Wow, it's like you have never written a batch file before. Did you know... 1) "cd \foo\bar" is the same as "cd \", "cd foo", and "cd bar"? 2) "move /y foo bar" is the same as "del bar" and "ren foo bar" 3) You don't have to be inside the source directory when copying a file? 4) "." is shorthand for the current directory? 5) Once you are already in the C: drive, additional "C:" commands are useless? 6) Instead of hard-coding your username, you can use %USERNAME%? Here, I fixed your first batch file for you: Code: set BACKUP_ROOT=d:\rearm7\backups NET STOP sppsvc c: cd \windows\serviceprofiles\networkservice\appdata\roaming\microsoft\softwareprotectionplatform takeown /f tokens.dat move /y tokens.dat tokens.dat.old copy %BACKUP_ROOT%\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\softwareprotectionplatform\tokens.dat . cd \windows\system32\spp\tokens\pkeyconfig takeown /f pkeyconfig.xrm-ms move /y pkeyconfig.xrm-ms pkeyconfig.xrm-ms.old copy %BACKUP_ROOT%\windows\system32\spp\tokens\pkeyconfig\pkeyconfig.xrm-ms . cd \windows\syswow64\spp\tokens\pkeyconfig takeown /f pkeyconfig.xrm-ms move /y pkeyconfig.xrm-ms pkeyconfig.xrm-ms.old copy %BACKUP_ROOT%\windows\syswow64\spp\tokens\pkeyconfig\pkeyconfig.xrm-ms . cd \windows\system32 ICACLS 7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 /setowner %USERNAME% /t /c /l /q ICACLS 7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 /setowner %USERNAME% /t /c /l /q ATTRIB -H 7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 ATTRIB -H 7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 move /y 7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0.old move /y 7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0.old copy %BACKUP_ROOT%\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 . copy %BACKUP_ROOT%\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 . @pause
Dude...bios mod with SLIC 2.1 + install correct certificate with appropriate SLP key = windows 7 activated via OEM SLP1
lol...What person here doesn't know that But not everyone can mod their BIOS nor want's to and that's why we have software's solutions here at MDL like Daz, IR4, KMS and Modification's like HAL
True I guess, but 16 modded BIOS to date and no issue. (Issue I had was my own fault..preactivated DVD which I soon got rid of for a clean untouched)
Yea but this is not a competition between solutions. At MDL we appreciate all solutions from HW to SW and I just was correcting the OP about his method since IR4 is already done hence the win 7 rearm solution is finished in a non-modified way For like 8 months now
My rearm concept takes like less than 10 minutes to install per year with same usage and appearance as activated plus never will deactivate I still think your not getting it. At MDL it's not a competition and for people who can't mod their BIOS nor want to take the risk we have alternatives already mentioned otherwise with your philosophy people with no slic 2.1 are out of luck and so there are SW solutions Think of the bigger picture with beginners involved and I think you'll understand
I believe the source of the rearm concept started and ended here at MDL. Any other sites got it from here as usual!
I have to say TS is correct, most of all the other sites leach from here and post it as if they came up with it. Although some sites do give credit back to MDL but so far it's been rare to see it.