20091231

ANONIMITY - ONE STEP FURTHER - ACCESSING BLOCKED WEBS

Introduction

Welcome to the new generation of Search Engines. In this article, I wouldn't concentrate much about search engines. This article borned because of my office needs. In my office, I wasn't able to access all the sites. only few sites were accessible including some "tech support forums", "Microsoft" etc. etc. In this case, most of us try to use the proxy websites. In this article, I will discuss few ways with which your office people would block your internet access and A NEW & Fresh way which will get you the access back.

Ways with which your company's IT dept. may block your internet connection

  1. Keyword tracking [which happens in my office]
  2. Access Allow softwares [most of the companies]
  3. Manual Blocking [happens in small companies]
Note:- There might be otherways but these are the widely used ways.

1. Keyword Tracking:

In this method, there is no specific software which blocks the website. Whenever you open up a website, its "index" is crawled in this method. Depending on the text of the website, it will be categorized on the server. Few categories will be allowed by your IT dept. like "computers & internet" which are necessary in any comapny. Most of the categories will be blocked like "person & dating" "adult & sexuality".

Even "iframe" are crawled in this method. So thats the reason proxies wouldn't work because, in proxy site first of all it will have words on it like proxy, access internet and all... so the website would be blocked under "proxies & translators" category. Even if you find a proxy website, which opens in your office, that wouldn;t work. Because the moment, you open "orkut.com" in that proxy site, on the next page the part which is supposed to open up orkut.com will say "blocked under category : personal & dating". So even working proxy wouldn't help you.
This concept is quite confusing to new people. But this is the strongest defense. In this type, you cant even use

2. Access Allow Softwares:

Most of you all know about it. Software blocking specific groups of websites. You can easily bypass it with SSH or some proxy sites. Even you can edit registry keys and get your internet to work. So there nothing much to write about it.

3.Manual Blocking

This mainly happens in small companies and very easy to bypass. If you are little more then average in computers then you can edit the account permissions or remove the blocked sites from the list and get access.

The New Generation of Proxy

So, coming right at the point, Heres what helped me to bypass my company's keyword tracking type blockage. This is a new search engine, which lets you surf anonymously. As you know, most of the companies will allow Search Engines, so most likely you will have access to it. And if you do, then consider your work done.

Yauba.com ---- Is the URL of the search engine.

Steps to follow to view bocked sites:

  1. Goto yauba.com
  2. In search field type "anything" you want, replace "all places" with "internet sites"
  3. Hit "magnifying glass" to search
  4. On the result page you will see 2 options, [a] Go directly to that website, [b] Goto it Anonimously!
  5. Click on "Visit Anonymously (Slower)
  6. You should be done!
Advantages:
  1. It encodes the URLs of the websites you serach. So better bypass.
  2. Works at almost all the palces, offices, school.
  3. New engine, so i bet most of the IT dept. wouldn't know about it
Disadvantages:
  1. Makes surfing slower
  2. Doesn't allow cookies. 
  3. Doesn't allow java scripts.

