Which product replace TMG functionality?

Source: Which product replace TMG functionality?

After i reading this full blog below i am going to try ccproxy then others… ūüôā

 

Which product replace TMG functionality? 

Question

    • Question
      Vote as helpful

      2
      Vote

      Hi,

      I have several customers that wanted to deploy TMG Server as a web proxy/firewall back-end, but we all know that TMG is dieing? Which product offers exactly the same functionalities?


      Cristian L Ruiz

      Thursday, November 08, 2012 7:57 PM
      Avatar of Cristian Ruiz
      (Partner)

      65 Points

All replies

    • Question
      Vote as helpful

      0
      Vote

      Exactly the same is a big ask and I assume you are focusing here on outbound web proxy and firewall only?

      A lot of the solutions from Juniper, Palo Alto, Fortinet amongst others provide firewall products that also include outbound proxy features. It is just a matter of reviewing which one best meets you exact needs.

      I have heard good things about Palo Alto and Fortinet from “ex-TMGers” and I also have some experience with the Juniper SSG appliances which provide good firewall/VPN features and also proxy-type security functionality (HTTP AV scanning, IPS, URL filtering etc.)

      Cheers

      JJ


      Jason Jones | Microsoft MVP | Silversands Ltd | My Blogs: http://blog.msedge.org.uk and http://blog.msfirewall.org.uk

      Friday, November 09, 2012 10:47 AM
      Avatar of Jason Jones [MSFT]
      Microsoft
      (MSFT, Partner)

      14,623 Points

      Moderator
    • Question
      Vote as helpful

      0
      Vote

      And for website and VPN replacement use Direct Access, I have recently set this up and it works well as a VPN replacement.

      Duncan

      Monday, November 12, 2012 9:47 AM
      Avatar of duncan320
      SystemTek

      65 Points

    • Question
      Vote as helpful

      2
      Vote

      Direct Access is not a replacement of VPN in few scenarios, e.g. VPN for external workers who shouldn’t access all services as company’s workers. Of course we can implement several Direct Access implementations in one company, but external workers are enforced to have desktops in company’s domain.

      Abandon of ISA/TMG line is completely stupid Microsoft’s step. In our case, every Exchange migration/implementation is equal to implementation of ISA/TMG. They don’t want to use other types of software – because just mail admins can control how smtp or other types of traffic behaves. Now, some “network guys” will be responsible how it will work.

      I don’t know other error-less software from Microsoft that just works. And Microsoft wants to abandon it.

      I know company with ISA 2006 array performing tasks as:
      – VPN concentrator;
      – LAN/WAN router with 5 connected networks and virtually 3 next connected by dialup lines;
      – web proxy for internal users;
      – publishing for external users.

      Completely stupid step.

      Monday, November 12, 2012 11:28 AM
      Avatar of e-micra
      Microsoft, Poland
      (MSFT, Partner)

      25 Points

    • Question
      Vote as helpful

      0
      Vote

      Hi E-micra

      Everyones setup is different, im not sure i understand your point about VPN, if they have a user account on the domain say domain\smithj then there access is controlled by the domain, it dont matter if they sit on a PC in the office or a laptop/desktop at home they still hav ethe same access, if at home its provided by direct access.

      I also agree Microsoft dropping TMG is a big deal lots of people use it., shame really.

      Monday, November 12, 2012 11:40 AM
      Avatar of duncan320
      SystemTek

      65 Points

    • Question
      Vote as helpful

      0
      Vote

      Hi Duncan320,

      I know that every installation is completely different, but ISA/TMG with some lacks of functionality (IPv6 or publishing of Lync arrays) are good tools for many, many tasks. What is strange – we have two companies which want to implement TMG arrays in the next year – they know, that Microsoft abandons ISA/TMG, one of them have UAG array, but they still want to implement completely new TMG or migrate from ISA 2006.

      In many companies where main proxy gateway is not on ISA/TMG but on some type of hardware – they very often use ISA/TMG used only for publishing also as an emergency exit.

      Monday, November 12, 2012 11:52 AM
      Avatar of e-micra
      Microsoft, Poland
      (MSFT, Partner)

      25 Points

    • Question
      Vote as helpful

      0
      Vote

      Hi E-micra

      Everyones setup is different, im not sure i understand your point about VPN, if they have a user account on the domain say domain\smithj then there access is controlled by the domain, it dont matter if they sit on a PC in the office or a laptop/desktop at home they still hav ethe same access, if at home its provided by direct access.

      I also agree Microsoft dropping TMG is a big deal lots of people use it., shame really.

      Direct Access is only supported on Domain Joined machines?  GPOs required?

      TMG is awesome, UAG is not suitable as it costs so much more because of more comprehensive functionality.  Maybe this is why TMG being dropped, in favour of license hikes for those that need continued support?


      Ash Cox

      Monday, November 12, 2012 2:01 PM
      Avatar of AshCox
      n/a

      65 Points

    • Question
      Vote as helpful

      0
      Vote

      Hi,

      Thank you for the post.

      DirectAccess servers and clients must be memebers of an AD DS domain.

      Regards,


      Nick Gu – MSFT

      Tuesday, November 13, 2012 2:23 AM
      Avatar of Nick Gu - MSFT
      (MSFT CSG)

      26,355 Points

      Moderator
    • Question
      Vote as helpful

      0
      Vote

      People,

      thanks for all replies that I will be analyze.

      But! When I ask for a TMG replacement, I am looking for just one product the could replace the same, I repeat, “the same” functionalities of TMG/ISA.

