Copy, paste to notepad, save as nonags.bat (make sure you select all files as file type) then run as administrator from rightclick. see what happens in 30 days. This is purely theoretical and for educational purposes only
hi, i installed windows 7 ultimate in vmware, then run the nonags.bat, then go to the bios ans set the date to the year 2020 and restartet the computer. now i got following screen.
Screw you Brandon Updates don't work any further than a few months because of time/date difference from MS servers (security feature). Run it in current time and it will be fine. For killing the watermark, apply a watermark remover, although this may have appeared because you did not run the patch as admin
Ok, then Hazar got really owned. *just joking* What about your other script, that deletes all activation files?
I already explained updates will not work in the future The date needs to match the MS server date. As a result the system assumes it is not genuine and watermarks the desktop. When it actually is that date it will be fine
Nice one Hazar, good find. BTW: Since when is a modified GRUB loader, used to emulate SLIC, questionable? It is one of the most proven methods of Windows Vista (and now 7) activation, right up there, after BIOS mods... People have devoted much time toward getting GRUB to work well on mostly all systems (ex: zsmin's great grldr project). How is this technology 'questionable' in any way...? Firing rockets to the moon is questionable. Eating food you forgot was in the refrigerator for 3 weeks is questionable. Doing something that has a low chance of doing the thing that you intend it to is 'questionable'. There are many things that are questionable...grub is not one of them. It is a proven method that works for most users, and has been in use for years...
I'm going to add some icacls commands to prevent SLUI from prompting an error in some cases, rasing it to 6 commands gonna add these three: icacls %SYSPATH%\SLUI.exe /deny *s-1-5-18:F icacls %SYSPATH%\SLUI.exe /deny *s-1-5-20:F icacls %SYSPATH%\SLUI.exe /deny %USERNAME%:F That stops SYSTEM, CURRENT USER and NETWORK SERVICE from accessing SLUI. Thx to Mr Jinje for telling me about the SIDS ids and not relying on english groups.