Hidden Emotions In Yahoo 

    Cracking CISCO Router Passwords

    Cisco Router hacking is considered to be extra elite and really kewl. It is really a great exercise for your gray cells, especially if the target system has Kerberos, a Firewall and some other Network Security software installed.
    Anyway, almost always the main motive behind getting root on a system is to get the password file. Once you get the Router password file, then you need to be able to decrypt the encrypted passwords stored by it. Well, in this section,we will learn just that.
    The following is a C program which demonstrates how to decrypt a CISCO password.
    _______________________________
    #include
    #include
    char xlat[] = {
    0x64, 0x73, 0x66, 0x64, 0x3b, 0x6b, 0x66, 0x6f,
    0x41, 0x2c, 0x2e, 0x69, 0x79, 0x65, 0x77, 0x72,
    0x6b, 0x6c, 0x64, 0x4a, 0x4b, 0x44
    };
    char pw_str1[] = "password 7 ";
    char pw_str2[] = "enable-password 7 ";
    char *pname;
    cdecrypt(enc_pw, dec_pw)
    char *enc_pw;
    char *dec_pw;
    {
    unsigned int seed, i, val = 0;
    if(strlen(enc_pw) & 1)
    return(-1);
    seed = (enc_pw[0] - '0') * 10 + enc_pw[1] - '0';
    if (seed > 15 || !isdigit(enc_pw[0]) || !isdigit(enc_pw[1]))
    return(-1);
    for (i = 2 ; i <= strlen(enc_pw); i++) {
    if(i !=2 && !(i & 1)) {
    dec_pw[i / 2 - 2] = val ^ xlat[seed++];
    val = 0;
    }
    val *= 16;
    if(isdigit(enc_pw[i] = toupper(enc_pw[i]))) {
    val += enc_pw[i] - '0';
    continue;
    }
    if(enc_pw[i] >= 'A' && enc_pw[i] <= 'F') {
    val += enc_pw[i] - 'A' + 10;
    continue;
    }
    if(strlen(enc_pw) != i)
    return(-1);
    }
    dec_pw[++i / 2] = 0;
    return(0);
    }
    usage()
    {
    fprintf(stdout, "Usage: %s -p \n", pname);
    fprintf(stdout, " %s \n", pname);
    return(0);
    }
    main(argc,argv)
    int argc;
    char **argv;
    {
    FILE *in = stdin, *out = stdout;
    char line[257];
    char passwd[65];
    unsigned int i, pw_pos;
    pname = argv[0];
    if(argc > 1)
    {
    if(argc > 3) {
    usage();
    exit(1);
    }
    if(argv[1][0] == '-')
    {
    switch(argv[1][1]) {
    case 'h':
    usage();
    break;
    case 'p':
    if(cdecrypt(argv[2], passwd)) {
    fprintf(stderr, "Error.\n");
    exit(1);
    }
    fprintf(stdout, "password: %s\n", passwd);
    break;
    default:
    fprintf(stderr, "%s: unknow option.", pname);
    }
    return(0);
    }
    if((in = fopen(argv[1], "rt")) == NULL)
    exit(1);
    if(argc > 2)
    if((out = fopen(argv[2], "wt")) == NULL)
    exit(1);
    }
    while(1) {
    for(i = 0; i < 256; i++) {
    if((line[i] = fgetc(in)) == EOF) {
    if(i)
    break;
    fclose(in);
    fclose(out);
    return(0);
    }
    if(line[i] == '\r')
    i--;
    if(line[i] == '\n')
    break;
    }
    pw_pos = 0;
    line[i] = 0;
    if(!strncmp(line, pw_str1, strlen(pw_str1)))
    pw_pos = strlen(pw_str1);
    if(!strncmp(line, pw_str2, strlen(pw_str2)))
    pw_pos = strlen(pw_str2);
    if(!pw_pos) {
    fprintf(stdout, "%s\n", line);
    continue;
    }
    if(cdecrypt(&line[pw_pos], passwd)) {
    fprintf(stderr, "Error.\n");
    exit(1);
    }
    else {
    if(pw_pos == strlen(pw_str1))
    fprintf(out, "%s", pw_str1);
    else
    fprintf(out, "%s", pw_str2);
    fprintf(out, "%s\n", passwd);
    }
    }
    }
    ______________________________
    NOTE: The above works only on a Linux platform. If you are running Windows, then you will have to use
    some brute force password cracker.

    How To Zip And Encrypt Your Documents For Free

    Do you remember how long ago you have heard about Zip for the first time? I think it was even before Windows was invented. Internet was an unknown word yet at that time. Computers were DOS operated and the instructions for compressing and decompressing documents seemed like magic words to me. What I didn’t know by then, but I’ve just found out tonight is that the .zip standard was invented by PKWARE. This explains why those commands were starting with pkzip and pkunzip. For those of you who are interested, PKWARE is giving away a non-commercial use license of a much more modern version of zip, the SecureZIP Express. Not only it is free of charge, but you have the chance to win cool prizes in the new “Decrypt and Drive” contest.

