Printer not activated, error code -30 I am unable to generate invoices and submit them. I am using Quickbooks Pro 2015 on Windows 8.1. When I try to submit an invoice, I get an error: 'Your forms were not sent because Quickbooks could not create the necessary PDF files.' I tried printing to the ABS PDF Driver V400 printer from Word. That's when I got the error 'Printer not activated, error code -30'. Click Start > Control Panel > Devices and Printers. Select Add a printer. Select Add a local printer. Check Use an existing port and select Documents *.pdf (Adobe PDF) from the drop down. Click the Have Disk Click the Browse Navigate to C: Program Files (x86) Adobe Acrobat 10.0 Acrobat Xtras AdobePDF. I tried the repair tool from this article: That did not work. I also extracted the xpsprinterbat.bat file in the 'QuickBooks Print and PDF Repair Tool.exe' file referenced in that article and examined it. I noticed that the most recent folder name mentioned in the.BAT file was 'Quickbooks 2014'. I replaced that with 'Quickbooks 2015', since that's the version I had. Running that.bat file didn't help. I also tried running the.bat file in Admininstrator mode, since I noticed a permissions violation at some point in the output window. For the record, I also tried rebooting various times. • • • • • • • After 1.5 hours on support, this is the summary of what we did: * Put Quickbooks Pro in Windows 7 Compatibility mode * Configure Quickbooks Pro to execute in Administrator mode * Switch from using Outlook directly to using Web-based email (Outlook.com in my case) to send emails (e.g. Invoices) Note that along the way, we also uninstalled the Windows XPS print driver, downloaded the XPS print driver for Windows 7 and installed that. It didn't make a difference when we did that, but it's always possible that was part of the solution. • • • • • • • I opened the 'product-based services' sample file. I clicked on the Reports icon in the toolbar on the left. I double-clicked on the first report, the P&L statement. I clicked File -> Save As PDF. I entered a name for the PDF file. I got the error 'Sorry! We couldn't save your report as a PDF file'. The other issue I was getting was with invoices. I clicked on the notification icon in the upper right and went to the pending forms to handle. Normally I would get the error when I try to send an invoice. But because that is a sample file, I am unable to send an invoice, and therefore I'm not able to fully test whether or not I'm getting the same error. For the record, I did test Word again to see if I could print to the PDF driver (after deleting temp files). I still get the same -30 error. Thanks for the reply, David • •. People come to QuickBooks Learn & Support for help and answers—we want to let them know that we're here to listen and share our knowledge. We do that with the style and format of our responses. Here are five guidelines: • Keep it conversational. When answering questions, write like you speak. Imagine you're explaining something to a trusted friend, using simple, everyday language. Avoid jargon and technical terms when possible. When no other word will do, explain technical terms in plain English. • Be clear and state the answer right up front. Ask yourself what specific information the person really needs and then provide it. Stick to the topic and avoid unnecessary details. Break information down into a numbered or bulleted list and highlight the most important details in bold. • Be concise. Aim for no more than two short sentences in a paragraph, and try to keep paragraphs to two lines. A wall of text can look intimidating and many won't read it, so break it up. It's okay to link to other resources for more details, but avoid giving answers that contain little more than a link. • Be a good listener. When people post very general questions, take a second to try to understand what they're really looking for. Then, provide a response that guides them to the best possible outcome. • Be encouraging and positive. Look for ways to eliminate uncertainty by anticipating people's concerns. Make it apparent that we really like helping them achieve positive outcomes. When attempting to print to PDF, the Quicken program may appear to 'freeze' or you may receive a message: 'Printer not Active' -or- 'Unable to verify active printer at the system level.' Make sure the Quicken PDF Printer is installed Windows 7, 8, and 10 • Click the Start button, select Control Panel, and click Devices and Printers. In Windows 10, you will need to right-click the Start button to locate the Control Panel. • Check to see if the Quicken PDF Printer is listed. • • If yes, proceed to making the PDF Converter compatible with 64-Bit versions of Windows below. • If no, proceed to installing the Quicken PDF Printer below. Install the Quicken PDF Printer • Make sure that you are logged in as a user with administrator rights. • Right-click the Windows Start button, and select Explorer. ( File Explorer for Windows 10) • Browse to C: Program Files or Program Files (x86) Quicken PDFDrv. • Double-click on RestorePdfDriver.bat, and wait for the installation to complete. (A Command window will appear during the installation process, and will close when it is complete). • Attempt to print to PDF in Quicken. If you are still unable to print to PDF, proceed to making the PDF Converter compatible with 64-Bit versions of Windows below. Make the PDF Converter compatible with 64-Bit versions of Windows Windows 7, 8 and 10 • Make sure that you are logged in as a user with administrator rights. • Right-click the Windows taskbar at the bottom of the screen and select Task Manager. • Select the Processes tab. • Select the splWOW64.exe process (if found) and click the End Process button. • Close the Task Manager. • Click the Windows button, select Control Panel, and click Devices and Printers. • Right-click the Quicken PDF Printer icon and select Printer Properties. • Select the Ports tab, then click the Add Port. • Select Local Port and click the New Port. • Enter PDF1 for the new port name and click OK. Close the Printer Ports window. • Ensure that the PDF1 port is selected in the Ports list. • Select the Advanced tab. • Select the Spool print documents radio button to make the options below it clickable. Clear (uncheck) the box labeled Enable advanced printing features. • Select the Print directly to printer radio button again. • Ensure that Amyuni Document Converter 300 is selected in the Driver: drop-down field. • Click the Apply button, and then click OK. • Right-click the Windows taskbar at the bottom of the screen and select Task Manager. • Select the Processes tab. • Select the splWOW64.exe process and click the End Process button. Important: In order for the changes to take effect, you must restart your computer. • Monitoring alerts, data downloads, and feature updates are available through the end of your membership term. Online services require internet access. Third-party terms and additional fees may apply. Phone support, online features, and other services vary and are subject to change. 14,500+ participating financial institutions as of October 1, 2017. • Standard message and data rates may apply for sync, e-mail and text alerts. Visit for details. Quicken app (“App”) is compatible with iPad, iPhone, iPod Touch, Android phones and tablets. Not all Quicken desktop features are available in the App. The App is a companion app and will work only with Quicken 2015 and above desktop products. • Quicken Bill Pay (Bill Payment Services provided by Metavante Payment Services, LLC) is included in Quicken Premier and above and is available on as a separate add-on service in Starter and Deluxe. 15 payments per month included in Premier and above. • Purchase entitles you to Quicken for 1 or 2 years (depending upon length of membership purchased), starting at purchase. Full payment is charged to your card immediately. At the end of the membership period, membership will automatically renew every year and you will be charged the then-current price (prices subject to change). You may cancel before renewal date. For full details, consult the Quicken License Agreement. You can manage your subscription at your My Account page. • 2018 release of Quicken for Windows imports data from Quicken for Windows 2010 or newer, Microsoft Money 2008 and 2009 (for Deluxe and higher). Quicken for Mac 2018 release imports data from Quicken for Windows 2010 or newer, Quicken for Mac 2015 or newer, Quicken for Mac 2007, Quicken Essentials for Mac, Banktivity. • 30-day money back guarantee: If you’re not satisfied, return this product to Quicken within 30 days of purchase with your dated receipt for a full refund of the purchase price less shipping and handling fees. See for full details and instructions. • Quicken for Mac software and the Quicken mobile app are not designed to function outside the U.S. • The VantageScore provided under the offer described here uses a proprietary credit scoring model designed by VantageScore Solutions, LLC. There are numerous other credit scores and models in the marketplace, including different VantageScores. Please keep in mind third parties may use a different credit score when evaluating your creditworthiness. Also, third parties will take into consideration items other than your credit score or information found in your credit file, such as your income. • VantageScore®, Equifax®, Experian® and TransUnion® are registered trademarks of their respective owners. • EQUIFAX is a registered trademark of Equifax Inc. The other Equifax marks used herein are trademarks of Equifax Inc. Other product and company names mentioned herein are property of their respective owners. • Illustrations © 2017 Adam Simpson. All rights reserved. • © 2017 Quicken Inc. All rights reserved. Quicken is a registered trademark of Intuit Inc., used under license. • • • • • © 2017 Quicken Inc. All rights reserved. Quicken is a registered trademark of Intuit Inc., used under license. IPhone, iPod, iPad Touch are trademarks of Apple Inc., registered in the U.S. And other countries. Android is a trademark of Google Inc. Dropbox, PayPal, Yelp, and other parties’ marks are trademarks of their respective companies. Terms, conditions, features, availability, pricing, fees, service and support options subject change without notice. Corporate Headquarters: 3760 Haven Avenue, Menlo Park, CA 94025.
