity monitoring. • Integration of web filtering as part of in-box Microsoft restrictions and ability to view activity reports on a Windows 8 computer. • The Parental Controls feature in the Control Panel was renamed to Family Safety and will be referred to as such throughout this document. • The in-box time restrictions were enhanced by providing ability to control total amount of time per day computer can be used (time allowance) in addition to ability to control times when computer can be used (curfew.) Curfew was available in previous versions of Windows. • Windows 8 Family Safety functionality can be turned on during standard account creation flow. • Windows Vista and Windows 7 Parental Controls extensibility features are continued to be supported by Windows 8 Family Safety including ability by third-party solutions to replace web content filter or to replace in-box configuration UI while still relying on in-box implementation of Time, Application, Game Restrictions and Web Content Filter. • Third-party provider activation turns off remote management and reporting of Windows 8 Family Safety controls through Family Safety website. • The third-party extensibility for Family Safety is supported for Windows 8 desktop applications only. Family Safety and standard account creation in Windows 8 As part of standard account creation in Windows 8, an administrator has ability to turn on monitoring of the account by Family Safety. The following is a list of the functionality and third-party provider ability to control it: • On the last screen of Windows 8 standard account creation flow, an administrator is presented with a checkbox to turn on Family Safety for the newly created account. • If this checkbox is checked, Family Safety is turned on for the account with the following settings: • Activity Reporting on • All restrictions are off • If the administrator used a Microsoft account to logon to Windows, the Windows 8 computer will be configured for remote management of family safety settings and email activity reports. The Family Safety website can be then used to manage such a computer remotely. • If the third-party provider wishes for the checkbox to be present in a standard account creation flow the following value should be present among the provider’s registration values. For more information on provider registration details, see the section on the What's New in Windows 7 Parental Controls topic. Term Description AddUserVisible An optional DWORD nonzero value that specifies that the checkbox option to turn on Family Safety monitoring for a newly created account should be visible during standard account creation in Windows 8 after the provider is selected as the current Family Safety provider. • Since third-party providers are designed to replace in-box configuration UI for Family Safety controls, by default, installation and activation of a third-party provider will result in the checkbox option to turn on Family Safety during standard account creation not to be shown. Family Safety Top-level User Interface Changes in Windows 8 Windows 8 brings the following changes to the Parental Controls Control Panel top-level user interface: • When in-box Family Safety controls are turned on for at least one standard account on a Windows 8 computer, “Manage settings on Family Safety website” command link is shown that allows an admin to establish remote management of Windows 8 computer Family Safety settings through Family Safety website. • When a Windows 8 computer is configured for remote management through Family Safety website, the More Information control allows an admin to disable remote management of a Windows 8 computer through the Family Safety website. • The Controls section is visible only when at least one third-party provider is registered with Family Safety. The UI and functionality of this section is identical to the Additional Controls section in Windows 7 Parental Controls. For more information, see the Parental Controls top-level User interface changes section of the topic. • When a third-party provider is installed and selected as the current provider, remote management of Windows 8 computer Family Safety settings through the Family Safety website is disabled. Family Safety In-Box Restrictions Changes in Windows 8 Windows 8 brings the following changes to the Family Safety in-box restrictions: Web Restrictions • Implementation has changed from a Layered Service Provider (LSP) filter to a Windows Filtering Platform (WFP) driver communicating with the Family Safety monitoring process running in the users’ sessions. Time Limits • The in-box time restrictions were enhanced by providing ability to control total amount of time per day computer can be used (time allowance) in addition to ability to control times when computer can be used (curfew) which was available in previous versions of Windows. • UI for curfew allows independent control for each day of the week with half-hour granularity. • UI for time allowance allows controls for weekdays / weekends or independent control for each day of the week with 15 minute granularity. • Fast