Language Selection

English French German Italian Portuguese Spanish

Need HELP - lost Linux XP activation code

Filed under
PCLinuxOS

Can anyone tell me what to do? I'm trying to install Linux XP 2006 on my laptop but I've lost the activation code. Is there anyway that I can find it on the disk? Is there something else I can do to get it?

Please help me if you can. I want to thank you for taking the time to read this and for any help that you can give to me.

Kellie

re: Linux XP activation code

If you had read my review you would have read that I reviewed a time limited version. I never had an activation code. Even if I did, it would be illegal and unethical to share it.

If you don't want to pay for XP, then try one of the 100's of distros that don't cost anything. If you like XP, I recommend FreeSpire. Similar look and feel while having better hardware support, documentation, and an active user community.

Thank you.

Re: Linux XP activation code

I already have the Linux XP that I bought - but have lost the activation code. I was not asking for anyone to share there code with me. I was wondering if it might be hidden on the disk somewhere or if someone knew how I could get another code.

I'm new to this here site and no I didn't read you review as I haven't figured it all out yet. I just joined today.

thank you

re: Linux XP activation code

I apologize, I've gotten so many of those types of requests.

Surely, the Linux XP guys have a record of your purchase and can help. I used a download version with no code, so I have no idea otherwise. I hope you are able to recover it.

More in Tux Machines

Security and FUD Leftovers

  • Fwupd 1.3.8 Brings More Improvements For Firmware Updating On Linux Systems

    Red Hat's Richard Hughes has released Fwupd 1.3.8 as the latest version of this Linux utility for performing firmware updates of various system components. With the meteoric rise of Fwupd and LVFS, more Fwupd releases are having to deal with quirks and other peculiarities of different hardware components seeing Fwupd support and v1.3.8 is no different. Fwupd 1.3.8 adds a plug-in to support updating the power delivery controllers by Fresco Logic, a fix for Synaptics multi-stream transport devices, various EFI fixes/improvements, more parent devices are detected for different Lenovo USB hubs, support for GNUEFI file locations, and other fixes.

  • Cyber-gangs using SSH identities to sell on the black market [Ed: How to associate secure shell, SSH, with "black market", skull and bones, just because of machines that are already cracked because of something totally unrelated]

    Malware campaigns equipped with the capability to exploit powerful, hidden backdoors are becoming commoditised, researchers from Venafi have warned. The research shows several high-profile hacker campaigns are integrating the misuse of SSH machine identities capabilities into their attacks. Now, any attacker with access to the dark web can gain access to the same techniques that took down the Ukrainian power grid against every business and government agency. Malware can target common SSH machine identities used to access and automate Windows, Linux and MacOS in the enterprise and out to the cloud.

  • SAMM v2 – OWASP releases revamped security assurance framework

    A revamped version of OWASP’s Software Assurance Maturity Model (SAMM) adds automation along with maturity measurements to the open source security-related framework. OWASP SAMM v2 – released on Tuesday after three years of refinement – is geared towards helping organizations that develop software to travel down the path towards becoming more secure. The approach is based on a community-led open source framework that “allows teams and developers to assess, formulate, and implement strategies for better security which can be easily integrated into an existing organizational software development lifecycle”. [...] The OWASP SAMM community includes security knowledgeable volunteers from both businesses and educational organizations. The global community works to create “freely-available articles, methodologies, documentation, tools, and technologies”.

  • Smack: Some more busy nights and 12 bytes of IV

    Anu brought up the fact that the OMEMO XEP is not totally clear on the length of initialization vectors used for message encryption. Historically most clients use 16 bytes length, while normally you would want to use 12. Apparently some AES-GCM libraries on iOS only support 12 bytes length, so using 12 bytes is definitely desirable. Most OMEMO implementations already support receiving 12 bytes as well as 16 bytes IV.

More Openwashing Leftovers

Screencasts and Shows: ArcoLinux 20.2, Linux Action News and Open Source Security Podcast

  • ArcoLinux 20.2 Run Through

    In this video, we are looking at ArcoLinux 20.2.

  • Linux Action News 145

    The week was packed with major project releases, we go through each of them and tell you what stands out. Plus an update from Essential, and NetBSD's first big ask in ten years.

  • Open Source Security Podcast: Episode 183 - The great working from home experiment

    Josh and Kurt talk about a huge working from home experiment because of the the Coronavirus. We also discuss some of the advice going on around the outbreak, as well as how humans are incredibly good at ignoring good advice, often to their own peril. Also an airplane wheel falls off.

today's howtos