0 Comments
Information about Windows XP, Vista, Windows 7 and 8 including tweaks, slipstreaming, install, registry, and forum for all Windows versions Windows xp media center. Windows xp media center edition 2005 free download - Windows XP Media Center Edition, CoolCube XP Media Center, Rollup for Windows XP Media Center, and many more programs. Hello bbarrez, The End User Licensing Agreement for OEM software (the kind that came preinstalled on your laptop) states that the license is good for the life of the computer onto which it is first installed and is not permitted to be moved to any other computer. That measn when the laptop is in the trash, so is its license for Windows XP MCE. Soooo, if you were thinking you would just install that license on another computer, nope, not allowed. For great advice on all topics XP, visit http://www.annoyances.org/exec/forum/winxp. In reply to Linda, Bakersville NC Thank you for reaching us on TD Helps, Linda. We'd be happy to help you activate your card. If you've received your debit card in the mail, enclosed with it should be the following 24/7 phone number: 888-553-4122. Please have your TD Debit card handy during this process. To activate your TD Visa Gift Card, you can register online at or by calling (888) 294-2249. If you're trying to register your gift card for the first time, your initial password is the three-digit security code on the signature panel on the back of your card. Please remember to change your password after signing in for the first time. If you have trouble with the activation line, don't worry. You may call us 24/7 at 888-751-9000 or visit a TD Store during lobby hours. Whichever you choose, our Representatives will be happy to help walk you through activating your card. For lobby hours to locations near you please visit We hope this helps, Linda and have a good day. How to Activate My Visa Card. Visa also provides bank cards, rechargeable debit cards and gift cards. How to use a Visa Gift Card online. You can activate your Visa gift card. The gift card is processed through the Visa and. The debit occurred because our gift card system approved. Report your card lost, stolen or destroyed. To shop online or by phone, you must register your Card. Merchants need to verify the billing address associated with this Card before authorizing your online or phone purchase. Visa Acceptance: Use your Walmart Visa Gift Card everywhere Visa debit cards are accepted in the. Cameron P, Mount Laurel March 9, 2015 09:32:16 PM. In reply to Lynne, Indialantic Hi Lynne. Thanks for responding! You and your husband can absolutely share a TD Bank Visa Gift Card. The only trouble you may have once it's been registered to your husband is with online or phone purchases. When making these types of transactions you have to provide a name and address. These get matched against the registered name and address for verification. If it doesn't match, the merchant may decide to cancel the order. You shouldn't run into this issue when swiping the card at a store or restaurant. I would only apply to online verification. If you have any other questions or concerns about using your TD Bank Visa Gift Card, give us a call at the number on the back of your gift card. That number should be 888-294-2249. If the gift card was purchased prior to 2010, the number to call is 800-884-4593. We can also assist you at a local TD Bank Store. Find one near you at We hope you have a great day, Lynne! Customer Service Team, Mount Laurel May 15, 2017 04:39:56 PM. In reply to Thomas, Philadelphia We appreciate you joining in on the conversation today, Thomas. We apologize that you're having so much trouble with your TD Bank Gift Card, and we'll be more than happy to help. First, we'd like to mention that when you receive a TD Bank Gift Card, your card is already activated, and for this reason, can be used right away. While we like to recommend that you register your gift card so that you may make purchases online or over the phone, or in the unfortunate event your card is misplaced; however, it is not required for you to register your card. You will be able to immediately make in store purchases anywhere VISA is accepted. However, if you would still like to register your gift card and you continue to have trouble doing so, as our friend Cameron mentioned above, you may always call (888) 294-2249 to activate your card over the phone. We sincerely hope this helps, Thomas, and please let us know if you have any additional questions. Have an amazing weekend! Brittany M, Mount Laurel November 10, 2017 12:12:30 PM. ||||||| Equal Housing Lender SECURITIES AND INSURANCE NOT FDIC INSURED NO BANK GUARANTEE MAY LOSE VALUE Securities and other investment and insurance products are: not a deposit; not FDIC insured; not insured by any federal government agency; not guaranteed by TD Bank, N.A. Or any of its affiliates; and, may be subject to investment risk, including possible loss of value. Data as of March 2017. Comparison of longest average store hours in the regions (MSAs) in which TD Bank operates compared to major banks. Major banks include our top 20 national competitors by MSA, our top five competitors in store share by MSA and any bank with greater or equal store share than TD Bank in the MSA. Major banks do not include banks that operate in retail stores such as grocery stores, or banks that do not fall in an MSA. ©2017 TD Bank, N.A. All Rights Reserved. Bank Visa Gift Card is the ideal gift for anyone age 13 or older, for any occasion! Recipients can choose their perfect gift themselves – from clothes to music, movie tickets to dinner and much more. Plus, it's safer than cash. Additional features of the prepaid Visa Gift Card include: • An all-occasion gift – Use it for birthdays, holidays, weddings, graduations and more. • Visa acceptance – Welcome everywhere Visa debit cards are accepted in the United States. • Choice – Unlike store gift cards and gift certificates, you can use it almost anywhere (includes online and mail order purchases). • Available in any denomination - Loaded with the dollar amount you specify, from $25 to $500. • Security – A lost or stolen Visa Gift Card can be replaced if the account number is available. Unsupported Browser We've detected that you are currently accessing this site using an older version of Internet Explorer. We have not designed this site to support older versions of Internet Explorer. Therefore, you may encounter issues with how the site is displayed and how you can navigate through the site when using this older browser. We highly recommend you upgrade your current browser or download a new version of a different browser. Alternatively, you may want to download a new version of a different browser: • • •. Back in 2003 when Valve released its now well-known game distribution software called Steam, I wasn’t immediately sold on the idea. I figured a gaming platform that imposed more restrictions on the user (like technology) and a required Internet connection would never really take off. However, my feelings made a sharp change the following year, in 2004, when the blockbuster title Half-Life 2 was released to gamers abroad. As I inserted the game’s install CD into my PC I soon realized one thing: Valve developed both the game and Steam software, and it was therefore their prerogative to require Steam to play the long-awaited Freeman-filled shooter. And thus, after a series of long and painful mouse clicks, Steam was installed: I drank the Kool-Aid. Now you’ll find me saying “Loyalty until Underverse come” when asked my opinion on Steam. “You can now play Half-Life 2. Welcome to the Underverse.” (Image: The Chronicles of Riddick, Universal Studios) OK, so maybe it wasn’t that big of a deal, but Steam really did change my gaming experience forever, and I’d say it’s mostly all been positive. Nevertheless, as with anything that becomes popular on the web, bad guys pay attention too, and look to make a profit where they can. With that in mind, let’s take a quick look at some things you may want to watch out for when gaming with Steam. Even today, almost a decade after Steam’s initial release, the digital game platform continues to improve selections, grow its user base, and expand its list of supported devices. Steam has gotten so popular that, at any given time, there are millions of gamers logged into Steam, browsing the store and playing games — but that just means more targets for the bad guys. Many Steam key generators (keygens) are advertised on the web through social media and other channels. Steam keys are codes that users can enter to activate a game on Steam, much like a normal CD key is used to curb piracy. Once a game is activated on Steam, you can download and play it just as if you purchased it from the Steam store. How can the answer be improved? All of these keygens are fakes and usually lead to something you don’t want. I discovered one on Facebook for Bioshock Infinite (above), a game released just back in March. I went over to the advertised website and clicked on the download link—as expected, I found a scam used to collect my personal info or install arbitrary software. At least they gave me choices, right? Similarly, I found the same “deal” offered for Dishonored on a similar website that used the same URL scheme. These two sites (which are Google Blogger sites) are likely created by the same guy. This keygen led to the same scam, advertising the exact same products and surveys. I tried a couple of these, including the Celebrity News Toolbar and PowerPoint Plugin, but neither installation got me a free game—instead, I was stuck with lame browser add-ons and the. As I mentioned on, don’t fall for these tricks unless you’re looking for more adware and other potentially nasty software. In addition to Steam key scams there are also several key resellers advertised online that will sell you a key activated on Steam. There are some problems with this approach. First, the vast majority of these resellers are not authorized by Steam, and therefore you’re taking a big risk when buying a key from any of these vendors. If you purchase a key from one of these sites, Steam can do nothing to intervene on your behalf should the key not be delivered or you encounter a problem. Also, most of the keys purchased through these resellers are for different regions (when you purchase a game on Steam, it is tied to a specific region). A lot of the keys found are for European regions, and most often Russia, offered for considerably less than U.S. Key Pickup area for customers at CDKey Warehouse () Since you naturally can’t play Steam games for a region you’re not physically located in, many of these resellers offer a VPN workaround to activate, download, and play the games. In order to play the Dishonored key (above), a user would need to download the reseller’s VPN client, which for this vendor is in the form of a Microsoft phonebook file (.pbk) filled with VPN connection info for several countries. Just to be sure about all of this, I emailed Steam support to clarify. Here is the response I got after asking about one specific vendor (). There’s really no telling where the keys from these vendors come from, or even if they’re stolen or not. Also, the key may just not work, and you’re definitely not getting your money back from Steam since the vendors aren’t authorized. Let’s be honest: most of us are looking at third-party vendors and key giveaways because we’re disgruntled about the price we see at the Steam store. So, what do you do to get the best price? I know this may sound old-fashioned, but patience proves to be the best choice when looking for a Steam bargain. Price drops will come with time, but waiting for that “right price” usually isn’t an attractive option when a new hit title is just released. That’s what sales are for. Steam is littered with sales that occur every week, and even bigger sales happen around the holidays. As a matter of fact, I think I bought a game almost every day around Christmas last year, and I never had to resort to a reseller for keys. Steam sales are really where you’re going to get the most out of your money, and the peace of mind knowing your purchases are backed by Steam. Lastly, if you’re looking for a safe alternative to buying a game on Steam, you can always buy a copy of the game from your favorite retailer if you find the price cheaper. Once you purchase the game, there’s a chance you can use the CD key to activate the product on Steam, and then download the game just as if you bought it from the Steam store. For a list of retail keys that are accepted on Steam, click. _______________________________________________________________________________ is a Malware Intelligence Analyst at Malwarebytes where he performs research and in-depth analysis on current malware threats. He has over 5 years of experience working with US defense intelligence agencies where he analyzed malware and developed defense strategies through reverse engineering techniques. His articles on the Unpacked blog feature the latest news in malware as well as full-length technical analysis. Follow him on Twitter. @Shorty20122012: He didn’t “fall for it”. He is a online scam/malware reporter, and thus looked into it to determine if it was a scam. A few sentences after mentioning the scam, he stated “ as expected, I found a scam used to collect my personal info or install arbitrary software.” He does mention installing the malware, but with his indicated level of competence, he presumably installed it into a virtual machine, keeping his main machine clean, in order to determine whether there was a real Steam key at the end of the scam. In the linked article, he mentions encountering the same type of scam many times, thus showing he wouldn’t accidentally fall for this scam. It is plausible that there might have been a real steam key at the end; the scam could have gained more money from its victims than the key was worth. (Although, I will admit it is unlikely.) My source for this plausibility judgement: I, myself, have used the aforementioned method of installing malware into a disposable virtual machine, although this was to obtain a file that contained a password for an archive. I actually got the file once the malware “phoned home” to report a “successful” infection. (Annoyingly, the password in the file didn’t work. I don’t know whether the person who created the archive mistyped the password, or if they intended to not give a real password.) The site was actually relatively trustworthy, in that they did exactly what they said they would do: provide a file once you completed some scams. (I would still avoid such a site like the plague, but it’s nice to know there’s honor among some thieves.) • Pingback: () • Pingback: () • Pingback: () • Pingback: () •. I’ve bought a few keys from G2A and haven’t had a proplem with them in the last two months. Your problem may have been with Origin. EA has some of the biggest corporate ******** around so when you bought a key that wan’t exclusively from them and it wasn’t bought from their site with your account chances are they will block it regardless if the key is real or not. They want you to buy it directly from them and not a reseller. On the other hand I haven’t had any problems activating games on steam after buying some keys frm G2A. The games I’ve gotten have been Ryse, Fable Anniversary, Dying Light, Fallout NV, Mad Max, GTA 5. I bought some of the games without their shield protection and from vendors with hundreds if not thousands of 99% customer ratings. TL;DR Your problem was a EA issue not a G2A. Hello, We are sorry to hear about your issue – if you did not receive a refund for the order which got revoked by the Platform provider, our Support Department will be able to help you on the matter. Did you use our Resolution Center to contact the Seller directly? This option is really helpful and our team is still watching over the conversation and providing help. If you have any further questions or doubts, keep in mind that you can always find additional information on G2A’s FAQ or by contacting us on live chat or ticket. Our consultants are there for you 24/7. See you again at G2A G2A Team •. Uplay PC CD keys are unique and can only be used once. Once they are used, they are bound to the Ubisoft Account that was logged in at the time of initial activation. You do not need to create a new Ubisoft Account. If you are receiving this error, chances are you already have more than one Ubisoft Account. You can simply log in to your other Ubisoft Account(s) to find which one has the game registered. Steam Games purchased through Steam will appear in the Games tab in the Uplay PC application. If you are trying to play a game originally purchased through Steam, you can either launch the game through the Steam application or through Uplay. Start by launching the Uplay PC client (Start -> Programs -> Ubisoft -> Uplay) 2. Click the Account Avatar at top right then select Log out from the list. Login with a different Ubisoft Account. If you need assistance determining which Ubisoft Account your game key is registered to, you will want to create a support ticket. Note: Please be sure to include your game's CD Key / Activation Code when submitting a ticket. Computrace Lojack for Laptops is an anti-theft security. Click On Activate New. Quick Tips content is self-published by the Dell Support. Feb 08, 2011 In the BIOS there's a CompuTrace option and it's enabled, meaning the computer is reporting the current IP to some Dell server somewhere. I'd like to know where can I gain access tho the localization information provided by the Laptop. Dedicated to the intersection of technology, privacy, and freedom in the digital world. 'I don't have anything to hide but I don't have anything I want to show you either' - @CryptopartyBLN Latest 2017-09-05: I think I think we’re going to have 100,000 Subscribers this week and. Ongoing • • Do you enjoy real time chat? Feel free to join us on IRC: irc.oftc.net #redditprivacy (SSL port: 6697). The network supports Tor for connections. Many people idle on IRC but are away, please be patient if you are not answered immediately! • Before you use the 'I have nothing to hide' argument please read --all of it. If you can't find the time, then should at least get you thinking about why privacy matters. • • A landmark discussion on DemocracyNow including William Binney, Jacob Appelbaum & Laura Poitras. • Cory Doctorow • Glenn Greenwald’s 2014 TED Talk, • New! The Electronic Frontier Foundation’s, • New! EFF’s, • Reddit uses Google Analytics which may be used to track you across various internet sites. • Continuing about frustrating the efforts of organizations that spy on citizens and consumers. • Suggested Software Note this section has software that is under ongoing development. No one solution can guarantee your anonymity. •, a pre-configured web browser intended to protect your anonymity when used with • - a live system that aims at preserving your privacy and anonymity • we don't necessarily endorse all their software choices Related Subreddits: • • • • • • • • • • • • • • • Donate Consider donating to one of the organizations that fight for your rights. Org Name American Civil Liberties Union Electronic Frontier Foundation Electronic Privacy Information Center Free Software Foundation Open Rights Group Tor high bandwidth Tor exit nodes building the global movement for the protection of privacy. Subreddit Rules (updated 2017-08-06) • If you find privacy related software, services or subreddits you think are great please run them by the mods before you post them. Close source software is not permitted • If you're a developer or employee of a company that makes non-commercial privacy related software or services you can post links/comments about it if it is open source and you have discussed conditions with the mods in advance. But, you also must clearly identify yourself and stick around to answer questions people have regarding your product/service. Remember we're a community, not a place to advertise. Your site must be available over https only. • The promotion of closed source privacy software is not welcome in. By its nature you can not verify easily that it does what it claims and as a result this puts your privacy and security at risk • Refrain from repeatedly pushing traffic to personal or other sites, especially if commercial in nature. • Be nice and have some fun. Please don't jump on people for making a mistake or holding a different view. Reclaiming the privacy high ground requires changing minds and you can't do that if you scare people away. • Sexism will not be tolerated. Nor will Racism, LGBTQ-phobic comments