      As an IT professional with 14 years experience I learned and taught ISA Server (MCT), I am very sad with the decision of Microsoft.


      Cristian L Ruiz

      Tuesday, November 13, 2012 2:50 AM
      Avatar of Cristian Ruiz
      (Partner)

      65 Points

    • Question
      Vote as helpful

      0
      Vote

      Cristian,

      the answer is very simple – it’s impossible. This is the problem and Microsoft persuades us, that it’s possible.

      Semi-official answer: changes in tcp/ip stack in Windows 2012 are bigger and TMG is not prepared for it. Cute.

      Question: how long will we wait for UAG (without TMG) for Windows 2012?

      regards,
      e-micra

      Tuesday, November 13, 2012 8:00 AM
      Avatar of e-micra
      Microsoft, Poland
      (MSFT, Partner)

      25 Points

    • Question
      Vote as helpful

      0
      Vote

      I am looking at F5’s virtual network appliance for Hyper-V and I expect that it will be the best alternative to using Microsoft Forefront TMG and UAG.¬†http://www.techrepublic.com/blog/networking/hyper-v-grows-up-quickly-with-f5-virtual-appliance-networking-features/6031

      http://www.f5.com/products/technology/microsoft/virtualization/

      If F5 delivers on this I will say goodbye to Microsoft for edge¬†security and just fold it in as a part of my System Center 2012 SP1 private cloud for 2013. This does appear to be Microsoft’s direction on this manner I just wish they would of said it sooner and make it clear to consumers.


      Nathan Storms | The Architect Evangelist

      Monday, December 17, 2012 8:56 PM
      Avatar of NathanStorms
      iQmetrix
      (Partner)

      810 Points

    • Question
      Vote as helpful

      0
      Vote

      Cristian,

      the answer is very simple – it’s impossible. This is the problem and Microsoft persuades us, that it’s possible.

      Semi-official answer: changes in tcp/ip stack in Windows 2012 are bigger and TMG is not prepared for it. Cute.

      Question: how long will we wait for UAG (without TMG) for Windows 2012?

      regards,
      e-micra

      Ok,

      It is understandable, that IP stack is growing. But why Microsoft is dropping the Forward Proxy Functionality? The whole ISAPI filter system is so advanced and so many products is using this…

      Regards,

      Stanislaw

      Thursday, March 21, 2013 11:58 AM
      Avatar of Stanislaw Wawszczak
      (Partner)

      69 Points

    • Question
      Vote as helpful

      0
      Vote

      We purchased two tird-party TMG appliances last year and haven’t implemented them yet.

      Much to our surprise we cannot even purchase the HTTP anti-v or content filtering subscription as of 12/31/12.

      What are we supposed to do now!

      Monday, April 08, 2013 3:47 PM
      Avatar of King Buzzo
      Edwards LAN Dynamix

      0 Points

    • Question
      Vote as helpful

      1
      Vote

      I just have learned recently of TMG’s demise and am very sad about it, too.

      An important point many people seem to forget/miss is user authentication and, how I’d call it, transparent proxying/firewalling (Firewall Client). There is a lot of “crap” LOB software out there which doesn’t play with NTLM/Kerberos authenticating proxies; either you go for an IP rule nightmare, which is neither flexible nor secure, or you use a TMG approach incorporating Firewall Client. And if needed just drop a proxy exclusion using Group Policy to the users based on Group Membership and you are good to go.

      In my view some organizations seem to be a bit too IP-centric; what we have been practising for years and I regard the “real MS AD way” is to¬†base the majority of user permissions on group memberships (“roles”); so the user is an independent entity –¬†no matter what PC, no matter the network segment the user logs in – the permissions follow. We have a lot of this, users using PCs from their colleagues, moves of people between departments, stuff like that. And it might also be a legal issue “who did xy”.

      So if someone can recommend a firewalling/proxying solution¬†that can transparently handle “stubborn applications” in a way TMG did then please let me know. Reverse proxying of RD Web Access, Exchange ActiveSync, web servers as well as PPTP (PEAP) are also¬†important for us. I don’t know if there is one appliance/software that fits all or if different pieces of equipment are required in our situation.

      Regards

      Markus

      Tuesday, May 07, 2013 8:16 AM
      Avatar of Markus E

      25 Points

    • Question
      Vote as helpful

      2
      Vote

      Hello Christian,

      We’ve conducted an in-depth case study of all available TMG replacement products some time ago (at the beginning of 2013) and made a write-up about our experiences here:¬†https://www.winsec.nl/2013/01/16/securing-edge-post-tmg-world/

      Among the tested products were big names like Cisco, F5, Citrix and many others, but we ended up picking Sophos UTM as our replacement of choice due to their flexibility, price/performance and almost perfect match feature wise.

      If you want to discuss this further, shoot me a tweet @JornLutters, or reply on our¬†blog ūüôā

      • Edited by¬†JornLutters¬†Tuesday, July 16, 2013 2:15 PM¬†Link added
      Tuesday, July 16, 2013 1:59 PM
      Avatar of JornLutters
      Sophos
      (Partner)

      10 Points

    • Question
      Vote as helpful

      0
      Vote

      Wow Jorn, thanks for that blog post. We too are in the same boat (need to replace TMG at some point) and that writeup is great!

      Tuesday, October 01, 2013 6:32 PM
      Avatar of Maxim M
      (Partner)

      655 Points

    • Question
      Vote as helpful

      0
      Vote

      Louis,

      Is this the Citrix Virtual appliance VPX version ?


