lol ok the way i did it at first was take token restore on an activated pc make a backup do the steps. restore the token restore back ups 100% activated + 4 rearms just in care
or reactivate your copy with a valid key. or what i did was take my tokenrestore program and backup the activation data then restore it after i was done. if you really wanted you could install a loader just to do it then uninstall the loader. lol
You can create a scheduled task to rearm Windows every 30 days using a bat file. When you get back 4 rearms, you get a total of 150 days. So in theory, you only have to reset the rearm back to 4 just once every 150 days.
Of course being able to activate against a legitimate key (or loader or KMS) mostly defeats the point of being able to perpetually rearm.
This run from Win7 DVD (or possibly a dual boot Windows session), followed by a restart, and a "slmgr /ipk {defaultKey}" seems like the simplest most failsafe way to reset rearms regardless of whether it's a fresh install, or has at some point been activated via retail key, kms, SLP, whatever.
did anyone tried that? did it work? also would it work on any windows7? i'm running enterprise in regards to #3 i don't even have files with that extension there is nothing that match C:\WINDOWS\system32\*.c7*
How do windows updates change these things? That also happens automatically and updates can change this kind of keys. If the key can be deleted at the same moment in the bootprocess where you normally see "configuring updates xx%" then there's no need for patched winlogon.exe or manually doing it with the installdvd. And how do you get the error when trying to rearm?? When I let wat flag a vm activated with lenovo key it reoprts non-genuine (I also reboot to get all the nagscreens etc), if I install the default ultimate key then and reboot windows is already in grace period. Just make shure that windows is not non-genuine when you reset the rearm count, if it is then first get back into grace and then reset. Or am I missing something here?
Hey, Sounds great. Question will this work with all "trial apps", in particular Windows Server 2008 RC that is good for 180 days. If not, is there a way to rearm it. cplmckenzie
You can also use a PE boot CD like UBCD4win, load one of it's remote registry editors to find and delete the WPA entry from the registry.
The WindowsDVD is a WinPE environment as well. And given it was used to install windows, you can provide more straight forward universal instructions than instructing people how how to build an XP-based BartPE-based UBCD4win. Don't get me wrong, UBCD4Win is an excellent tool, I'm just one for providing instructions that are simple. And if you plan on continuously using this method for activation, automating it via a batch file makes it quicker than the foolishness involved in mounting the hive in regedit, etc. Though the install DVD's WinPE MAY have graphical regedit. Give it a shot. Another I'm working on now is using "Windows Recovery Environment", installed on the hard drive, to do this. PE environment without the slowness or inconvienence of a boot DVD/CD.