    SecureZIP Express has several useful features. The basic ones are compressing/decompressing and encryption of files that you store or send. Compressing files is a great way to save storage space, especially on memory sticks and CDs; besides, there are situations in which we want our files to be secured, as they are not meant to be seen by anybody. The software also includes a digital certificate so you can exchange files securely with others without using passwords. Only the person the file was encrypted for can open it when you use a digital certificate. SecureZIP Express has no toolbars or spyware. For years, PKWARE has given free .zip software away. Now, together with the software, they are giving away a lot of prizes including a Honda scooter, bicycles, Wii games, gas cards, and more.
    For entering the contest, you need to visit www.DecryptandDrive.com, download the free software, then come back to play the game. You need to have SecureZIP, and the digital certificate it installs, on the computer you play the game from. SecureZIP Express is also available for download atwww.securezip.com. Good luck and let me know if you win something.

    How do I use a proxy server?

    Please be aware that the use of proxy servers without the express permission from the owner of the proxy server may be illegal in some states and/or countries. Use at your own risk.

    Use your favorite search engine and search for 'proxy server list'. You'll find many sites with lists of proxy server's, their IP address, the port they listen on, and usually what country they are in. Write down a few of them.
    You may see references to four different types of proxy servers:

    Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)

    Anonymous Proxy - This type of proxy server indentifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonal anonymity for most users.

    Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.

    High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. 

    Multiplexing

    It is the backbone of communication both analog as well as digital. Multiplexing means sending multiple signals or streams of information on a carrier at the same time in the form of a single, complex signal(A mixture of all the signals needed to be sent) and then recovering the separate signals at the receiving end. In analog transmission(example telephone line), signals are commonly multiplexed using frequency-division multiplexing (FDM), in which the carrier bandwidth is divided into sub channels of different frequency widths, each carrying a signal at the same time in parallel.

    In digital transmission, signals are commonly multiplexed(combined) using
    time-division multiplexing (TDM), in which the multiple signals(more than one) are carried over the same channel in alternating time slots. In some optical fiber networks, multiple signals are carried together as separate wavelengths of light in a multiplexed signal using dense wavelength division multiplexing(DWDM).

    Get Any Microsoft Products for FREE!!

    Introduction

    This article will basically introduce you to the funniest yet useful bug in Microsoft
     systems. Do at your own risk as neither Impcompfact nor the author of the article are responsible for anything legal related to it

    Background

    I work as a manager in HP for north american customers, so i have been hanging around in this field since a long time. So just by a little research i managed to find the bug!

    Lets start 

    PART 1

    1. Go to ebay.com
    2. Search for "Microsoft Products". (Suppose you chose a "gaming keyboard")
    3. Select any product below $150, and tell the seller that "I am ready to buy, but just to make sure that I am getting the right thing, i want to know the PID number of the product".
    4. Seller will mail you PID number.

    Part 2

    1. Call up microsoft customer service OR have a chat with their representative
    2. I dont have the number byhearted so goto support.microsoft.com and find that out
    3. Tell them that " I own this (the same) Gaming keyboard, its broken, some of the keys are not working, I have done all the troubleshooting."
    4. VOILA!, they will say that "Its ok, sir, we will send your another!"
    5. YOUR DONE!!


    How it works?

    When they send you another keyboard, they would NOT ask you to return the existing broken keyboard, because the SHIPPING will cost them more than the price of the keyboard. So thats what is the loophole

    Why till $150?

    As i mentioned above, if the replacement product costs more than $150, then they will ask you to return the existing broken product at the time of delivery, which apperantly we dont have 
    .

    Can I get caught?

    NO!. Its done through complete legal way, I have already ordered 5 of them and have received 3 at my friend's place in US. I am expecting them to drop 