User Switch (FUS) mechanism is no longer used to forcibly lock out or block login of the controlled user when in blocked time period. A switch to a separate desktop is used for these purposes. • Disconnect warning events are no longer available for applications to subscribe to. Family Safety API Changes in Windows 8 APIs used for Family Safety expose the policy and in-box restrictions settings, and logging functionality. Logging • Custom events are no longer supported in the Family Safety activity reports viewer. WMI API Settings Write/Read • WpcUserSettings - Previously, timer restrictions supported 1 hour granularity. In Windows 8 the existing property represents the first half-hour for each hour. A new half-hour property has been added to represent the second half of each hour. Additional new property was introduced to represent daily time allowance. Web Content Filter Allow/Block List Export/Import A Format • Web content filter Allow/Block list Export functionality is no longer supported. Family Settings WMI Provider Schema • The following additions were made to the WpcUserSettings class to reflect time restrictions enhancements: • [write: ToInstance ToSubClass, Description('Logon Half-Hours (30 minute offset) mask for this user'): ToInstance ToSubClass, read: ToInstance ToSubClass] uint32 LogonHalfHours[7]; • [write: ToInstance ToSubClass, Description('Daily minute allowance'): ToInstance ToSubClass, read: ToInstance ToSubClass] uint32 AllowanceMinutes[7]. ![]() ![]() Activate Windows 10 From Command Line activate windows 10 from command lineMicrosoft Windows XP can be activated from the command line. Expert John Savill gives you specific instructions to activate XP manually.To Launch Command Prompt as Administrator: 1. Click the Windows 10 Start Menu (hitting the Windows key on the keyboard if not already there). Type cmd on the.Windows 10 Activation Command Line trapcode 131 windows torrent xp pro 64 ie8 vegas pro 13 trial downloadupdating to windows 10 stuck on checking for updates office 2008 mac full download chrome download 32-bit windows xpJul 13, 2011 Command line to Windows Activation in Win7. Activate using Key Management Service. Command prompt. Computer running Windows 7 or Windows Server 2008 R2. To verify that KMS volume activation. View Licensing Status and Activation ID of your Windows. Slmgr.vbs is a command line. Because of WMI changes in Windows 7 and Windows Server 2008 R2. How to Use Slmgr to Change, Remove, or Extend Your Windows License. This command line tool is included with Windows. This command “resets the activation. When i try to active from command line. This error appear (Activating Windows Server(R), ServerEnterprise edition (620e2b3d-09e7-42fd-802a-17a13652fe7a). Error: 0xC004F074 The Software Licensing Service reported that the computer could not be activated. The Key Management Service (KMS) is. Using MAK Activation. Windows 7 and Windows Server 2008 R2 are installed. Type slmgr.vbs /dli at a command prompt to view the activation status of a. ![]() ![]() It pop up on the first logon through the unattend.xml but I need to know the command line Here’s a workaround how to activate Windows 10 without using any cracks, hacks or third party software. Frequently as an AutoCAD user I get asked “Are there any cheap AutoCAD Alternatives?” while on the inside my immediate answer is NO!!! Though I know that’s only because I’ve always used autodesk, I don’t go through a day without using one of their products and honestly I haven’t found anything better. At the same time I can fully understand that the price of a full autoCAD product runs into the thousands and thousands of dollars and most freelance or just home users will never need all the features included in the latest AutoCAD release. So it is because of this that I write this post, when asked this question I ask a few simple questions. Update: since this post is a few years old now and a bit out of date, I have updated the links below to the most recent versions of each software. Though in light of Autodesks switch to a monthly/yearly subscriptions, AutoCAD Lt has really become much more affordable for small firms and independant drafters. Check out the options to see if a subscription might work better for you. How much would you like to spend? And do you plan to work with or on projects that are completely AutoCAD Based? If your answer is yes it will be difficult to find an alternative that will be 100% compatible for you. My first recommendation in this case is ) With this Light version of autoCAD you get the Full featured AutoCAD software toned back for home and personal use for a fraction of the full cost! In all honesty this is the best CAD software for the budget minded user. It is currently much cheaper than AutoCAD for only. But this may simply be too much money, or overkill for someone who just wants to draw up their bedroom, or new deck plans. For this group I then suggest either on amazon or on amazon. Both of these are excellent cheap CAD software packages that offer an alternative to AutoCAD at a discount. Each CAD program provides some autocad