or similar hate speech. • Don't suggest violence or destruction as a means to an end • Before posting check that a discussion has not already been started. Use the search and check submissions. • This is not a tech support subreddit. These posts may be removed. • Refrain from editorializing titles, use the original title. • Always link to the original source material • Clear any links to fundraising with the mods first • All surveys should be passed by the mods for approval before posting • Don't post memes or other images funny or not. • Please don't theorize about conspiracies here. We don't need to confuse things by introducing unverifiable conspiracy conjecture. • Due to the commercial nature of VPNs discussion are better directed to. No mentioning of specific providers by name • No partisanship arguments or baiting Failure to adhere to the above will result in your post being removed and / or you being banned. So apparently XXXX computer company and Absolute Computrace support either lie or do no know what they are talking about, they both say 'it is not activated'. Though of course they would think so, this is an off lease asset that is probably no longer in their records. From my research Disable = Permanently block the Computrace module interface. Deactivate = Block the Computrace module interface (default). Activate = Permit the Computrace module interface. Activate means it is enabled. This sucks, this is a very nice high end laptop but is complete garbage because of the fsck'ing bios backdoor. A poisoned technology and hardware that could have otherwise been great. If it is enabled how do I get rid of it? Unified iaees Fame 1151 3,6ese61 Garvey Feb, 29, 1972 [54] METHOD OF PLATHNG ON STAINLESS Primary Examiner-G p sTEEL Attorney-John P. Hazzard [72] inventor: Bruce.H. Garvey, Cleveland, Ohio [57] ABSTRACT [73] Assignee: Kewame Company Bryn Mawr A process by which a metal may be plated on a stainles steel [22] Filed: Sept 3,1970 metal substrate whereby the final electroplated composite possesses greatly improved adherence. Said process involves [2]] Appl- N04 70,559 the eiectrodeposition of a nickel strike layer on the stainless steel base metal prior to plating a Woods strike nickel elec- [52 us. (:1.204/49, 204/40, 204 41, troplating bath in which the nickel therein is in the form of 29/1965 nickel bromide and the acid in the bath is hydrobromic acid. Cl..C23b 5/08,C23b 5/50 The composition and operating conditions of said bath com- [58] Field of ee1rch.204/41, 40, 49; 29/ 1 96.6 pris na 100-800 g./l. [56] References Cited HBr 1 0.2%-20% by weight UNITED STATES PATENTS 2,800,440 7/1957 Brown.204/49 5-200 3,003,9 Atkinson.204/49 0 0 3,186,925 6/1965 Kushner.204/41 M Willi-Lil; l ms iei r w METHOD OF PLATHNG ON STAKNLESS STEEL The instant invention relates to a process and metal composite formed thereby, whereby various metals may be adherently applied to a stainless steel substrate. The invention further relates to the electrodeposition of a nickel strike from a bromide type Woods strike directly on the stainless steel substrate prior to deposition of said metal which is desired to be firmly adhered to the stainless steel substrate. The use of stainless steels as substrates under other electrodeposited metals is not new to the art but such has achieved only limited application in various industries due to the fact that it is particularly difficult to secure adequate adhesion to the stainless steel substrate. Stainless steels themselves vary greatly in the degree of adherence that can be obtained through electrodeposited coatings. The instant invention as indicated previously, greatly improves the adherence of numerous metals wished to be deposited on stainless steels in general. However, the present invention has its greatest applicability when used in conjunction with the stainless steels on which it is more difficult to deposit an adherent coating. The present invention will be described in more detail with respect to a particular stainless steel, namely, type 446 stainless steel although it is equally applicable to other varieties of stainless steel. In the manufacture of Geiger Mueller radiation detector tubes, it is desirable to provide on the internal surface of the stainless steel body of said radiation detector tube a metal deposit which is inert to the corrosive gases contained therein. I bought one of your Plug N’ Plate® kits to see if I could. To plate Gold over Stainless, activate the metal first by swabbing with. Plating Over Stainless Steel. I am a master student in materials science and engineering and I am working on electroless nickel plating on stainless steel 304. I know that we can activate the. Immerse the part in a solution of 50% muriatic acid and 50% distilled water for 10 seconds at room temperature. Brush plate with Stainless Steel Activator and. It has been attempted in the past to electroplate platinum or other metal on the internal walls of such stainless steel tubes. Such attempts to electroplate platinum directly onto the inner surface of such stainless steel tubes were unsuccessful in view of poor adhesion on the platinum. Numerous pretreatments were tried on the stainless steel surface prior to deposition of the platinum with little success. Utilizing some complex pretreatments of the stainless steel, however, would result in some success, but the rejection rate of such tubes due to nonadherence of platinum or other noble metal clearly pointed out the commercial unfeasibility of such a process. Adequate adherence by the adjacent metal layers is of course, dependent on the intermetallic bond established by said materials. The strength of the intermetallic bond required will, of course, depend on the end use of the article and the conditions it must endure. The instant invention thus, is most beneficial when applied to articles which are subject to high temperature changes or those which must later undergo considerable forming or bending. Likewise, the surface condition of this stainless steel substrate is also extremely important. Whether the substrate has been rolled, heat-treated, annealed, etched or been subject to various cleaning cycles or other pretreatment, the practice of the present invention produces a more adherent metal layer due to the intermediate nickel strike when compared to directly applying said metal layer to said stainless steel substrate. The theory behind the instant invention is to apply an intermediate metallic layer which itself is highly adherent to a stainless steel substrate and said intermediate metallic layer is such that it also produces a high adherent bond with the metal plating thereover. The metal layer which is desired to be adherently attached to the stainless steel substrate through the intermediate nickel strike layer of the instant invention can be any of numerous metals, for example, brass, bronze, cadmium, chromium, copper, gold, indium, iridium, nickel, palladium, platinum, rhodium, silver, tin or zinc. Likewise, more than one metallic electroplate may be utilized over said intermediate nickel strike layer which effects the intermetallic bond with the stainless steel which results in the improved adherence contemplated by the instant invention. As stated earlier, such intermediate metallic layer in the practice of the present invention is a nickel strike from a bromide Woods strike bath. Woods strike baths are well known to those skilled in the art of electroplated nickel. Such baths generally are made up of nickel chloride and hydrochloric acid. The use of such standard Woods strike baths, however, will not result in the improved adherence contemplated by the instant invention whether on the more easily plated stainless steels or in the case of the more difficulty plated stainless steels wherein such standard Woods strike baths produce only a deposit possessing inadequate adherence. As is well known to those skilled in the art, it is possible to electroplate nickel onto some stainless steels and secure moderately good adherence by the use of standard Woods strike nickel electroplate bath. Such typical bath contains 32 oz. Per gallon NiCl -6l-l- O (240 g./l.) and 16 fluid oz. Per gallon HC] (72% percent by weight). Such a nickel strike is deposited at room temperature under standard current density. Onto such a strike layer can be deposited one or more metals which possess some adherence. However, in all cases improved adherence is obtained when the bromide Woods strike of the instant invention is utilized. In general, we have found that stainless steels become more difficult to use as a substrate on which a strongly adherent metal electrodeposit is desired as the chromium content of the stainless steel increases. With certain high chromium content stainless steels and particularly with type 446 stainless steel, adherence of the nickel strike from a standard Woods strike was inadequate and could not be appreciably improved by varying the concentration of nickel chloride and/or HCl over wide ranges. During our experimentation in which tests were made in an attempt to improve the adherence of the standard chloride Woods strike to the stainless steel, it was found that even after various types of pretreatments including several etchings, adequate adherence could not be obtained by using a standard Woods strike type bath in which the nickel chloride was between l50-300 g./l. Or more and the hydrochloric acid concentration filled from about 02-20 percent in the bath. Such standard Woods strike baths must be modified by replacing the nickel chloride and hydrochloric acid therein with nickel bromide and hydrobromic acid. The composition of such a bromide Woods strike bath may vary widely. The nickel bromide concentration can vary from approximately -800 g./l. While the l-lBr content can vary from 0.2-20 percent by weight. The current density utilized in such a bath is generally in the range of 5-200 amps per sq. And the plating time can be anything up to approximately 10 minutes although it is preferred to use as short as possible plating times. Preferably such baths are operated at room temperature, however, such may be operated up to a temperature of approximately F. The preferred bath concentration for this bromide type Woods strike electroplate bath of the instant invention is to utilize a nickel bromide concentration of approximately 500 g./l. And