    Cleaning Your Computer: 12 Simple Tips


    A stitch in time saves nine! Believe it or not, but this adage works brilliantly for your computer too. Not only will keeping your computer clean help you save on maintenance cost, but it will also keep you stress free so that you can focus on your work and nothing else! So, why is cleaning your computer so important? Well, basically because dust and debris collect in your system, causing your computer to heat up, which can eventually lead to hardware failure.
    Here are a few simple tips that will keep you in the clear. Read on!
    1.) To clean your computer case, first unplug your system power from the electrical outlet. Remove all the cables and connectors from the back side of your computer. The computer will require the fans to be blown out as well. Some PCs have multiple fans: one on the processor and one or two on the power supply. Make sure you clean them all. The best thing to use is probably compressed air. Just blow that air all around the hardware components, while keeping the nozzle at least four to five inches away from the main board components.
    2.) Another good alternative to compressed air is to use a portable battery powered vacuum that can effectively remove the dust, dirt and hair from the motherboard and prevent it from getting trapped within the case. However, do not use a standard electricity powered vacuum, as it can cause a lot of static electricity that can damage your computer. When using the vacuum, it is vital that you stay a couple inches away from the motherboard and all the other components to help prevent contact, as well as, to help prevent anything from being sucked into the vacuum. Ensure that you do not remove any small components with the vacuum, such as jumpers.
    3.) To clean your keyboard, pick up a can of compressed air at your local office supply store. In case you're not sure, compressed air is a handy invention that forces air from a can out through a long thin straw. You can use it to clean out dust and debris on your keyboard, without having to take the whole thing apart. Be careful not to blow dust into your hard drive though, as that may cause damage to your machine. It's a good idea to turn the keyboard upside down and give it a few good shakes before you use it again. If you're brave, you can pop off the keys and soak them in a solution of ammonia and water, but be careful, because not all the keys come off easily. If you feel resistance, stop!
    4.) If you feel the need to test fate, you can pull out the memory and other cards from your computer and gently rub a pencil eraser on the contacts before putting them back in. However, don't pull any cards out unless you're having problems reaching certain areas.
    5.) Remember, never open a CRT monitor. Even when it's unplugged, they retain enough current to seriously harm you.
    6.) When cleaning the inside of your computer (motherboard, etc.), make sure your computer is off. Also, never place your computer on the ground. You should always use a computer table or shelf while you're cleaning.
    7.) Only use an air duster/canned air to remove dust from your computer's components. It's best to do it outside as well so that it doesn’t end up all over your house!
    8.) When cleaning your monitor, make sure you do so with a clean rag and only use cleaning agents designed for electronics.
    9.) When you're finished with the inside, use a lightly dampened cloth or paper towel to wipe off the outside of your computer case. Gently wipe down the casing using Q-Tips to clean small places like vent holes and disk drive openings.
    10.) Never clean the inside computer components or other circuit boards with a damp or wet cloth.
    11.) Wipe down the outside of your mouse with a slightly damp cloth. Next, unscrew the ring from the bottom of your mouse and remove the ball. Dust off the ball with a soft cloth and look inside the cavity of your mouse. There will probably be some dust clinging to the rollers that move the ball and you can just scrape that out with a Q-Tip. When you're finished, replace the ball and ring. Optical mice will require little maintenance, but ball mice can be disassembled. Clean the ball itself, as well as, the X and Y axis rollers.
    12.) To keep your computer looking clean longer, purchase an inexpensive plastic covering for your equipment!
    If you follow all of these guidelines, your computer and all of its equipment will shine like new!

    How to remove one operating system from dual boot windows?

    You can install two or more operating systems on the same partition or on same hard drive. In such dual operating system is installed on the hardware and when you start your computer it shows a choice between two windows to choose from. For example you can install windows 98 with windows 2000 or Windows XP and also windows XP with Windows vista. You can install both operating systems on the same partition (both on C: drive) or on different partitions (one operating system on C drive and other on D drive). But installing more than one operating system on same drive kill the system performance.

    Whether you have installed your both operating systems on C drive or one on C drive and other on D drive, system store the root files of the both operating systems on C drive, so you can delete one any operating system with editing these root files. Sometimes when you install a new operating system the previous one is not deleted and a new one is created than old operating system must be deleted. There is no any direct method to uninstall one operating system; you can do this only with format the partition or delete windows folder after editing the “Boot.ini”


    Follow the given steps to edit the Boot.ini to delete one operating system:
    • In case any problem after editing, first backup the Boot.ini file.
    • Click Start button then type
    • sysdm.cpl in Run option then press Enter for next.
    • Now on the Advance tab, click on Setting under theStartup and Recovery area.
    • Under the System Startup area, click on Edit button, and you will get a Notepad editable file.
    • If you have installed two operating systems (windows XP and Windows 2000) on same hard disk then it will look as in Boot.ini.
    • [boot loader]
      timeout=30
      default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
      [operating systems]
      multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Windows XP Professional" /fastdetect
      multi(0)disk(0)rdisk(0)partition(2)\WINNT="Windows 2000 Professional" /fastdetect