file compatibility for.dwg,.dxf,.ctb,.stb etc. As well as other common drawing and design file types. Both programs also have tutorials and help available while staying low in price and very affordable for an autoCAD alternative. I’ve outlined in the table below some of the features for each package along with the msrp and the best deal I found on amazon. Best AutoCAD alternatives best AutoCAD alternatives cheap best AutoCAD alternatives As always if you have any questions or a suggestion for an AutoCAD alternative you use please let me know below! Cheers, Brandon. Brandon is a Civil Designer, aspiring blogger and tech aficionado from a small town in Canada. He has been obsessed with design and technology since diapers (coincidentally, his amazing wife recently gave birth to their first son, Emmett, and diapers are now a majority of their free time) and working as a Civil Designer for nearly as long. Brandon’s blog and Youtube channel, CADIntentions.com has been his outlet and loving excuse for keeping up with new tech and trends in the CAD design world for the last five years growing to over 3 million views and being the source of many great friendships and opportunities. I build lots of VPC’s for demos, labs, prototypes, etc. With the various flavors of Windows out there, I find it hard to find the Windows Activation icon to verify activation. I found a new tip today to fire Windows Activation from the command line. This technique works on Windows XP and Windows Server 2003, but does not work on Windows Vista or Windows Server 2008. No more searching to find the Windows Activation icon! • Click Start > Run • Type “oobe/msoobe /a” • This command triggers the “Out Of Box Experience” activation application, which opens the Windows activation screen. • If Windows is already activated, it will tell you so, otherwise, you can continue to activate Windows. Thanks to for this useful tip! For more info, see. It’s easy to activate and use your card. There are 3 ways to activate your debit card. • You can activate it, or from your Wells Fargo Mobile ® app. • Call 1-877-294-6933 from your home or mobile phone. • You can activate the card by using it with your Personal Identification Number (PIN) at any Wells Fargo ATM. (If you don’t already have a PIN, it will be mailed to you separately from your card.) 2. Sign your card and destroy any temporary cards. • Be sure to sign the back of your card immediately. • If you received a temporary debit card when you opened your account, please destroy it as soon as you activate your permanent debit card. Use your debit card as a safer, convenient way to access your money. • Make purchases and pay bills worldwide at participating retailers and service providers ― including online or by phone. • Use your card to get cash, make deposits, and more at 13,000 Wells Fargo ATMs. Frequently asked questions. If you have misplaced your card and need time to find it, you can temporarily turn your card off to help prevent unauthorized card transactions. When you find it, you can easily turn your card back on. ![]() To Wells Fargo Online or log into your Wells Fargo Mobile ® app to access Turn Card On or Off. You can also call us at 1-800-TO-WELLS ( 1-800-869-3557) for personal debit or prepaid cards. If you think your card has been lost or stolen, you can order a replacement card, from your Wells Fargo Mobile app or by calling us. For personal cards call 1-800-869-3557. There are several things that you can do to protect yourself when using your debit card. • Be cautious. When you use your debit card at any sales counter or ATM, be aware when people are near or behind you. To keep others from seeing your PIN, you can use your hand or body to shield their view of the keypad. • Sign up for alerts. Our help you stay informed about unusual activity on your debit card. You can set up alerts to notify you when your card: • Is used for an online, phone, or mail order purchase • Is used in an international location • Exceeds the purchase amount that you set • Exceeds the daily ATM withdrawal amount that you set • Monitor your account regularly. With Wells Fargo Online ® you can securely access your accounts and keep track of your transactions and balances at any time. You can do this via your computer, tablet, or mobile device. You don’t need a smartphone; we offer a text banking option that works with older mobile devices as well. • Register your debit card. You can get added protection ― at no additional cost ― when you shop online. Just register your Wells Fargo Visa ® Debit Card with. • Learn more about protecting your identity and funds. Start by reviewing these helpful. If you suspect any fraudulent activity on your debit card, call us immediately at 1-800-869-3557. ![]() Credit card activation, whether you do it via phone or online, is an important anti-fraud measure that your credit card issuer uses to make sure that your card got to the right place. The bottom line: Most card issuers won't let your credit card be used to make purchases until after the card is activated. Consider it a best practice. Invincibility Enable