a hydrobromic acid concentration of approximately 0.4 percent by weight. Operation of said preferred bath would be at room temperature with a current density of approximately 16 amps per sq. For approximately 5 minutes. To more fully describe the instant invention, a typical example is given hereinafter wherein said bromide-type Woods strike is utilized to form a strongly adherent nickel deposit on the interior surface of a type 446 stainless steel tube which is to be used in Geiger Mueller radiation detection device after it is further plated with platinum and assembling is completed. Such a typical Geiger Mueller radiation detection device is fully described in US. 3,342,538 issued Sept. EXAMPLE A stainless steel type 446 length of tubing having a wall thickness of 0.010 in. Was first cathodically cleaned in a conventional alkaline cleaner at -210 F. For 15 seconds. After a cold water rinse the stainless steel tube was dipped for a few seconds with agitation in a 20 percent by volume and 7% milliliters per liter of 48 percent by weight solution of HBr. After removing and rinsing the nickel-plated stainless steel tube, it was electroplated with platinum from a conventional platinum plating bath. The platinum bath was made up as follows: Ammonium nitrate 13 02. Sodium nitrate 1.5 02. Platinum compound g. (as Platinum) Ammonium hydroxide 200 ml. Temperature 210 F. Current density 60 ats.l. Adherence of all layers to the substrate was excellent. In each of the plating cycles, the stainless steel tube acted as the cathode and the anode consisted of a centrally aligned wire running through the stainless steel tube. A method of firmly adhering a metal deposition to a stainless steel substrate comprising electrodepositing a nickel strike on said stainless steel substrate prior to application of said metal deposition, said nickel strike being electroplated from an aqueous nickel electroplating bath comprising to 800 grams per liter nickel bromide and 0.2 to 20 percent by weight hydrobromic acid, said electrodeposition of said nickel strike being effected at a current density between 5 and 200 amps per square foot. A method of firmly adhering a metal deposition to a stainless steel substrate comprising electrodepositing a nickel strike on said stainless steel substrate prior to application of said metal deposition, said nickel strike being electroplated from an aqueous-nickel electroplating bath comprising approximately 500 grams per liter nickel bromide and approximately 0.4 percent by weight hydrobromic acid, said electrodeposition of said nickel strike being effected at a current density between 5 and 200 amps per square foot. UNITED STATES PATENT OFFICE CERTIFICATE OF CORRECTION Patent No. QfiL 861 Dated Eebmlamz 2 1912 Inventor(s) Bruce J. Garvey It is certified that error appears in the above-identified patent and that said Letters Patent are hereby corrected as shown below: In the Abstract, line 5, after the word 'plating' insert of said metal. The nickel strike is electroplated from Column 2, line 16, change '72 to read --l2 Signed and sealed this 11th day of July 1972. (SEAL) Attest: EDWARD M.FLETCHER,JR. ROBERT GOTTSCHALK Attesting Officer Commissioner of Patents FORM PO-1050 (10-69) USCOMM-DC 60376-P69 b 0.5, GOVERNMENT PRINTING OFFICE: 1969 0-366-334. Referenced by Citing Patent Filing date Publication date Applicant Title * Oct 21, 1974 Feb 24, 1976 Sherritt Gordon Mines Limited Nickel clad steel coinage blank * Apr 21, 1975 Apr 12, 1977 American Optical Corporation Mold for casting contact lenses utilizing and electron beam to polymerize the resin lens * Sep 30, 1976 Dec 27, 1977 Eutectic Corporation Composite cast iron drier roll * Jul 1, 1985 Aug 5, 1986 Furukawa Electrical Company, Ltd. Process for metal plating a stainless steel * Feb 15, 2002 Nov 9, 2004 Bbp Service Gmbh Structural components for the boiler zone of power plants or refuse incineration plants Sep 22, 2010 Mar 27, 2012 Intri-Plex Technologies, Inc. In a process for plating nickel upon a surface of a workpiece made of stainless steel, the workpiece is immersed in an electrolytic sulfuric acid bath, with the workpiece anodically connected. Thus, DC current flows from the workpiece, through the bath, to a separate cathode in the bath. Thereafter, the sulfuric acid is rinsed from the workpiece and the workpiece surface is electroplated with nickel which will strongly adhere to the surface. Finally, the nickel-plated part may be conventionally electroplated with chrome. BACKGROUND OF INVENTION It is common practice to chrome plate many different types of industrial parts which are made of stainless steel in order to give the parts a bright, shiny surface. By way of example, automotive vehicle body moldings, door handles, and other functional or decorative parts are chrome-plated for appearance purposes. Frequently, such parts are made of stainless steel to prevent rusting. In commercial practice, chrome plating stainless steel parts typically is accomplished by initially buffing the stainless steel to achieve a high luster and then electroplating with chromium to retain the high luster and to make the finished surface more durable. In the past, stainless steel parts have been electroplated with nickel before the chromium electrolytic plating step. But, the adhesion between the nickel plating and the steel part has been erratic. Further, the red rust resistance of the nickel plated part has been erratic. It has been understood by those skilled in the art that proper adhesion and good red rust resistance could not be consistently achieved when electroplating nickel over stainless steel. Particularly, conventional pre-plating surface treatment followed by conventional plating has not been effective in producing sufficient chemical bond between the stainless steel surface and the nickel coating. This has been especially true in the case of bright annealed stainless steel. Thus, there has been a need for a process to strongly adhere nickel plating to an annealed stainless steel workpiece and to maintain red rust resistance of the plated part. This invention relates to an improvement in the nickel-plating process and, more particularly, in the electrolytic acid surface-treating step used in the process of nickel plating stainless steel, which causes the plating to better adhere to the stainless steel while, simultaneously, not destroying the red rust resistance of the stainless steel surface. SUMMARY OF INVENTION The invention herein contemplates an improvement in the conventional, nickel-chrome plating process for plating stainless steel workpieces wherein the pre-plating, electrolytic sulfuric acid surface treatment step is performed with the workpiece connected as an anode in the electrolytic bath circuit. That is, current flows from the work pieces, through the bath to a separate cathode, during the time that the surfaces are subjected to the electrolytic acid bath. Thereafter, the sulfuric acid is rinsed away, and the nickel plating and chrome plating are applied in the conventional manner. We have discovered that by connecting the workpieces anodically in the electrolytic acid bath, there is a marked improvement in the adherence between the nickel plating to the surface of a workpiece or part made of bright, annealed stainless steel. This adherence is unexpected and contrary to the normal understanding of the art that the part, under electrolytic acidic exposure, should be cathodic or neutral in the electrical system. That is, we have discovered that by reversing the flow of electrons, namely by flowing them away from the part rather than to the part, the surface is remarkably activated to strongly adhere to the subsequently applied nickel plating. An object of this invention is to produce good, commercial nickel-chrome plating of stainless steel, and especially bright, annealed stainless steel, which previously could not be satisfactorily plated because the nickel did not consistently adhere to the surface of such metal. A further object of this invention is to enable the application of a conventional nickel-chrome electroplating procedure to be used for chrome-plating bright, annealed stainless steel without materially changing the conventional procedure or increasing the expense of operating it. That is, by reversing the flow of current in the electrolytic circuit so that the current flows to the anodically-connected workpieces, without otherwise changing the procedural steps or the equipment, it becomes commercially feasible to produce strongly adhering nickel plating upon annealed stainless steel parts. A further object of this invention is to improve the process for electroplating nickel upon the surface of a part made of annealed stainless steel while not adversely affecting or destroying the red rust resistance of the stainless steel. By this process, the part retains, and may even have improved, resistance to red rust, i.e., iron oxide formation. These and other objects and advantages of this invention will become apparent upon reading the following disclosure, of which the attached drawings form a part. DESCRIPTION OF DRAWINGS FIG. 1 is a simplified, schematic flow chart showing the sequence of essential steps in the electroplating process. 