      /* Server Support Specialist */

      Thursday, November 07, 2013 6:44 AM
      Avatar of Senior System Engineer
      Free Enterprise

      485 Points

    • Question
      Vote as helpful

      0
      Vote

      Hey Jorn,

      You mentioned that TMG supports client certificate auth in forward proxy scenario (last bullet point below):

      • Foward proxy
        • URL filtering with URLCategories
        • Content scanning
        • Malware filtering
        • HTTPS inspection
        • User authentication
          • Active Directory Integration
          • Or using Basic or NTLM authentication
          • With two-factor support using client certificates

      Can you please help me how to achieve that. i want my clients to pass a certificate that proxy will validate.

      Thursday, January 16, 2014 11:35 PM
      Avatar of Vijeta Khatri [MSFT]

      0 Points

    • Question
      Vote as helpful

      0
      Vote

      Hi Vijetra,

      from what I see in the TMG 2010 GUI SSL auth is only supported in:

      1. Forward proxy: Only if the TMG is an upstream server then downstream servers can authenticate using a certificate. This does not seem to be a valid/working scenario for end users. At least that’s what the message box tells me.
      2. Reverse proxy: Web listeners can be configured to require a client certificate. If you combine that with Kerberos Constrained Delegation (KCD) you can even drive client cert auth for web sites that do not support certificate auth per se.

      I guess in the VPN part there might also be certificates in the play, but I haven’t looked there and it was not the point of the question.

      Hope that helps,

      Markus

      Monday, January 20, 2014 7:48 AM
      Avatar of Markus E

      25 Points

    • Question
      Vote as helpful

      1
      Vote

      My vision that many Microsoft users are only IT people and don’t know the differences in types of firewalls. Proxy is just one of type of corporate firewall. The way to solve the request from your customers – to educate them that there are other types of firewall which are not based of proxy technologies.

      I see that people installed HTTP proxy many years ago and in reality missed all other protocols security. What about threats (for example viruses or vulnerabilities) in RDP, POP3, SMB, OSPF and other protocols they have and use in their networks?

      Nowadays people should controls traffic of all application they use – not only HTTP. That is why the class of products who inspects only HTTP – is dying. Therefore (I guess) Microsoft decided to stop this product as this was designed to control only HTTP and webmail.

      Many companies start to use normal firewalls which controls all other applications in their networks. Besides such firewalls work for internal people transparently together with more deep protection when they visit some website categories, with blocking malware in downloads and uploads, intrusions by hackers, inspection threats inside SSL or SSH file transfers and so on.

      The market now looks at UTM and NGFW devices and my vision that every company should see on this. NGFW appliances are designed on specialised network hardware platform in comparison to UTM appliances which are software based components installed on usual HP or IBM servers. UTM is cheaper and NGFW is more reliable. UTM = Unified Threat Management, NGFW = Next Generation Firewall.

      So my solution: you can google for NGFW and buy any NGFW device you need. This will increase your security and provide real good network device with all routing an switching functions.

      If you ask me what I prefer then my answer: Palo Alto Networks. For example here you can see how many applications you can control by Next Generation Firewall: https://applipedia.paloaltonetworks.com/

      Denis

      Microsoft MVP Enterprise Security 2008-2014

      Saturday, December 27, 2014 12:11 PM
      Avatar of Denis Batrankov
      Hewlett-Packard
      (MCC, MVP)

      5 Points

    • Question
      Vote as helpful

      0
      Vote

      @Denis: You make some very good points here which I agree to – yet there are some specialities of TMG that have to be taken into account:

      In our corporation TMG has filled other gaps than that of a traditional proxy only (we have separate content filter systems for regular web and e-mail traffic):

      1. A useful helper to cope with the “stubborn” apps. Although .NET is finally improving things a bit yet still there are so many little and bigger developer studios with specialized LOB applications that just aren’t able to properly cope with an NTLM proxy. And¬†even in .NET it is not a given that people use the DefaultNetworkCredentials of the CredentialCache.¬†I strongly believe in role-based concepts and sticking permissions to users, not IPs and have people and part-time workers moving around; so the TMG Client enables those problematic applications to still get online even as they do not support NTLM proxy servers.

      2. Publishing. TMG has become the enabler of a kind of enterprise portal with several web sites/applications published for employees and specific partners. This includes EAS, RDWeb, OWA and several IIS sites. I should also mention that most of them are “full-featured” – using Kerberos Constrained Delegation to cope eg. with double hop problems to the SQL backends and to ensure that the best security protocol in use. Exchange for example is mapped to different hostnames to enable testing/transitioning from account-based EAS to certificate-based EAS.

      3. The VPN functionality (using PEAP) has solved many remote access needs for certain managers and partners where stuff like our Cisco VPN Client just was to clumsy and maintenance-intensive on uncontrolled/unknown PCs. It’s a pity what happened to PPP and that¬†people don’t differentiate between PAP/CHAP and PEAP/EAP-TLS yet I agree, something has to be done here in the near future.

      Point 3 is quite obvious and I have no doubt that almost any NGFW or whatever product can solve this. What we regrettably lose is a comfort/”out-of-the-box” experience – VPN clients can be a challenge of their own, especially when multiple products reside on the same machine (as with partners that have to support multiple customers with different VPN systems). And the clients need to be NAT-safe (UDP encapsulated or HTTPS).

      But I’m a bit doubtful/hesitant about 1 and 2:

      Point 1 needs some kind of client software provided by the NGFW manufacturer to force WinSOCK API calls over the NGFW proxy instead of trying to go directly. It seems Barracuda has something like this but I haven’t tested it yet/haven’t checked to what degree. This can certainly be solved in other but clumsy and maintenance-intensive ways like establishing a proxy service on a different port with only Basic Auth and requiring to configure all of these LOB apps manually.

