3 Ways To Recover Serial Numbers In Windows

By Tina, MakeUseOfMay 18, 2010 at 12:31PM

recover serial numbersHaving to re-install your Windows operating system is nothing unheard of. Unfortunately, it has to be done at regular intervals. Before you start however, not only make sure all your data is backed up, but also that you have all the serial numbers of programs you would like to reinstall.

Should you find that you have lost the keys for some of your software, chances are you can recover the serial numbers. You could either search the Windows registry, which stores serial numbers, or use a handy tool that will look up all available numbers for you.

Jalapeno Keyfinder

recover serial numbers

Supported software (selected):

  • Microsoft Windows 2000, XP, 2003, Vista
  • Microsoft Office XP, 2003, 2007
  • Microsoft ActiveSync 4.2
  • Microsoft Money 12.0 and 14.0
  • Microsoft SQL Server 2000 and 2005
  • Microsoft Visual Studio 2005, Basic 2005 Express, Web Developer 2005 Express, C# 2005 Express, Basic 2003
  • Microsoft Works 7.0 and 8.0
  • Acdsee 6 through 9
  • Ahead Nero 7
  • Corel DRAW 12 and 13
  • Macromedia Dreamweaver 4 through 8
  • Norton System Works
  • The Sims

Jalapeno Keyfinder is the perfect tool to recover Microsoft serial numbers or registration keys besides other Windows software. It’s a small utility, super fast, and easy to use. As soon as you launch it, it will find compatible software installed on your PC and decrypt the keys for you.

If you go to the developer’s homepage, you’ll find that the latest version 2.0 is no longer free. Version 1.06, however, is available for free through Major Geeks. A full list of supported software can be seen here.

ProduKey

recover serial numbers

Supported software:

  • Microsoft Windows Vista and 7
  • Microsoft Office 2003, 2007
  • Microsoft Exchange Server
  • Microsoft SQL

When you unzip and run this tool your antivirus program may display an alert. This is a false positive alarm. You can read more about it here.

Obviously, I removed my Product ID and Key information from the above screenshot.

To view the product key information of software installed on another computer or within another operating system, you can use several command line options as outlined on ProduKey’s download page. /remoteall for example will enumerate all computers on your local network.

For more options that may help you recover your serial numbers, have a look at Karl’s posts User LicenseCrawler To Recover Your Lost Software Serial Numbers and Recover Your Lost XP, Vista & Office Serial Numbers. Simon wrote an article on How To Recover Your Lost Video Game Keys (Windows).

Windows Registry

If the tools above fail to retrieve your product key, you may still be able to find it in your registry. Go to > Start > Run, type > regedit and click > OK. Click > [Ctrl] + [F] to launch the search window. Then search the registry for the software in question. Keep hitting > F3 for the next matching entry, until the serial numbers shows up in the data column.

It may be difficult to spot the correct value. Additionally, many programs decrypt the keys stored in the registry, for example Windows itself. In that case it will be impossible to retrieve the numbers.

In case you’re desperately seeking to recover a serial number that you lost and can’t retrieve with the tools above because you can no longer access that computer, try Find Serial Number. To be used in emergencies only!

Did you have luck finding your keys?

Image credits: srbichara

Similar MakeUseOf Articles

Idea Tool: Edistorm.com

By Rich Whittle, Business Opportunities WeblogMay 18, 2010 at 11:35AM

According to KillerStartUps.com, the objective of the Edistorm website is to let people engage in brainstorming sessions over the WWW. This is achieved by applying sticky notes to the online equivalent to a boardroom wall.

Such a process is made very simple by the use of colored sticky notes, and the presence of a series of “idea bots” make everything flow along more organically. For example, these idea bots can look up related concepts, synonyms and even words that rhyme with any term that has been used.

And this service also has the added advantage of permanence. That is, in the physical world, the only way to capture what went down it the boardroom wall is by photographing it. Conversely, a service like Editstorm turns the brainstorming session into something that is accessible for posterity. Anybody can revise what went down as long as he has access to a web-enabled computer.

Both free and paid versions of Edistorm are available. The main difference arises from the fact that a free storm is public and can be joined by anybody, while the paid incarnation of the service is the one that makes for private sessions (or “private storms”) that can be joined by invitation only.

Photo by Edistorm.

From Business Opportunities Weblog.

Forget Cookies: Over 8 in 10 Browsers Have a Unique Fingerprint [Privacy]

By Adam Pash, LifehackerMay 17, 2010 at 05:30PM

The Electronic Frontier Foundation (they’re the good folks on the digital frontier fighting for our digital rights) conducted a study of the uniquely identifiable information your browser regularly sends out in the open and found that “an overwhelming majority of web browsers have unique signatures — creating identifiable “fingerprints” that could be used to track you as you surf the Internet.” That information includes things like operating system, browser, and common plug-ins, and you can test your own browser here. [EFF]

Erase Your Copy Machine’s Hard Drive to Wipe Important Documents [Security]

By Erica Ho, LifehackerMay 17, 2010 at 02:00PM

Most people take precautions to wipe data off their computers’ hard drives before getting rid of them, but take note: Most copy machines store a digital image of every document scanned or copied.