2 is a schematic, cross-sectional view showing the immersion of an anodically connected basket containing stainless steel workpieces, within an electrolytic sulfuric acid bath. 3 schematically illustrates a rack carrying a stainless steel part immersed in a sulfuric acid bath. DETAILED DESCRIPTION FIG. 1 schematically illustrates the successive steps, in chrome plating a stainless steel workpiece or part. The process begins with several, successive steps for cleaning the surface of the part. Such cleaning includes removal of scale, oil, grease and other foreign material. Initially, either a single part, or a collection of parts in a basket or supported upon a plating rack, is placed within a soak bath (see step (1), in FIG. An example of such a soak is a material known as Soak Cleaner, No. 613, a proprietary product of MacDermid, which contains a mixture of sodium hydroxide (NaOH), sodium orthophosphate (NaH 2 PO 4 H 2 O), sodium polyphosphate (Na 2 PO 4.12H 2 O), sodium silicate (Na 2 SiO 4), sodium carbonate (Na 2 CO 3), an organic emulsifier and a resin-type soap with a synthetic wetting agent. This particular soak cleaner is used at a temperature of about 190°-200° F., in a concentrate of 8-10 ounces per gallon, with moderate air agitation, at a pH of 12-14. The parts may be immersed for four to six minutes, for example. After the soak cleaner step, the part or parts, assuming a number are loaded in a basket or upon a rack, are rinsed in a clear water rinse step. (see step (2)). The parts are again cleaned in an electrocleaning step (3). By way of example, a suitable electro-cleaner bath is commercially sold under the name of Anodex, a proprietary material marketed by MacDermid. The electro-cleaner bath is typically operated at a temperature of about 195°-200° F. With a concentration of 6-8 ounces per gallon and a pH of 12-14. The parts are immersed for between about 5-15 seconds with a current density of 40-50 amps per square foot or 4.3-5.4 amps per square meter, with the parts maintained at an anodic polarity with a voltage of approximately 5-6 volts. The electro-cleaner generally is a solution of sodium hydroxide (NaOH), sodium carbonate (Na 2 CO 3), sodium triphosphate (Na 2 PO 4.12H 2 O), and sodium metasilicate (Na 2 SiO 3). Next, as indicated by step (4), the parts are rinsed in clear water one or two times. Other cleaning steps may also be incorporated, but the foregoing were illustrated as examples of typical cleaning steps used in this kind of process. Likewise the cleaning materials may be varied, depending upon commercial availability, nature of cleaning required etc. Stainless steel surfaces resist corrosive elements because of a thin film of oxides formed on them. This film can be stripped off or penetrated, but immediately reforms to protect the stainless steel against corrosion. An electroplated deposit of nickel cannot be adhered over the oxide film. Therefore, the film must be removed prior to an electrodeposit, and the electroplating must be done before the film forms again. In order to remove this film in the past, the stainless steel workpieces have been subjected to a sulfuric acid or other acidic treatment. An electrolytic sulfuric acid bath has been used in the past with the stainless steel parts connected in the circuit as cathodes. That is, the flow of current has been to the parts in the electrolytic bath. However, the adhesion of the nickel to the stainless steel following this treatment has not always been consistent. Particularly in the case of bright, annealed stainless steel, it has not been possible to get good, consistent adhesion of the nickel electroplated coating to the surface of the stainless steel. Thus, the invention herein relates to a change in the sulfuric acid treatment which is illustrated as step (5) in FIG. Essentially, the change involves connecting the workpieces or parts which are made of stainless steel in an anodic condition in the electrolytic circuit. Referring to FIG. 2, a number of workpieces or parts 20 are loosely held, in electrically contacting relationship, within a conductive metal, electrolytic-type container or basket 21. The basket, for which a suitable rack could be substituted, is immersed in a bath 24 of a sulfuric acid solution in a suitable container or tank 25. The parts are connected, through their contact with the metal basket 21, to a DC power source 26 and to a bath cathode 27. The connection to the power source is arranged so that the basket and the contained parts are anodic, as indicated by the plus sign. Thus, the current flows, as indicated by the arrows 28, from the parts to the bath cathode 27. This is the reverse of the normal electrolytic acid bath arrangement previously used. 3, schematically illustrates a rack 30 carrying parts 31, e.g. Automobile bumpers, suspended from hooks 32. The system is the same whether a basket or a rack is used to support the parts in the bath. The electrolytic acid treatment step is performed with an industrial grade sulfuric acid of an approximately 10% concentration by volume. Its specific gravity may be in the range of 1.84, and it is formed, for example, with 2.4 ounces per gallon of water or about 18 grams per liter. However, the concentration may be varied, so that the amounts given here are approximate. Trial and error tests are needed to determine the particular concentration best suited for a particular product. Concentration ranges of between about 10-70% may be feasible depending upon operating conditions and the nature of the parts. The acid is normally maintained at room temperature. The bath is operated at a current density, relative to the surface areas of the parts immersed in the bath, of between about 10-55 amps and preferably between about 45-55 amps per square foot or 4.6-5.9 amps per square meter. The voltage is at approximately 3-4 volts. The bath cathode 27 is preferably formed of chemically pure lead or of carbon. A typical treatment immersion time would be between about 10-30 seconds, but may be shortened or lengthened depending upon the nature of theparts to between about 5-90 seconds. The actual time is not critical; optimum times can be determined for a particular part through trial and error. The purpose of the acid treatment is to remove the oxide film and to activate the plating surface for the reception of the nickel plating. Thus, there is a range of variations of acid concentration, time, current density, voltage and the like within which reasonably optimum results can be obtained for different parts. Following the acid treatment, the parts are water rinsed, as illustrated by step (6). Thereafter, the parts are subjected to an acid-nickel or 'Woods' nickel strike electrolytic bath (see step (7)). This involves immersing the parts in an acid-nickel chloride solution containing hydrochloric acid for about 11/2-2 minutes at a temperature between about room temperature to 90° F. The bath may be operated at current densities of about 15-20 amps per square foot of part surface area at a voltage of approximately 3-4 volts, using electrolytic nickel anodes. The concentration of the nickel chloride and the hydrochloric acids may be varied, but it has been found that good results are obtained when the nickel chloride is in the range of about 32 ounces per gallon and the hydrochloric acid is in the range of about 16 ounces per gallon in the solution. After the nickel strike step, the parts are placed in a bright nickel plating bath, which is illustrated as step (8). Commercially available proprietary bath ingredients are used for this purpose. An example is a proprietary bright nickel bath which is commercially available from McGean-Rohoco. This contains single nickel salts (NiSO 4 6H 2 O) at about 18-24 ounces per gallon, nickel chloride (NiCl 2 6H 2 O) in the range of 16-18 ounces per gallon, and boric acid (H 3 BO 3)in the range of 6-7 ounces per gallon. This bath, operated at 3.6-4.0 pH, and at a temperature of between about 140°-145° F. (60°-66° C.), receives the parts for about fifteen minutes. The current densities are between about 40-45 amps per square foot of surface area of the parts (4.32-4.86 amps per square meter) with a voltage of between 6-7 volts. This provides the smooth bright nickel plating upon the surface of the parts. Following the nickel plating, the parts may be water rinsed, as shown in step (9), one or two times. At this point, the parts each have a nickel coating that is firmly and strongly adhered to its surface, as a result of the anodic acid treatment. Next, the nickel-coated parts are immersed in a chromic acid pre-plating dip (see step (10)). The chromic acid salts (CrO 3) may be in a concentration of about 1/2-3 ounces per gallon. The dip, operated at room temperature, receives the parts for between about 15-30 seconds. After the dip, the parts are immersed in an electrolytic chrome plate bath as shown in step (11). Various chrome-plating baths are commercially available. One suitable bath, which is proprietary to McGean-Rohoco, contains chromic acid salts (CrO 3) of between about 40-42 ounces per gallon, sulfuric acid (SO 4) at about 0.22 ounces per gallon, in the ratio of 170-190:1. The bath may be operated at a temperature of about 112°-116° F. (40° C.-44° C.). Typically, in the chrome plating, a current density of approximately 150 amps per square foot, at about 5 to 9 volts, is utilized. Following the chrome plating, the plated parts may be repeatedly rinsed in clear cold tap water and in hot water. Then the parts are dried either by air-drying or by a suitable dryer to complete the plating procedure. The present process is operative with different stainless steels and is especially useful for bright, annealed stainless steels. Examples of commercially available stainless steels for which this process is applicable are types 201 (UNS-S20100), 301 (UNS-S30100), 304 (UNS-S30400), 430 (UNS-S43000) and 434 (UNS-S43400). The plating process, including the various steps and materials utilized for each of the steps, may be varied. Typically, experience or trial and error testing are needed to determine the optimum operation and materials for each step. Thus, it is contemplated that this invention may be further developed within the scope of the following attached claims to achieve the intended purpose. Patent Citations Cited Patent Filing date Publication date Applicant Title * May 25, 1961 Apr 19, 1966 Crucible Steel Co America Method for enhancing corrosion resistance of stainless steels and products thereof * Jul 13, 1981 Nov 1, 1983 The United States Of America As Represented By The Secretary Of The Army Pretreatment of superalloys and stainless steels for electroplating * Oct 15, 1985 May 12, 1987 M&T Chemicals Inc. Method for forming adherent, bright, smooth and hard chromium electrodeposits on stainless steel substrates from high energy efficient chromium baths. Referenced by Citing Patent Filing date Publication date Applicant Title * Jul 25, 1988 Jul 21, 1992 Ardyne, Inc. Automotive bumper and its manufacturing process * Dec 3, 1991 Dec 13, 1994 Gerdon; Louis J. Process and apparatus for electroplating * Jun 11, 1993 Jul 18, 1995 Ugine S.A. Aug 22, 2016 - 36 sec - Uploaded by Rierien EkaTHE BEST WAY TO DOWNLOAD ROSETTA STONE TOTALE ON{MAC, PC, ANDROID. This installation guide shows you how to install and activate Rosetta Stone® Language Learning Download purchased from RosettaStone.com. Upon completing your purchase you'll be given an activation ID and a download