      Point 2 is probably the most difficult to solve. I’m not sure which of the manufactures provide proper KCD support, multiple listeners with different auth schemes for different scenarios and mapping single hosts in different ways. And if such a product exists can we afford it on our tight budget?

      We are currently in progress migrating our Cisco PIX to Barracuda NG but still struggle with our partner to get the simple stuff (firewall rules) right so it remains to be seen what Barracuda can do for us on the TMG side. It may take some months or a year but I could let you know how we fared then.

      It just makes me a little bit nervous when people like KEMP have a TMG deprecation webcast about 2 months ago yet can’t show their security module with Kerberos support¬†which was at that time “under development” ūüôā Technical realities and requirements often collide with marketing brochures …

      Sincerely

      Markus

      Monday, December 29, 2014 9:10 AM
      Avatar of Markus E

      25 Points

    • Question
      Vote as helpful

      0
      Vote

      In my searching for a proxy web server replacement I’ve really liked CCproxy.

      CCProxy is a light weight software package that can be used to make any internet facing Windows machine into a proxy server.  I discovered it through Google searching and reading forums while looking for a replacement for Microsoft Threat Management Gateway 2010.

      The thing that most impressed me with CCProxy is how utterly simple it is.¬† You download a small executable from their site, install it in about 20 seconds or less on an internet facing Windows OS, and you have the framework in place.¬† That’s it. ¬†Depending on how strict your monitoring/user based access/web filtering needs are and how familiar you are with the product you are seriously just a few minutes to a couple of hours from download to a fully functional, in use proxy service.

      Compare that to TMG 2010 or ISA 2004. Those products take hours to get set up and running to be a proxy server, and that’s if you know what you are doing.¬† The difference really being that the Microsoft proxy products include a huge mountain of more advanced features beyond just proxy web servicing.¬† If you need your proxy server to also be a firewall, router, malware detector, traffic inspector/snooper then they have their place.¬† But for basic proxy web service they are overkill.

      CCproxy has everything most places would need in a proxy.  User/group based access with a windows domain can be configured.  Traffic types allowed and ports are customizable.  Live monitoring of web use and which IPs using it.  Text file based, customizable, long term logging that is simple, clean and efficient.  It can use the openDNS platform for intelligent web filtering.  Text file based white and black list ability.  Time restricted access.  Mail proxy for SMTP and POP3 ability.  Web page Caching.  Using another proxy server for the internet access (they call that Cascading proxy).

      Anyhow, I haven’t used it for long.¬† But I was able to figure it all out to get it running exactly how I wanted it within about 2 hours and I’ve been greatly impressed.¬† The licensing prices aren’t bad either.¬† As of this writing it was around between 4-7 dollars per client that connects to it (depending on how many you buy, it gets cheaper per seat).

      Here is the link to the Youngzsoft site:  http://www.youngzsoft.net/ccproxy/

      Sunday, April 05, 2015 2:50 AM
      Avatar of Brian L Miller
      Xerox

      50 Points

    • Question
      Vote as helpful

      0
      Vote

      For simple forward scenarios certainly nice but I guess there are a myriad of products including firewalls for that part ūüôā The tricky part is doing reverse proxying rightusing different auth schemes (Kerberos, NTLM, passthrough, …) and hostname/path mappings and URL rewrites.

      If it does the job for you, great!

      Tuesday, April 07, 2015 7:27 AM
      Avatar of Markus E

      25 Points

  • Question
    Vote as helpful

    0
    Vote

    Just as a little update, in case you missed it: For reverse scenarios we now have at least a little glimpse of hope in the Windows Server 2012 R2 product. There is a new¬†Web Application Proxy¬†role to install. Web Application Proxy is meant to combine Federation Proxy Services and Reverse Proxying capabilities. One important prerequisite is that you need at least one AD FS server based on 2012 R2 (don’t now¬†if lower AD FS versions will work)¬†even if you are just trying to reverse proxy. It goes without saying that you also need Certificate Services but I can hardly imagine an AD forest doing without nowadays.

    There is one or another caveat regarding auth capabilities yet you can already do Kerberos or pass-through auth. For Kerberos you get the nice Federation Services login form (you need to publish the AD FS server, too).

    For more info see:

    https://www.youtube.com/watch?v=xspsDhs7WUo (great webcast comparing IIS ARR and the new Web Application Proxy role)

    https://www.youtube.com/watch?v=9ijqPphzQtw¬†(from TechEd, haven’t had time to fully watch on my own)

    MS at least claims that the Web Application Proxy capabilities/auth schemes will be expanded in the upcoming server OS releases (not so funny regarding licensing, however, except you have an EA).

    Regards, Markus

Advertisements

Chance productcode Home to Pro (0xc004f050) : Windows10

all 5 comments

[‚Äď]danskeman¬†2 points¬†10 months ago

Click on go to store at activation menu and that will take you to the buy pro menu. Click on link “I have a 10 pro key” and enter key and you will upgrade to 10 pro.

[‚Äď]Breros[S]¬†1 point¬†10 months ago

I just tried your suggestion, but it didn’t work. Still got the errorcode: 0xc004f050
Thanks for replying.

[‚Äď]danskeman¬†1 point¬†10 months ago

ok try entering the generic code first to force upgrade and then your code later to activate

VK7JG-NPHTM-C97JM-9MPGT-3V66T

[‚Äď]Breros[S]¬†1 point¬†10 months ago

That’s what I did a half hour ago, thanks anyway. I already put the solution in the post for others to find.