Cheat mode, then press tilde [~] and enter '/god' at the console window. Select level Enable Cheat mode. Then press [~] and enter '/map name ' at the console window, where name is one of the map names below. Maps: Training Ofboot1 Ofboot2 Ofboot3 Ofboot4 Regular game Generally, single player maps have the following form: ofaletter A few valid map map names are, 'of0a0', 'of1a4b' and 'of6a4'. Cheat mode Load the game using this command line: hl.exe -dev -console -game gearbox or SierraHalf-Lifehl.exe -console +sv_cheats 1 -game gearbox Press the tilde key [~] to activate cheat mode. ![]() All weapons and ammo Enable Cheat mode. Then press [~] and enter 'impulse 101' at the console window. Disable clipping and flight modes Enable Cheat mode. Then press [~] and enter '/noclip' at the console window. Create item Enable Cheat mode. Then press [~] and enter 'give item ' at the console window, where item is the object you wish to create. Example: Give weapon_knife Object list Ammunition Ammo_556 Ammo_772 Weapons Weapon_displacer Weapon_grapple Weapon_knife Weapon_pipewrench Weapon_eagle Weapon_M249 Weapon_Shockrifle Weapon_Sniperrifle Weapon_SporeLauncher. ![]() ![]() Nov 20, 1998 Half-Life: Opposing Force Cheats For PC. To activate the cheat mode The cheat mode in Opposing Force is activated in a similar way to that in the original Half-Life. In order to activate it you must edit the shortcut you use to access the game so that it reads: -console turns on the console. I seem to remember reading somewhere that the QuickLaunch collection only stored customisations to the default ordering. Looking around, I can't find that documentation to show you, but it would explain the behavior you see if true. So your QuickLaunch.Count == 0 is just confirming that default ordering of items is in place. You can still add nodes, if that's at all helpful; SPNavigationNodeCollection nodes = web.Navigation.QuickLaunch; SPNavigationNode node = new SPNavigationNode('Node Name', 'Node URL', true); nodes.AddAsFirst(node); – Aug 11 '15 at 12:14. ![]() ![]() One of my favorite features of the taskbar is the Quick Launch toolbar. This small yet useful toolbar was located near the Start button in previous Windows versions. Feb 23, 2017. To add the Quick Launch bar back to the Taskbar, right-click on an open area of the Taskbar, and go to Toolbars > New Toolbar. Copy and paste the following path into the box at the top of the On the New Toolbar – Choose a folder dialog box and press Enter. Oct 16, 2009 The following steps will allow you to enable the Quick Launch toolbar in Windows 7: Right-click the taskbar, point to Toolbars, and then click New Toolbar. Nov 01, 2010 Quick Launch is a menu of links that can appear on the left side of each page in a website. When it is displayed, it can help users navigate to important. Aug 11, 2014. Since this post was written back in 2007, newer versions of Windows have hidden the quick launch toolbar. Windows XP and Windows Vista have it enabled by default, but Windows 7 and Windows 8 have the quick launch toolbar turned off by default. I'll show you how to enable the toolbar in the two newer. ![]() ![]() Rhythmbox has a pretty neat feature inbuilt into it. It has plugins for and. These sites offer free legal downloads of music from independent artists. And trust me, some of the music is breathtaking! So how do you activate Jamendo and Magnatune on your Rhythmbox? Go to Edit and then Plugins option on your Rhythmbox. ![]() Then simply activate Jamendo and Magnatune: Thats it. Now simply click on the Jamendo and Magnatune options on the side panel of your Rhythmbox and the playlists will start loading. Simply double click on the track to listen to it. And right click on it to download the track/album, get artist info, donate etc. Jamendo loading: Songs playing from the Jamendo playlist. ![]() ☩ Walking in Light with Christ – Faith, Computing. Already a plugin that embeds the Jamendo and Magnatune. With Christ – Faith, Computing, Diary 2006. Package: totem-plugins Version: 3.14.0-2 Severity: normal Dear Maintainer, while browsing the jamendo website, it occured to me that totem might have a plugin to. In order to keep your browsing experience fast, reliable, and secure Firefox will not activate plugins by default. Instead, Firefox lets you choose whether or not to. Last.fm Plugins. Classic editor History Comments (1) Share. Last.fm Plugin Edit. When you first enable it, it will prompt you to log in. ![]() Welcome to the unofficial community for discussing all-things. This subreddit is not affiliated with or monitored by Verizon Wireless or Verizon Communications. Many verified employees of Verizon Wireless and Verizon Wireless Premium and Authorized Retailers are active here. Verified employees have a flair next to their username. ![]() Feb 2, 2011 - 2 min - Uploaded by hakuRecluseDownload link: INSTRUCTION: 1. Download file 2. Jan 24, 2014 - 1 min - Uploaded by InfinityPlusOneIs your interweb site now ruined because of the pesky 30-day trial? Don't worry because you. Rules • Please be respectful & don't be a dick. Being intentionally