link (Seen on the order confirmation page, and email confirmation). Note: Mac users please see. Installing Rosetta Stone® Language Learning (formerly Version 4) without a CD-ROM drive is fast and easy. Instead of using the discs that came with your product, you'll download them directly to your computer, and then install. You may also use this article if you've lost any of the installation disks included in your Rosetta Stone® Language Learning package. Note: Before attempting to install Rosetta Stone®, please make sure your device meets our. Note: You will need a high speed internet connection to download the Rosetta Stone® program. Download your Rosetta Stone product: Check your package for which language and levels you purchased, and click the corresponding link below. Once you have downloaded the file, you will double click on the downloaded file to install. Follow the onscreen prompts to complete the installation. Arabic| Italian||| Chinese|||| Japanese| Dutch|| Korean| English (American)|||| Polish|| English (British)||| Portuguese| French|||| Russian||| Farsi|| Spanish (Latin America)|||| Greek| Spanish (Spain)||| German||| Swedish|| Hebrew|| Turkish|| Hindi|| Tagalog|| Irish|| Vietnamese|| Install Rosetta Stone: Once you've finished downloading the program, you'll need to install it:|. Note: We recommend that you have the latest version of the before installing additional Language Levels. To Add Additional Language Levels: 1. Open Rosetta Stone Windows: You can open Rosetta Stone by going to: • Start > All Programs > Rosetta Stone > Rosetta Stone Version 3 > Rosetta Stone Version 3 (executable) Macintosh: • Go to your Macintosh Hard Drive (or Finder) and open the Applications folder. Open the Rosetta Stone Version 3 application. After Rosetta Stone launches, click the Preferences button on the upper-right corner of the screen. Select Add or Remove Languages 4. After the new window opens, click Add a Language Level. Insert your Language CD into your CD drive and wait 15 seconds for the drive to detect the CD. Note: On some Windows computers, the auto-play wizard may open a new window. Close this window. Go back to Rosetta Stone and click Continue. The Rosetta Stone program will now search for the language CD that is in your CD drive. Click Install selected language. When you see the prompt below, click Accept, to accept the location of the installation. Please Note: Installing a Language Level requires 600 MB of free disk space on your computer's hard drive. As the level installs, the following screen will appear, showing how much time is left in the installation process: 10. After the level has been installed, click Continue. Click the Preferences button at the upper-right corner of the screen then click Activate Products. Enter your Activation ID in the boxes on the Unactivated Products tab (this can be found on the Activation Card that came in your Rosetta Stone box). Click Activate on the bottom left corner of the activation window. If your computer has an internet connection and you see the message below, click Return to Home Screen and Try Again, to retry the activation. After you have successfully activated Rosetta Stone, click Continue. You may be taken back to the Unactivated Products page. Click the Activated Products tab. Click Continue on the bottom of the Activated Products window. If you are still in need of assistance, please contact. Well I have had the pleasure of setting up a KMS server in our environment, and found that the documentation from Microsoft is somewhat confusing. In light of this I will write the steps I used to configure the first KMS server in our organisation for use with Windows Server, Windows client and Microsoft Office activation. These steps will only include the installation of 1 KMS server. Installing first KMS Serve r Below are the steps I used to install the KMS server. We determined that due to the number of client activations, and the capacity of our infrastructure we had no problems installing this server on our secondary domain controller. From here on we will call it DC2. • Log onto and fetch your key: “Win Srv 2008 R2 Data Ctr/Itan KMS C” – Note your key may be similar, but either way it must end in either KMS B, or KMS C. • On DC2 we run CMD with elevation • Type slmgr /ipk xxxxx-xxxxx-xxxxx-xxxxx-xxxxx where the last section is the Key from your volume licensing website. • Open “Windows Firewall with Advanced Security” via Start menu -> Administrative Tools. • Under Inbound Rules scroll down to “Key Management Service (TCP-In)”, right click and select enable. • Reboot the machine – note you can restart the Software Licensing service but I preferred to reboot it (seeing as the server was not in use for anything else) net stop sppsvc && net start sppsvc • Activate server after reboot. This can be done via the GUI or by executing the following command from an elevated command prompt: slmgr.vbs /ato • Enables automatic DNS publishing by the KMS host by entering the below command in an elevated command promt. Note this should already be enabled, but just in case, we execute the command. Slmgr /sdns Now you are done installing your KMS server.Note this will provide activation for clients and/or servers depending on the KMS key you used to activate DC2. Office KMS activation will be covered in a later section. I do recommend verifying that the SRV record in DNS is created. Note that you should have no problems with the automatic creation if you are using the vanilla install of AD and have no specific security restrictions in DNS. To verify that the DNS record has been created open up DNS and check. Refer to the screenshot below to see where it lives: Installing Office KMS Host As mentioned above we have determined that the one KMS box (DC2) is suitable to do all of our activations for Microsoft products, so now we have to configure the Office KMS host on DC2. To do this we do the following: • Log onto and fetch your key: “Office 2010 Suites and Apps KMS” – Note your key may be similar. If unsure speak to your Microsoft Account Manager. • Download the Office 2010 KMS Host License Pack from the Microsoft website:. Its only 903kb so wont take too long. • Execute KeyManagementServiceHost.exe from your existing KMS server> In our case its DC2. Follow the prompt to finish the setup process. • When prompted enter the KMS key for Office 2010. Just as easy to setup. Now you are ready to activate Office 2010 with KMS. To help monitor this, please refer the the section below. Administering the KMS server I take it now you want to see whether it works and if clients can be activated. Now i will go into administering the KMS server, which will be quite brief as there is not much to it, and is really only there to aid in troubleshooting, and to have a sticky beak when implementing it. Once its running there is no real reason to keep going in and checking up on it. All functions to view settings and make changes are done through the already used VBS script slmgr.vbs. To see all the commands simply run slmgr from the command prompt. Note to execute changes you will need elevated command prompt. You will see the following screens: So the most common command that i used were: Displays license information (KMS Activation Count) cscript slmgr.vbs /dli Displays detailed license information cscript slmgr.vbs /dlv all For Office specific information you can run the below command to get the info wanted: cscript slmgr.vbs /dlv bfe7a195-4f8f-4f0b-a622-cf13c7d16864 Note I add cscript to the front of the command so that the output stays within the command window, this lets me output/scroll if there is a lot of data where as the usual vbs dialog crops the output. Configuring KMS Clients By default, Volume Licensing edition of Windows Vista, Windows 7, Windows Server 2008, and Windows Server 2008 R2 are KMS clients. If the computers the organisation wants to activate using KMS are using any of these operating systems and the network allows DNS auto-discovery, no further configuration is needed. If required you can configure the KMS client to connect to a specific KMS host, use a specific port and disable KMS auto-discovery. When deploying KMS clients using WAIK you can use 2 different methods to prepare the client: • SYSPREP – run Sysprep /generalize which will reset the activation timer along with removing SID and a few other settings. Read about this before actually using it. • Software License Manager – run slmgr.vbs /rearm in an elevated command prompt to reset the grace period back to 30 days. Note you can only perform this 3 times in total. You can also manually force activation of the client by using the GUI from Control Panel -> System or by running slmgr /ato. If you want to convert MAK installations of Windows or Office to KMS, you need to change their product key, and then reactivate. Hi Chuck, Sorry if the steps were not clear enough for you but I assure you that configuring KMS on a Windows 2008 R2 server is very much possible by following my article. The steps under heading “Installing first KMS Server” provides the steps to install it. There is no download as such because KMS ships with the product. If you type slmgr from a command prompt you will find that all the available options in configuring KMS are presented in several scripted windows. Sorry if the document was not clear. If time allows I will update the first section to include more information so there is no confusion in the future. NOTE: Office does have an installation, and the link and steps were provided. Kind Regards, Ivan. Hey, thanks for the great post. Helped out a lot. Re: How to Activate 2008 from command line If you're asking how to do it in Windows Server 2008 Core, the command to activate the. View Licensing Status and Activation ID of your Windows. Slmgr.vbs is a command line. Because of WMI changes in Windows 7 and Windows Server 2008 R2. Jul 13, 2011 Command line to Windows Activation in Win7. Windows 7 IT Pro > Windows 7 Installation, Setup, and Deployment. How to Activate Windows Server 2008's Local Administrator How to Activate Windows Server 2008's Local Administrator. At the command line type. In my case, I *only* wanted to do an Office 2010 KMS host. I didn’t care (at least for now) about KMS for OS or servers. So I just downloaded and ran the Office 2010 KMS Host License Pack software from link above on a 2008R2 