[‚Äď]danskeman¬†1 point¬†10 months ago

Yeah – I was just replying but did not see your update

How to troubleshoot Product Activation in Windows 10 – Microsoft Community

Source: How to troubleshoot Product Activation in Windows 10 – Microsoft Community

 

How to troubleshoot Product Activation in Windows 10 

Technical Level : Basic

Summary
This article provides information and resources for troubleshooting Product Activation in Windows 10.

Details

If you are running Windows 10 Anniversary Update and you are experiencing activation problems, please check out the following article for tips how to resolve them.

Use a Digital License to Manage and Activate Windows 10 Anniversary Update

For information about Finding Your Windows 10 Product key, see:

How to Find your Windows 10 Product Key – groovyPostWarning: There are “Tech Support Scams” pretending to be Windows 10 Activation Technologies. Please be vigilant. Learn more in the following article:

PSA: Beware of Windows 10 Activation Tech Support Scams

If you are running the Windows 10 July Public Build 10240 (1507), please review the following article for troubleshooting information:

How to Fix Windows 10 Product Key Activation Not Working

Please review the latest Wiki Article about using your Windows 7, Windows 8.0 or Windows 8.1 product key to Install and Activate using the Windows 10 November Update (1511) build 10586. See link to article above which discusses issues  activating the initial July build 10240.

How to install and activate Windows 10 using your Windows 7 or Windows 8 product key

Top reasons Windows 10 fails activate:

  • Not connected to the Internet
  • Antivirus or Firewall utilities might be blocking product activation
  • Your computer is behind a proxy server, disabling the proxy temporarily or using chat support can resolve this
  • Your computer¬†did not upgrade from a genuine version.
  • The wrong edition is installed.
  • Your computer is running a Volume License Client requiring access to a Key Management Server (KMS) to activate. This can usually be performed by logging onto your company’s domain or VPN.

Update:

After upgrading to Windows 10, you cannot use your Windows 7 or Windows 8/8.1 product key.

Click Do this Later.

Image

Verify if you have the latest Windows 10 build installed.

How to verify if you downloaded or installed the Windows 10

If you do, then all you need to do is change the product key using your Windows 7 or 8 product key:

Click Start > Settings > Update & security > Activation > Change the product key then enter the new product key then click Next to Activate

Image

If you don’t have the November Update or later version installed, download it then perform a repair upgrade:

How to download official Windows 10 ISO files

then

How to: perform a repair upgrade using the Windows 10 ISO file

also review

How to install and activate Windows 10 using your Windows 7 or Windows 8 product key

also

How to Find Your Product Key After Upgrading to Windows 10

Windows 8.0, Windows 8.1 or Windows 10 came preinstalled on my computer, how do I find the product key?

Press Windows key + X

Click Command Prompt (admin)

Enter the following command:

wmic path SoftwareLicensingService get OA3xOriginalProductKey

Hit Enter

The product key will be revealed, copy the product key then enter it

Click Start > Settings > Update & security > Activation > Change the product key then enter the new product key then click Next to Activate

If you are unable to activate Windows 10 after all the above and you are certain you have the correct edition installed, then please attempt phone activation:

Activate Your Windows 10 License via Microsoft Chat Support

Windows 7 came preinstalled on my computer, how do I find the product key?

The product key is usually located on the COA sticker attached to the bottom of your laptop or in the battery compartment. In some rare cases it can also be found in the memory compartment. For tower systems, look at the top or the side of the system unit. It looks like the following:

Image

If the Certificate of Authenticity (COA) sticker is damaged or letters or not legible, you will have to consider the following options:

  • Use a digital camera to capture a picture of the COA then enlarge it on your computer.
  • If the COA sticker is damaged, then you would need to use the recovery partition to reinstall Windows 7, this will exempt the need to use the product key to activate your Windows 7 installation.
  • If your recovery partition is not available or damaged, you should¬†contact the manufacturer¬†of your computer and request a recovery disc set you can use to reinstall Windows 7. They might charge a small shipping and handling fee. This will exempt the need to use the product key also.
  • If none of the above options work or is not available, then its best you purchase a new Windows 10 license:

Buy Windows 10 Home/Pro

I bought a retail box copy of Windows 7 or Windows 8 or Windows 8.1; where do I find the product key?

For Windows 7, the product key can be located on a pamphlet in inside the Windows 7 box.

Image

For Windows 8 or Windows 8.1, the product key can found on a small business size card inside the Windows 8 box.

Image

I was running a premium business edition of Windows 7 such as Professional or Ultimate or Windows 8/8.1 Pro but the Media Creation Tool installed Windows 10 Home instead of Pro

If you performed a clean install using the Media Creation Tool it installs the specific edition based on the OEM Marker in the BIOS. So if the computer originally came preinstalled with Windows 7 Starter, Home Basic, Home Premium or Windows 8/8.1 Core/Single Language Windows 10 Home will be installed.

Workaround: 

Upgrade to Windows 10 Pro using the following default product key:

VK7JG-NPHTM-C97JM-9MPGT-3V66T

Review instructions how to perform an Easy Upgrade using the default key:

How to Perform an Easy Upgrade in Windows 10

After upgrading, proceed to enter the Windows 7 Professional, Ultimate or Windows 8 Pro product key.

Click Start > Settings > Update & security > Activation > Change the product key then enter the new product key then click Next to Activate

I had Windows 8.1 with Bing installed then used the Media Creation Tool to upgrade to Windows 10 Home but it is not activating.