rude, condescending, or insulting will not be tolerated. Failure to comply with this rule will result in a ban without warning! ![]() • Please follow the. • Posts should be primarily about Verizon and their subsidiaries (Yahoo! Posts relating to a field of Verizon are also welcomed, but should be kept to a minimum. • Don't post any personal information, including your own. ![]() Similarly, do not send personal information by private message to anyone, even verified Verizon employees. • Before you post, to see if your question has already been answered. ![]() Many common questions are also answered in the, or linked directly from the sidebar. • Don't downvote a post or comment because you dislike it. Downvotes are only for when a post or comment is off-topic or not contributing to a on topic discussion. • Discussion about or encouraging use of illegal services on the Verizon network is not allowed. Post will be deleted. • Violating the Rules for the first time will incur a warning from the moderators. After your second offense, you will be temporarily banned. After your third offense, you will be permanently banned. If you have any questions regarding the Rules, please. Helpful Links Questions about Equipment Installment Plan (formerly ). If your new to Verizon & want to know how much your bill will be? You can use the,. Previous grandfathered unlimited data users can now upgrade to Verizon New Unlimited Data plans & save money. To be verified as an employee of Verizon Wireless or of a Premium or Authorized Retailer, with proof of employment. Verification is voluntary.: Verizon has an established Executive Support team on DSLR, for Wireline support. See for assistance. Also, visit,, and, for general discussion. Verizon Wireless Contact • Phone: (800) 922-0204 or *611 from any Verizon Phone • • • Social Media: & Coverage Maps • • • • LTE Band Information • Device Subreddits • • • •. Interesting discussion. I had an alltel blackberry, and I believed the reason I was told they took that off the network is because they were sunsetting whatever part of the network they had acquired with the buyout. I thought it was alltel related, but it could also have been blackberry backend service related. [It's not bis or ris, can't remember what it was called.] But now I'm curious if it was e911 related. Phone had gps, but I'm not sure if it was 100%, actual gps, or just almost-gps. Verizon decided to shutoff the equipment that was running the data for the old alltel phones I got a letter a few years back informing me that I had to switch to a verizon phone or my data and mms would stop working and my data plan would be removed. The phone would still work though. From my understanding they just shut off alltel's WAP and MMS gateway addresses instead of just redirecting them to verizon servers. The sad part is using the programming menu on my phone I could change both of those settings but since verizon would no longer allow me to have a data connection it was a bit of a moot point. I can still afaik activate it with page plus and have MMS and WAP working again. The e911 deal goes back to the analog/digital transition some analog/digital phones had gps. Pretty much all of the digital only ones were e911 compliant so that's unrelated. My grandmother had a Motorola talkabout on verizon until 2015 it was a analog/digital phone it didn't have a GPS and did not support sending text messages it could however get a signal in areas no other phone could. Her sister got her moved to an iPhone which she refuses to use due to verizon having problems with call routing to the talkabout. Sometimes calls would not route to the phone it never had any problems calling out but we could often only call her phone from my cellphone the other 3 lines on our account wouldn't get through they would just get lost in the system it would just ring and ring and ring but not actually make her phone ring. I'm still absolutely sure it was something screwed up on Verizon's end not something wrong with the phone itself but they didn't have the time to get a hold of someone at verizon capable of fixing it. As for GPS on most of the early e911 phones the GPS was completly inaccessible for anything other than e911. Yeah we're going to make you pay for a GPS chip but were not going to let you have any use of it unless its an emergency. It would have been really nice if they had just included the current gps coordinates in field test mode or something but no. Purchased MS Office Student & Teacher Edition 2003 way back when and loaded it onto my PC -- only because for those occasions when needing to access a Word doc (I use WordPerfect) received from someone; have used PowerPoint a couple of times, but that's the extent of it. Just upgraded my hard drive and reloaded everything; now Microsoft in its infinite wisdom presents me with: =================== Microsoft Office 2003 Activation Wizard Microsoft Office Standard Edition 2003 Thank you for installing Microsoft Office Standard Edition 2003. You must activate your installation to fully enable all of the features. The wizard will guide you through