    • According to above example, if you want to delete windows 2000 then delete the “multi(0)disk(0)rdisk(0)partition(2)\WINNT="Windows 2000 Professional" /fastdetect” line and save the file.
    • But if you want to delete windows XP then delete the “multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Windows XP Professional" /fastdetect” line and save the file.
    • At the end delete the operating system folder that you no longer require or format the drive where the other operating system contains.
    • Now close the all programs and restart your computer after any changes to go into effect.

    WHAT IS A TCP/IP ROUTING TABLE?


     A routing table is used by TCP/IP network routers to calculate the destinations of messages it is responsible for forwarding. The table is a small in-memory database managed by the router's built-in hardware and software.

    Routing Table Entries and Sizes

    Routing tables contain a list of IP addresses. Each IP address identifies a remote router (or other network gateway) that the local router is configured to recognize. For each IP  address, the routing table additionally stores anetwork mask and other data that specifies the destination IP address ranges that remote device will accept.
    Home network routers utilize a very small routing table because they simply forward all outbound traffic to the Internet Service Provider (ISP)gateway which takes care of all other routing steps. Home router tables typically contain ten or fewer entries. By comparison, the largest routers at the core of the Internet backbone must maintain the full Internet routing table that exceeds 100,000 entries and growing as the Internet expands.
    Two hypothetical, partial routing table entries are shown below:
    IP Address: 172.48.11.181 - Network Mask: 255.255.255.255

    IP Address: 192.168.1.1 - Network Mask: 255.255.255.0

    In this example, the first entry represents the route to the ISP's primary DNS server. Requests made from the home network to any destination on the Internet will be sent to the IP address 172.48.11.181 for forwarding. The second entry represents the route between any computers within the home network, where the home router has IP address 192.168.1.1.

    Dynamic vs. Static Routing

    Home routers set up their routing tables automatically when connected to the ISP, a process called dynamic routing. They generate one routing table entry for each of the ISPsDNS servers (primary, secondary and tertiary if available) and one entry for routing among all the home computers. They may also generate a few additional routes for other special cases including multicast and broadcast routes.
    Most residential network routers prevent you from manually overriding or changing the routing table. However, business routers typically allow network administrators to manually update or manipulate routing tables. This so-called static routing can be useful when optimizing for network performance and reliability.

    Viewing the Contents of Routing Tables

    On home broadband routers, the routing table contents are typically shown on a screen inside the administrative console.
    On Windows and Unix/Linux computers, the netstat -r command also displays the contents of the routing table configured on the local computer.

    MANAGE/DELETE DUPLICATE FILES TO RECOVER DISK SPACE IN WIDNOWS XP

    Even if you're a computer user keen on keeping your system healthy (i.e., you regularly delete unnecessary files, empty the Recycle Bin, and run Disk Defragmenter), you may be unaware of a potentially big waster of hard disk space: duplicate files. Applications can litter your hard disk with duplicate files, or you can actually create duplicate files by copying files from one folder to another.

    Windows XP's default installation doesn't provide you with a decent utility for tracking down duplicate files. However, Microsoft does have a tool called Duplicate Finder, which is part of the Windows XP Service Pack 2 Support Tools. Here's how to install and use the Duplicate Finder tool:

    1. Download the Windows XP Service Pack 2 Support Tools and follow the instructions for installing the Complete installation version.
    2. Open the Run dialog box by pressing [Windows]R.
    3. Type Dupfinder in the Open text box and click OK.
    4. Once DupFinder loads, simply select the drive or folder to search and then click the Start Search button.
    5. When DupFinder completes its search, you can scan through the list and examine the duplicate files.

    Here are tips for working with the list of duplicate files:

    * Use either the Print Report or Export Data commands on the File menu to create a permanent record of the duplicate files.
    * Use the Sort command on the View menu to reorganize the list for better analysis.
    * To get more detailed information about any file, select the file, pull down the File menu, and select the Info command.
    * Leave duplicate files in the Windows folder and its subfolders alone.
    * If you don't recognize the duplicate file, it's better to use the Rename or Move commands on the File menu rather than the Delete command.