server, entered my Office 2010 KMS key when prompted during install, and it did everything for me except add the firewall rule. In other words, I never had a KMS at this site before, just ran that program, and was good to go. Even the DNS was configured by it correctly. Hi Jim, The KMS key is used to activate a host running KMS with Microsoft activation server. Once activated this host can then activate an unlimited number of computers within your organisation. You can use the same KMS key to activate a total of 6 hosts running KMS, and each host can be activated a total of 10 times each. If you have multiple KMS keys (like we do) due to Enterprise Agreement renewals or similar situations then you only need to use the most current KMS key available, although every single one of them will work. If you have multiple KMS keys because you have multiple Enterprise Agreements and multiple enterprises that needs activating (and they are all on the same network) then im not sure how you got yourself into this scenario, and i also dont beleive its supported. Hope this answers your questions, Ivan. H Paul, I had a look at your output file (didn’t add it as its very long) but i noticed a couple of differences between yours and mine (windows 2012 server). You have the following extra in your’s that i don’t: • Remaining SKU rearm count: -1 • Product Key Channel: Volume:CSVLK This is definitely going to be due to you running Windows Server 2012 R2. I think something is not quite right as you have the following for your Server activations: Remaining Windows rearm count: 996 Remaining SKU rearm count: 1001 I would suggest contacting MS technical support (phone support) as they wont charge anything, and they can confirm the information for you with their internal references. I would be very interested in what they have to say. Note: When i logged a call with MS, they tried to spend 10 minutes fixing it over the phone with very mundane steps, but then they escalated the call and i had someone remotely investigate and fix my issues for me. Definitely recommend it. Cheers, Ivan. Hello Kevin, Thank you for visiting the Microsoft Office Genuine Advantage (OGA) forum. Your issue is related to Product Activation. The purpose of this forum is the support of the OGA program and your question falls out of the scope for our support. I n an attempt to assist I would like to provide some information which may help. I do suggest trying to activate using the “Activate by Phone” method from the activation Wizard. Dec 26, 2011 Microsoft Office 2003 Key/Re. Then you can logon the the online store and retrieve the product key: http://office.microsoft.com/en-us/access-help/find. This article will tell you how to find Microsoft Excel 2003 Product key in. A valid serial number? Excel 2003 product key in your Office 2003 disc. Mar 29, 2017 Licensing Activation fails in Office 2003. When you try to activate Microsoft Office 2003 after you. To complete the activation of Office 2003. Activate All Microsoft Office 2010/2013 Versions For FREE Without a Product Key - Duration: 2:31 Office 2003 activation crack keygen. Next Level 407,906 views Office. Telephone numbers for Activation Centers vary by product license and country/region. Use the number provided on your Activation Wizard screen to call the Microsoft Activation Center. Please follow the below guidance for telephone activation for your version of Office: 1) Start any Office program. 2) In the “ Office Activation Wizard”, click the “ Activate by using the telephone” option, and then click Next 3) Read the “ Microsoft Office Privacy Policy” page, and then click “ Next”. In the “ Select your location” list, select a country or region. C all the telepho ne number that is listed on line 2. The customer service agent will ask you for the installation ID and will give you a confirmation ID in return. Type the confirmation ID in the boxes provided. 4) Click “ Next”. 5) On the “ Activation Complete” page, click “ Finish”. Here are various websites which will explain Activation as well as provide you with troubleshooting processes should you experience any and/or further complications: About product activation in Microsoft Office System products Microsoft Product Activation Activate Microsoft Office programs How to install and activate 2007 Microsoft Office system programs How to install, activate, and register Microsoft Office 2003 programs How to troubleshoot problems you may experience when trying to activate Office products Thank you, Matt Prall, MS OGA Forum Manager. Viral message purports to clue readers in on a number of little known tips and tricks for mobile phone use, including dialing 112 to access a worldwide emergency network. Description Viral text / Forwarded email Circulating since Sep. 2005 (multiple versions) Status: Mostly false (see details below) Example Email text contributed by Greg M., Feb. 15, 2007: THINGS YOU NEVER KNEW YOUR CELL PHONE COULD DO. There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things that you can do with it: FIRST Subject: Emergency The Emergency Number worldwide for Mobile is 112. If you find yourself out of the coverage area of your mobile; network and there is an emergency, dial 112 and the mobile will search any existing network to establish the emergency number for you, and interestingly this number 112 can be dialed even if the keypad is locked. SECOND Subject: Have you locked your keys in the car? Does your car have remote keyless entry? This may come in handy someday. Good reason to own a cell phone: If you lock your keys in the car and the spare keys are at home, call someone at home on their cell phone from your cell phone. Hold your cell phone about a foot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other 'remote' for your car, you can unlock the doors (or the trunk). Editor's Note: It works fine! We tried it out and it unlocked our car over a cell phone!' THIRD Subject: Hidden Battery Power Imagine your cell battery is very low. To activate, press the keys *3370# your cell will restart with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your cell next time. FOURTH How to disable a STOLEN mobile phone? How to Activate Reserve Battery Power in a Cell. You may be able to activate reserve battery power. How to Activate the Reserve Battery in Samsung Cell Phones. Back up your data. If you do not wish to restore or backup your Google account data, uncheck the boxes. Activate Your Phone (continued). Learn how to order a new battery or replace the battery in a Verizon Battery Backup. Like a cell phone. The PowerReserve or Battery Backup Unit are. Order the latest HTC cell phones, smartphones, tablets & mobile devices from AT&T. To check your Mobile phone's serial number, key in the following digits on your phone: * # 0 6 # A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone gets stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won't get your phone back, but at least you know that whoever stole it can't use/sell it either. If everybody does this, there would be no point in people stealing mobile phones. FIFTH Cell phone companies are charging us $1.00 to $1.75 or more for 411 information calls when they don't have to. Most of us do not carry a telephone directory in our vehicle, which makes this situation even more of a problem. When you need to use the 411 information option, simply dial: (800) FREE 411, or (800) 373-3411 without incurring any charge at all. Program this into your cell phone now. This is the kind of information people don't mind receiving, so pass it on to your family and friends. Analysis Beware forwarded emails offering esoteric tips and tricks 'you never knew.' Most of the claims in this message are either false or have limited applicability in the real world. We'll examine them one by one. CLAIM: The worldwide emergency number for cell phones is 112. 112 is the Europe-wide emergency phone number. Throughout most of the European Union and some neighboring countries, dialing 112 will connect callers to local emergency services. The system doesn't include North and South America, Asia, or Africa. According to some sources, many, but not all, cell phone models are pre-programmed to redirect calls made to any of the most common emergency numbers (e.g., 911, 999, 000, 112) to the proper local services regardless of the caller's location. And many, but not all, cell phone models and service providers will allow the most common emergency numbers to be dialed even if the caller is outside his or her regular service area, or the phone lacks a SIM card. CLAIM: Unlock a car door with your cell phone and a spare remote key. As in these pages, cell phones and remote keyless entry systems work on entirely different radio frequencies. Therefore, cell phones are incapable of re-transmitting the signal from a remote key to unlock a car door. CLAIM: Press *3370# to access 'reserve battery power.' On some Nokia phones, users can punch in special codes and toggle between speech codec modes to 1) enhance voice transmission quality at the cost of diminished battery performance, or 2) enhance battery performance by decreasing voice quality. Apparently, some users have misconstrued the latter as 'tapping into reserve battery power.' On that score the email is doubly erroneous because *3370# is the code for enhancing voice quality — so using it actually decreases battery life! CLAIM: Press *#06# to disable a stolen cell phone. On some cell phone models, but not all, pressing *#06# will cause the phone's 15-digit International Mobile Equipment Identity to be displayed. Some service providers, but not all, can use that information to deactivate the handset. In any case, it isn't necessary to supply an IMEI number to cancel your cellular account in the event of theft; simply call your provider, give them the appropriate account information, and tell them the phone was stolen. CLAIM: Make 411 calls on your cell phone without charge by dialing (800) FREE 411. Basically true (see previous comments on Free 411), though cell phone users may still incur a charge for minutes used, depending on the specifics of their plan. Sources and further reading Wikipedia Information about the 112 emergency number in Europe Unofficial listing of user codes for Nokia phones Last updated: 10/03/13. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
February 2018
Categories |