Computers or devices running Windows 8/8.1 Single Language (SL) or Windows 8.1 with Bing should use the Microsoft TechBench website to download Windows 10 SL and use that to upgrade their computer. Your best course of action is to first try Rolling Back to Windows 8.1 with Bing then perform the upgrade properly.

Learn more: How to download official Windows 10 ISO files

When I upgrade a preinstalled (OEM) or retail version of Windows 7 or Windows 8/8.1 license to Windows 10, does that license remain OEM or become a retail license?

If you upgrade from a OEM or retail version of Windows 7 or Windows 8/8.1 to the free Windows 10 upgrade this summer, the license is consumed into it. Because the free upgrade is derived from the base qualifying license, Windows 10 will carry that licensing too.

If you upgrade from a retail version, it carries the rights of a retail version.

If you upgrade from a OEM version, it carries the rights of a OEM version.

Full version (Retail):

– Includes transfer rights to another computer.

– Doesn’t require a previous qualifying version of Windows.

– Expensive

Upgrade version (Retail):

– Includes transfer rights to another computer.

– require a previous qualifying version of Windows.

– Expensive, but cheaper than full version

OEM :

OEM versions of Windows are identical to Full License Retail versions except for the following:

– OEM versions do not offer any free Microsoft direct support from Microsoft support personnel

– OEM licenses are tied to the very first computer you install and activate it on

– OEM versions allow all hardware upgrades except for an upgrade to a different model motherboard

– OEM versions cannot be used to directly upgrade from an older Windows operating system

What happens if I change my motherboard?

As it pertains to the OEM license this will invalidate the Windows 10 upgrade license because it will no longer have a previous base qualifying license which is required for the free upgrade. You will then have to purchase a full retail Windows 10 license. If the base qualifying license (Windows 7 or Windows 8.1) was a full retail version, then yes, you can transfer it.

From the Windows 10 end user license agreement:

b. Stand-alone software. If you acquired the software as stand-alone software (and also if you upgraded from software you acquired as stand-alone software), you may transfer the software to another device that belongs to you. You may also transfer the software to a device owned by someone else if (i) you are the first licensed user of the software and (ii) the new user agrees to the terms of this agreement. You may use the backup copy we allow you to make or the media that the software came on to transfer the software. Every time you transfer the software to a new device, you must remove the software from the prior device. You may not transfer the software to share licenses between devices.

Learn more about transferring your Windows 10 license:

How to Transfer your Windows 10 License to a New Computer

Windows 10 Activation reports your license will soon expire.

This can happen for a number of reasons:

  • You copied a Windows 10 Pro off the Internet (usually a volume license – organization – key) and changed on a Windows 10 Home installation. Windows 10 Pro is not free.¬†If this is what you did, you will need to reinstall the previous edition or version you were running. You inadvertently installed the wrong edition.
    • The copy of Windows 10 you download and upgrade from will correspond with the edition of Windows you have installed, if it does not, this is why you might be experiencing problems activating:
  • Windows 7 Starter, Home Basic, Home Premium, Windows 8.0 Core, Windows 8.1 Core¬†will install¬†Windows¬†10 Home¬†
  • Windows 7 Professional, Windows 7 Ultimate, Windows 8.0 Pro, Windows 8.1 Pro¬†will installWindows¬†10 Pro

To find out if you have the right edition installed:

Click Start > Settings > Update & security > Activation > Edition.

If the edition of Windows 10 installed does not correspond with the edition of Windows 7 or Windows 8 you were previously running, then you need to reinstall the right edition.

Image

Use the appropriate product key for the edition of Windows 10 you have installed.

If Windows 7 or Windows 8 came preinstalled, use that that product key to update the product key values.

or use one of the following product keys:

1) Enter the Windows 10 Home/Pro default key. (see list below)

Windows 10 Home: YTMG3-N6DKC-DKB77-7M9GH-8HVX7
Windows 10 Pro: VK7JG-NPHTM-C97JM-9MPGT-3V66T

Warning: please ensure you use the right product key for the right edition.

Click Start > Settings > Update & security > Activation > Change the product key then enter the new product key then click Next to Activate

Image

Users who mistakenly entered a Volume License Key (VLK) and now want to activate using a consumer product key or license. They may encounter and activation error of 0x8007007B or0xC004f210 or the product key enter error of 0xC004F050 or 0xC004E016.

You may try the workaround mentioned below and see if it helps.

*Important* РDo not follow these steps if:

– The device is in Deferred mode, meaning that the Activation page in Settings says to connect to the internet in order to activate.
– The device is intended to be used on a corporate network with a KMS server (not necessarily domain joined)
РThe user is trying to enter a Windows 7/8/8.1 MAK key that is the same edition as the currently installed OS and seeing SL_E_EDITION_MISMATCHED (0xC004F210). The correct fix is for the user to install the published GVLK for the edition (https://technet.microsoft.com/en-us/library/jj612867.aspx) and then try to install the Windows 7/8/8.1 MAK key again.