the activation process. How do you want to activate your copy of the software? I want to activate the software over the Internet (Recommended) I want to activate the software by telephone If you choose not to activate at this time, you may run the software 48 more times before many of the features become unavailable. Click Helpfor more information. ================ FOLLOWED BY: ================ Microsoft Office 2003 Activation Wizard Microsoft Office Standard Edition 2003 Your installation cannot be activated because you have activated up to the limit for your Product Key. For details about the maximum allowed number of product activations, close the wizard and review the End User License Agreement, available via the Help menu of the application. If you believe that you are getting this message in error, click Back and choose the telephone option. The telephone activation system will provide you the opportunity to speak with a support representative about all activation issues. ================ SO I GO TO THE ALTERNATIVE: ================ Microsoft Office 2003 Activation Wizard Microsoft Office Standard Edition 2003 Thank you for installing Microsoft Office Standard Edition 2003. You must activate your installation to fully enable all of the features. The wizard will guide you through the activation process. How do you want to activate your copy of the software? I want to activate the software over the Internet (Recommended) I want to activate the software by telephone ================ FOLLOWED BY: ================ Microsoft Office 2003 Activation Wizard Microsoft Office Standard Edition 2003 Follow these steps to activate your software over the telephone. Step 1: Select the country/region you are calling from and call the Product Activation Center using any of the telephone numbers provided United States Telephone activation is no longer supported for this product. Step 2: When prompted, provide this Installation ID: 055-890-100-890-291376 Step 3: Enter your Confirmation ID here: A B C D E F G ===================== Sooooo. What I have here is: 1. I purchase a bonafide copy of MS Office way back when 2. I initially load it on my PC and have a successful activation with MS 3. I use it rarely 4. I get a new hard drive 5. I reload MS Office 6. I'm presented with the option to activate by Internet, resulting in my being informed that 'installation cannot be activated because [i] have activated up to the limit for [my] Product Key.' Next, I attempt to activate by telephone, resulting in being informed that 'Telephone activation is no longer supported for this product.' So, I've helped Mr. Gates maintain his billionaire lifestyle while he has decided that since I'm unwilling to continually purchase the Next Newest Greatest Microsoft Thing I'm going to be prohibited from the full and free use of my duly-purchased product. This has all the brilliance of Chevrolet selling me a car in 2003, then because I won't purchase a new Chevy every other year being informed that I have only 48 more trips available and then my 2003 car will be useless. QUESTION: Is there some way to bypass this now-useless activation business so I can have full use of what I have purchased? Hi there, I too have the same problem trying to install Office 2003 on a Laptop running Win10. I get the option to activate over the Internet, am then told this option is no longer supported and I should acivate by phone. I click on this option to be told that this option is no longer supported. I contacted Microsoft by way of 'Microsoft Answer Tech', spent an hour explaing the problem, got the impression I was the first to have this problem and nobody knew how to resolve it. The person dealing with me said she had passed it up to her managers and they would contact me shortly with their response. Needless to say I am still waiting and have resorted to you good people to help me out. I am in the UK and the toll free number given in this post does not work. Any help would be greatly appreciated. Thanks Paul, I rang the UK activation line 4, and after a few automated failures I managed to speak to a real live person. This woman was able to sort out the problem in less than 5 minutes and gave me an activation code which works well enough on Windows 10. There is an error code when running updates, but I can live with that. I just don't understand how Microsoft can try to block you installing software which you bought and paid for. Its fine that they no longer support it but don't block users from reloading the software. Thanks again Paul, problem solved. Paul, I have to disagree with you because Microsoft don't allow you to activate over the internet because they no longer support the software. They tell you to activate over the phone but don't give a phone number to do this because they don't support the software any longer. I have to go onto a forum such as this to get the relevant phone number. Maybe I used the wrong wording when I said they were blocking, but they definately are not exactly bending over backwards to be helpfull. As far as exceeding the number of CPUs on which your licence