As explained by a CBS investigation (see video above) and highlighted by tech blog Digital Inspiration, the built-in hard drive of most photocopiers contains and stores this information to improve overall performance. The catch is that it allows anyone access to anything ever scanned if they know how to, which turns into a huge security risk if you decide to get rid of the machine without wiping out the hard drive:

If a fraudster manages to pull out the disk from the photocopier, it can be a real “goldmine,” as he’ll probably find everything there from employee credit card numbers to resumes to faxes and much more.

Fortunately, most manufacturers provide exact instructions on how to clear this data, so check your machine’s manual before you get rid of it.

Building Blaster is an addictive, highly explosive Time Waster

By Sebastian Anthony, Download SquadMay 17, 2010 at 01:00PM

Filed under: , ,

Before continuing, bear in mind that this game sucked me in for at least 30 minutes — so if you like bombs, or you simply don’t have the time to waste, you should probably stop reading now.

Building Blaster does exactly what it says on the tin and is as fun as you’d expect. The ‘buildings’ are simple towers made of different materials with differing properties. Your job is to blow them up using a variety of explosives: you start with dynamite, but you quickly get flasks of nitroglycerin to help move things along. The game itself is easy, but to get a higher score you need to use as few explosives as possible — and avoid the civilians! Blow up the evil-looking dude and you get bonus points.

There are some expensive ‘unconventional’ weapons available in the shop too. The UFO — and antimatter — are sure to make your little time-wasting session slightly more… illuminating.

[via Casual Gameplay]

Building Blaster is an addictive, highly explosive Time Waster originally appeared on Download Squad on Mon, 17 May 2010 12:00:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Add to digg
Add to del.icio.us
Add to Google
Add to StumbleUpon
Add to Facebook
Add to Reddit
Add to Technorati



Download SquadTimeWastergameVideo gameExplosives

ReclaimPrivacy Bookmarklet Rates Your Facebook Exposure Levels [Facebook]

By Kevin Purdy, LifehackerMay 17, 2010 at 07:00AM

ReclaimPrivacy Bookmarklet Rates Your Facebook Exposure LevelsFacebook’s privacy settings are notoriously complex, and the results of changes hard to see instantly. ReclaimPrivacy.org has a handy bookmarklet that shows which potentially insecure and privacy-invading settings are enabled on your Facebook account when you click it.

ReclaimPrivacy’s bookmarklet focuses on just a few key areas where Facebook can share information with the public—having your contacts, connections, and tagged photos exposed to the public, as well as allowing your friends to accidentally expose that information themselves. It also looks at your relationship with Facebook’s personalization, applications, and other aspects to see what Facebook and independent developers can find out about you, then rates your exposure level in simple Good, Caution, or Insecure levels, along with offering links to change those settings.

We’ve previously shown you how to see what Facebook publicly publishes about you, as well as fine-tune your settings manually to “quit” Facebook without actually quitting. For a quicker, explanatory glance at what’s going on with your account, though, this bookmarklet is a great tool. Thanks for the link, Rufo!

Agenda for the TechColumbus Summit on May 27

By Ben Blanquera, TechlifeMay 16, 2010 at 08:51PM


click on the logo for more info

7:30am

Registration Opens – Networking – Continental Breakfast Available

8:20am

Conference Begins

8:25am

E. Gordon GeeWelcome by OSU President E. Gordon Gee

8:40am

Conference Introduction

8:50am

Definition of InnovationDefinition of Innovation
By Michael Bills and Michael Leiblein, OSU Fisher College of Business

What you will learn:
Can innovation really be defined? Customer driven innovation vs. think-tank. There are no silver bullets, but there are many ways to enhance business innovation.

9:30am

Bob Irwin from Sterling CommerceFeatured Corporate Speaker: Bob Irwin, CEO Sterling Commerce

What you will learn:
Innovation at Sterling Commerce. How Sterling Commerce used an “open innovation” culture to drive creativity, new products, and sales.
.

10:15am Networking Break

10:30am

Pamela Springer of Manta.comOrganizing an Innovative Company
The pro’s and con’s of top down and bottoms up approaches.

Moderated by Pamela Springer, Founder of Manta.com.

With Panelists:

  • Russell Glass, CEO of Bizo
  • Jeffrey Rodek, Senior Lecturer, Fisher College of Business

What you will learn:
Participate in a debate over top down vs. bottom up innovation management.

12:00pm

Lunch
12:30pm Morning Review and Introduction to the Afternoon

1:30pm

NeeliInnovation Models and Types

Moderated by Neeli Bendapudi, OSU professor

With Panelists:

  • Dimitri Arges, founder and CEO of NuDyn Technologies Product Innovation
  • Ed Lando, founder and CEO of GoHow – Business Model Innovation
  • Vice Admiral Keith Lippert – Process Innovation

What you will learn:
The various innovation models and types. Join in the conversation with our distinguished panel during this informative and interactive session featuring experienced speakers.

3:00pm

Networking Break

3:30pm

Daniel PinkKeynote: Making Innovation Your Business with Daniel Pink

What you will learn:
How to overturn the conventional wisdom about human motivation and offer a more effective path to high performance. Tapping the creativity of individuals inside and outside the organization. Insights into motivation.

4:45pm

Closing Reception in the Ballroom