Workaround:
If you confirmed they have attempted to apply a VLK to Consumer software, they are essentially changing their licensing.  They need to get their system off the VL path and back on the Consumer correct path.  This is the current workaround:

1) Enter the Windows 10 Home/Pro default key. (see list below)

Win 10 Home: YTMG3-N6DKC-DKB77-7M9GH-8HVX7
Win 10 Pro: VK7JG-NPHTM-C97JM-9MPGT-3V66T
Win 10 Home N: 4CPRK-NM3K3-X6XXQ-RXX86-WXCHW
Win 10 Home Single Language: BT79Q-G7N6G-PGBYW-4YWX6-6F4BT
Win 10 Home Country Specific: 7B6NC-V3438-TRQG7-8TCCX-H6DDY
Win 10 Professional N: 2B87N-8KFHP-DKV6R-Y2C8J-PKCKT

2) Check for the new error returned – they should now receive error 7001

3) Use their Windows 7 or 8 product key to complete the activation (Note: If they do not have a Win 7/8 key or we are not able to extract using CMD, they will need to purchase a 7/8 Key or a 10 license).

How to import youtube subscriptions to a new channel EASIEST WAY! – YouTube

First, if you like to select only few of subscriptions then login to feedly and delete subscriptions as you like then import opml file. After

go to http://evanreilly.com/youtube-subscriptions-importer/

and fellow the below youtube video

You’re going to need to be using google chrome.
http://evanreilly.com/youtube-subscri…
RSS Export location:

 

Never Do¬†These Things in¬†Foreign Countries Under Any Circumstances

Source: Never Do These Things in Foreign Countries Under Any Circumstances

 

We’re all well aware of the fact that while visiting a foreign country, we must obey certain local traditions and common rules.

Just in case, we decided to go through some rules and social conventions found in various different countries that you shouldn’t break under any circumstances.

Things keeping you from success – Business Insider

These time-wasting activities will trip you up.

Source: Things keeping you from success – Business Insider

 

Too often we act as if time is infinitely available.

There’s always another day, right? But that’s a huge mistake.

Whether you’re working or having fun, being mindful about how you spend your time is one of the best things you can do for your life.

Here are 18 time-wasters to stop cutting out today.

1. Running from problems.

Sooner or later, you will run out of places to run to. Confront your problems and get it over with.

2. Cursing the darkness.

We all have struggles and failures, but if you can focus your energy on a solution ‚ÄĒ even a small one ‚ÄĒ you’ve started the process of finding your way out.

3. Lying to yourself.

The truth really does set you free. The beliefs and thoughts that limit your options aren’t representing your truth, and they’re keeping you from realizing your visions.

4. Fear.

It is human nature to feel fear, and most of us tend to fear what we don’t understand. If you can understand your fears, you can free yourself from them.

5. Negativity.

Focus on yourself with optimism and positivity instead of dwelling on the things that are holding you back.

6. The word impossible.

There’s no bigger impediment to any achievement than not trying at all, or trying and giving up.

7. Winging it.

Success favors those who work hard, put in plenty of time, and do whatever it takes to make it work. When you do your part, success has a way of showing up.

sad tired frustratedFlickr/jazbeck

8. Cynicism.

Human understanding and kindness are at the core of the happiest people.

9. Distraction.

Stop wasting your time chasing shiny objects and focus on what you really need in your life.

10. Selfishness.

A truly successful life is made of giving, sharing, and praise, not taking, demanding, and criticizing.

11. Overthinking.

Stop overthinking everything because that just makes things worse. Think good thoughts and good things will happen.

12. Hoarding.

Any form of hoarding is unhealthy and wastes your time, whether it’s possessions, information, wisdom, or emotion.

13. Denial.

Look at your life and ask yourself whether what you are doing is truly representing what’s within you; if not, stop denying what you really want and need.

14. Criticism.

It’s easy to criticize, but it’s rarely helpful. Praise is far more powerful and rewarding for everyone all around.

15. Comparison.

Remember, everyone has a unique situation and is fighting their own battles. Stop comparing yourself to others, it’s never productive.

16. Procrastination.

There’s no bigger waste of time than putting things off ‚ÄĒ it adds stress and takes away options for solving problems.

17. Complaining.

Taking responsibility today is the first step in accomplishing something great tomorrow.

18. Perfection.

Remember, those who seldom make mistakes seldom make discoveries. Instead of searching for perfection, take this moment and make it perfect.

And, above all, stop squandering your gifts. This life is about making yourself useful and necessary, so find your purpose and run with it.

Who knows what you’ll find time for when you let go of all the time-wasting negatives in your life?

10¬†Psychological Problems That Arise Because of¬†Incorrect Parenting Behavior

Sad but true.

Source: 10 Psychological Problems That Arise Because of Incorrect Parenting Behavior

 

10 Psychological Problems That Arise Because of Incorrect Parenting Behavior

10 Psychological Problems That Arise Because of Incorrect Parenting Behavior

With most psychological issues, the reasons are quite trivial: childhood emotional impressions.

Bright Side found typical character traits of people whose lives were directed by the seemingly ordinary behavior of their parents.

Helicopter parents” are always watching and scrutinizing their child‚Äôs life. They mean well enough, but such overprotection leads to¬†psychological issues.¬†If¬†you can‚Äôt make an¬†important decision without a¬†call to¬†your parents, you¬†were probably such a¬†child.

If parents always tell their child how many problems he causes, he will conclude that everyone would be better off without him.

As a result, the child grows into an adult who subconsciously finds ways to destroy himself: alcohol, smoking, drugs, or extreme sports.

‚ÄúBe¬†serious!‚Äú ‚ÄĚStop goofing around!” ‚ÄúDon‚Äôt be¬†such a¬†baby!‚Ä̬†Such phrases will create an¬†overly earnest adult who‚Äôs never fully relaxed, doesn‚Äôt understand children, and hates immature people.