allows you to run the software goes, I have only ever ran it on two. The reason someone might need to install on another computer other than the original can be because you are upgrading, replacing a computer or many other reasons. Never once have I been asked the reason for re-installing. Isn't compatible with Windows 10 This is only partly true. Office 2003 runs fine with Windows 10. The only issues I saw was with Powerpoint. If you click on shapes they will slightly move. This is especially bad if you hold CTRL and click because then your shapes will duplicate. I am actually running 2003 on a VM because it is a great version for what I use it for. Other than that Excel, Word, Outlook, Access and everything else was fine. You can also run applications in compatibility mode if needed but Office 2003 didn't need that. SMS Authenticator, along with your ' and is a great way to add extra security to your account. This is why we recommend adding it as a part of your. To activate your SMS settings, please follow these steps: • to your Dynadot account. • Select 'Account Lock' from the 'My Info' drop-down menu. • your account. • Under the 'SMS Authentication' column, enter in your cellphone number (country code in the first box, full phone number in the second box). • Click on the 'Set SMS Phone Number' button. • Next, click on the 'Send SMS Token' button. A 6-digit code will be sent to your cellphone number to ensure you have access to the cellphone number you entered. This test code will expire 1 hour after it is sent. ![]() • Enter in the SMS test code in the 'Enter Token' box. • Click on the 'Enable SMS' button to save your changes. If the correct test code is entered, your SMS settings will be saved for your account. NOTE: Activating your SMS settings requires us to send at least 1 text message to your cellphone. Thus, carrier fees may apply when activating your SMS settings. Dear Sir, I am having a prepaid mobile connection with No. (Plan Name is 3 Star). My main account balance is shown as Rs.78.13 to-day morning. However, I received a message around 11.30 AM stating that an amount of Rs.30 has been deducted from my prepaid balance and the main account balance shown as Rs.48.13. Again another message also received stating that 'News - BSNL Alerts service is activated. You will be charged Rs.30 for 30 days. To deactivate *456*32#'.In this connection I would like to state that I have not asked for any News Alert service, even then my account has been debited. I request you to kindly credit the amount of Rs.30/= (already debited to day) to my Mobile No. Main Account. Kindly confirm deactivation with immedite effect. Thanking you, Sir, R.Raghavasubramanian, Mobile No., e-mail ID [email protected]. Dear Sir, After complain to customer service on, I did not get my money back Rs50/- so far. This was deducted from a/c balance without my knowledge in two month i.e. And respectively. Firstly I saw one message from service reply when I put on my mobile on. The message was 'your last call cost is Rs.25/- for activation for WORD BSNL POWER. Your a/c balance is. And got a sms from 51234025 that 'WORD BSNL POWER Alerts is active.Rs.25 per month.Dial *456*89#, if you wish to dct @' Immediately I called customer care and got a case no C25WB354807 dated. Activating Windows by SMS Mini Spy. First and foremost, it has been a long time since I have had to activate a Windows box through the prompts/telephone system. See what Aima Shahzadi (aimashahzadi) has discovered on Pinterest, the world's biggest collection of everyone's favourite things. ![]() I said without my concern how you deducted Rs.25/- from my a/c. It should be credited as early as possible. I didn't activate any service. ![]() ![]() Customer service forwarded the above case no. After few days i.e on again I call customer care for the above case and ask when I will get my Rs.25/- but they said it is already noted but we can’t say when it can solve. The very next day again I got same message from service reply after putting my mobil on 'your last call cost is Rs.25/- for activation for WORD BSNL POWER. You’re a/c balance is.” And another same sms came from 51234025 that 'WORD BSNL POWER Alerts is active.Rs.25 per month.Dial *456*89#, if you wish to dct @'. So I was surprised from BSNL Service. Same day I call customer care that yesterday I complain and today again you deducted another Rs.25/- for the same why? ![]() I told them if you can not solve I have to complain Consumer Forum and discontinue my family’s all BSNL numbers. On I call customer care and ask about my cases. When I will get my money back? They didn’t reply. If you can’t solve now, next month again same amount will debit. Again I received another case no D27WB517295. If BSNL Service provider can not solve immediately, day to day they will receive lots of complains ultimately they will lose their customer. Instead of one create lots. So I request kindly look into this matter & solve immediately. Santosh kumar Paul, Mobile no. Shibram Sarani,Lake Town Bhaktinagar. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2018
Categories |