    Note: This tip applies to both Windows XP Home and Windows XP Professional.


    20091230

    10 benefits of Microsoft Office 2010, reasons to upgrade

    Microsoft office 2010 beta just released officially has gotta refreshed look and feel, and minus many of the niggles and annoyances of earlier versions – and plenty of performance boosts. Personally, I am quite impressed by New Micorsoft Office 14 aka office 2010.

    The most obvious change between the Technical Preview and the beta is a new set of product icons. Windows 7 users get jump list support, as well as dynamic icons that show, for example, whether you’ve got new mail, or if Outlook has been disconnected from a mail server. There are many other advantages and reasons on Why switch to new MS Office 2010.

    Already mentioned that you can access and work on new Office tools from Web, DesktopPC or even smartphone so it adds to mobility and enables better communication. In addition, there are many new components added. Found a great list of benefits of using Office 2010 on Softpedia which explains its advantages in better way.

    1. Save travel costs by enabling your people with better communication tools.
    Office 2010 helps save time and money by providing one-click communication through unified communications technology, and document sharing from within Microsoft Word, PowerPoint, and Excel, without the need to switch applications. This makes virtual meetings more effective so team members can get more done without being in the same room.

    2. Beat deadlines by working more effectively as a team.

    Co-authoring allows multiple people to work on the same document at the same time, such as an RFP, to respond faster and meet deadlines. With Office 2010, multiple team members can work on Word 2010 and PowerPoint 2010 documents and be able to see who else is working on what sections.

    3. Use Office virtually anywhere and on virtually any device.

    With Office Web Apps, you can review and make minor edits to documents in Word, Excel, PowerPoint, and OneNote 2010 from any supported Internet Explorer, Firefox, or Safari browser. All of the changes are saved and appear exactly as you intended, so you can seamlessly move from a desktop to the Web, and vice versa.

    4. Gain control over your e-mail and calendar.

    Outlook 2010 can help you take control of your day with conversation management tools, mail tips, calendar preview, and more. Stay better organized and up-do-date with less effort and find information you need fast.

    5. Make informed business decisions the second you need to

    Excel 2010 provides tools for improved data visualization, so you can gain key insights quickly and easily turn the numbers into a story to share with others. You can convey whole trends in a single cell with Sparklines, choose from more styles and icons in conditional formatting, and highlight specific items such as “max/min” in a single click.

    6. Create sophisticated marketing in-house to get your business noticed.

    Office 2010 puts you in the director’s chair, enabling you to create dazzling digital content in PowerPoint 2010 that comes to life with cutting-edge audio/video capabilities and animation enhancements. Your business can cut costs by reducing the need for third-party multimedia tools and design agencies.

    7. Enable employees to work offline and keep your business moving forward.

    SharePoint Workspace 2010 allows everyone to take content from SharePoint sites offline and work with that content from their desktop, without reliance on an Internet connection. This makes it easier for IT to drive a strategy with more consistent use of collaboration tools based on SharePoint technology throughout the organization.

    8. Be more productive by finding what you need faster.

    Office 2010 extends the toolbar throughout all applications, making it easier to find the commands you need. And the new Microsoft Office Backstage view (available in all applications except Communicator) gives your people quick access to important operations such as viewing document information, saving, printing, and sharing.

    9. Protect inboxes from malicious attacks, so everyone in the business can rest easier.

    Office 2010 provides a Protected View feature to help you guard against malware in your e-mail attachments and Internet files, as well as in Word, PowerPoint, and Excel documents.

    10. Stay organized by keeping the right details in the right place.

    OneNote is your essential “catch-all.” From daily sales figures to news articles clipped from the Web, you can make everything accessible and at the ready. You can even create side notes that stay on your screen as you move between different programs, so you can keep your thoughts organized as you multi-task.
    Microsoft office 2010 is creating waves and many of you may have using it since its first technical preview leaked on torrents and now Redmond Company has released the Beta officially for public download with genuine product keys.