Parents who¬†compare¬†their child with more “accomplished” kids¬†will get a¬†self-critical teenager, then an¬†adult with an¬†inferiority complex. They always try to¬†perform better while hating themselves for not being superior in¬†the first place.

Directives not to trust anyone will lead to that: perceiving the world as hostile with traps everywhere. Such grown-ups may have serious trust issues.

‚ÄúYou‚Äôre too young for that!‚Äú The perfect way to¬†raise a¬†‚ÄĚkidult.” This child will probably stay ‚Äútoo young‚ÄĚ forever, being dependent and needing a¬†parenting partner.

If¬†parents frequently use such phrases as¬†‚ÄúDon‚Äôt be¬†smart with¬†me!‚Äú¬†or¬†‚ÄĚStop daydreaming!”¬†their child will have neither his own opinion, initiative, or¬†leadership qualities.¬†As¬†an¬†adult, they will probably drown their ambitions in¬†alcohol and ‚Äúfun.‚ÄĚ

A lack of emotions and sensitivity in parents can’t be ignored by their child’s subconscious. When frequently told to stop crying or complaining, the child closes in on himself. These suppressed feelings can turn into psychosomatic issues.

“We¬†refused ourselves everything for you to¬†have a¬†higher education!”¬†The feeling of¬†undeserved guilt overwhelms a¬†child.¬†The same goes for threats concerning bad grades¬†‚ÄĒ the child is¬†under constant stress.

There is¬†a¬†special type of¬†overprotective¬†paranoid parent who doesn‚Äôt let their child do¬†anything.¬†‚ÄúDon‚Äôt touch the cat! It‚Äôll scratch you!‚Äú ‚ÄĚDon‚Äôt sit on¬†the edge!”¬†These messages make a¬†child afraid of¬†making any decisions. Passiveness and irresponsibility also appear.

Illustrated by Leonid Khan for BrightSide.me

10¬†Parenting Mistakes We Should Avoid

Everyone needs to know this.

Source: 10 Parenting Mistakes We Should Avoid

 

Many parents have experienced that unpleasant situation when they realize their child’s behavior has changed, but they can’t understand where the problem came from.

We at Bright Side have found some answers that all parents will be able to learn something from.

Illustrator: Natalia Kulakova specially for Bright Side

12¬†Guidelines for Handling Emergency Situations Quickly and Effectively

Source: 12 Guidelines for Handling Emergency Situations Quickly and Effectively

12 Guidelines for Handling Emergency Situations Quickly and Effectively

At some point in our lives, we have all been taught how to behave in emergency situations. However, it is not that easy to remember these things when we really find ourselves in extreme circumstances.

That’s why Bright Side has prepared this infographic that will explain how to act in case of an emergency. Always remember: knowing what to do when faced with a threat can mean the difference between life and death.

Illustrated by Anna Syrovatkina for BrightSide.me
Based on materials from bezpalatki, 1tv, reepl, wikihow, 70.mchs.gov.ru, medportal, womanadvice

7 Exercises That Train Your Brain to Stay Positive

http://usefulgen.com/7-exercises-train-brain-stay-positive/

 

7 Exercises That Train Your Brain to Stay Positive

No matter how hard you try to remain positive every day it is almost impossible to avoid the effects of negative people and situations. However, there are exercises that can help you train your brain to remain positive even in the toughest situations.

These are the 7 tips that can help you remain positive:

1.Be grateful

Keep a journal or write notes on your phone about the things you are grateful for. Every morning, after you wake up, write at least three things on the list. Feel free to include anything you want to such as your family, the sunrise or anything that makes you happy. If you focus your attention on being grateful it will be much easier to remain positive.

2.Stay focused

Staying focused as much as you can during the day can prevent you from becoming easily affected by negative influence. Some of the things that can help you become more focused include practicing meditation, yoga, taking a walk in nature or anything you enjoy doing that makes you feel relaxed.

3.Stay active

If you spend most of the day thinking about getting everything done, negative energy will not affect you. If you are wondering about the influence of people and everyday situations, trying to stay focused on achieving what you have planned for the day can help you remain positive.

4.Eat, drink and sleep well

The mood and mental health are greatly affected by the foods we eat and the drinks we consume as well as the quality of sleep. Several studies have confirmed that deficiency in essential vitamins can cause reduced mental health which can turn to stress, depression, addictions, anxiety and other disorders.

Lack of sleep, on the other hand, makes you feel angry and more irritable. Getting enough quality sleep provides you with enough energy to get through the day and it also makes you feel happier and relaxed. Making simple changes in your everyday lifestyle can make a huge difference. So, drink lots of water, eat whole foods and sleep at least 8 hours every night.

5.Help others

Helping other people stay positive can also be beneficial for you. People need positivity the most when they feel down. Instead of being afraid that their negative energy will affect you, you should try to brighten their day by shining light on them. Doing this increases the positive energy in your environment which will eventually reach you too.

6.Subconscious re-training and inner healing work

Sometimes it is very important to leave past negative experiences behind to be able to have a positive experience. You can start with exercises such as mirror work, NLP and tapping. Try to find the root cause of your negativity by letting go of bad past experiences.

Then, work on maintaining positive attitude however it is very important to feel positive not just look positive.

7.Follow your passion

Doing what you love is one of the best things you can do to stay positive every day. If your job or hobby make you feel guilty it is time to find another one. This way you will have the ability to come closer to where you want to be in life.

Write three things that you love doing and then three changes you would like to see in the world. Then, think about your lifestyle and see how much the things on the list match. The balance with your soul and doing what makes you feel complete are the most important things for maintaining a positive attitude in life. This will make life much easier.