By Claire Bushey| Published: November 26, 2013 More from our 2013 gift card package With security improving around gift cards, scammers are resorting to new tactics, including old-fashioned trickery and new technology. 'As the locks have gotten more sophisticated, so have the lock picks,' says Ben Jackson, a senior analyst at Mercator Advisory Group, a Maynard, Mass.-based company that tracks the consumer payments industry. Gift cards attract criminals because they're big business. Consumers loaded $112.3 billion onto gift cards in 2012, according to Mercator reports published in August. ![]() ![]() If your that desperate to get cash on a itunes gift card do what I do I go to the store I scratch off the card and I write the code on my hand and when someone purchases it You go back to your house get on itunes and enter the code that you scratched off the card that someone purchased and redeem it before. May 17, 2012 - 47 sec - Uploaded by eProcessingNetworkYou may activate a Gift Card with the Online Terminal. However, you must have a gift card. Select the type of Gift Card to activate. Dispute Transactions Lost/Stolen Balance Inquiry. Gift Card is issued by American Express Prepaid Card Management. Feb 28, 2008. My friend stole '$300 worth' of XBox LIVE prepaid cards, which would exactly be 6 13 month cards.As you. I was thinking it might act like a credit card, and send the information to M$ or something to activate the code. I did see a person at Walmart activating gift cards as she was stocking them once. ![]() The figure includes both closed-loop gift cards, which can only be used at a single retailer, and open-loop cards, which can be used at any store that accepts them. The dollar amount loaded on closed-loop cards grew 4 percent from 2011, while the open-loop market grew 7 percent. 'The thing about gift card fraud is it's the old, ‘John Dillinger, why do you rob banks?' ‘Because that's where the money is,' Jackson says. Classic schemes evolve Thieves continue to use some of the same scams they pioneered several years ago, experts say, but often with a twist. In a, a thief checks gift cards displayed in a store and writes down identifying information or lifts it from the card's magnetic stripe using a scanner. The crook then goes home and repeatedly checks online to see when the card is activated (usually this is done when the cashier rings up the purchase of the card). Once activated, the thief spends the card balance online. In another traditional scheme, a thief will apply a bar-code sticker over the genuine bar code of a gift card in a shop. When the sticker is scanned, it activates a blank card that the crook has stolen instead of the card the consumer is purchasing. As the locks have gotten more sophisticated, so have the lock picks. Technology is allowing scammers to streamline part of the process, says Jackson. Rather than having to hit 'refresh' on their computers until they see that a card has been loaded with value, thieves now use computer software that automatically checks the value of a card multiple times in a short span. Card processors have caught on, however, and now consider such repeated value checks a red flag for fraud. Card manufacturers are also beefing up security by upgrading packaging to make it harder for thieves to record card identification numbers. But fraudsters have, in turn, adapted by using 'social engineering,' otherwise known as the traditional tool of the con man: the gift of the gab. They're approaching merchants directly to obtain the necessary card data. Often this social engineering takes place at the point of sale, Jackson says. Scammers telephone a store, reach a clerk and identify themselves as representatives for the company's central office. They'll ask the clerk to activate a card, load it with value, and then give the thieves the identifying numbers so they can check that it was activated properly. 'They're essentially creating money out of thin air,' Jackson says. A similar, darker, scam involves callers using threats to try to get information from retail employees. Stores in Savannah, Ga., received warnings that the stores would be blown up if a store manager didn't load $500 onto 10 reloadable prepaid debit cards, then read the card numbers over the phone. The, says no manager complied and the bombs never went off, but the scam has appeared in other parts of the country too. Gift cards are an anonymous account to put money on, and anything anonymous in the world of fraud is desirable. Oldie but goodie One of the most popular crimes involving gift cards hasn't changed much. Thieves are still buying gift cards with stolen credit cards, says Martha Weaver, the gift card product marketing manager at Travel Tags, an Inver Grove Heights, Minn.-based company that manufactures 500 million gift cards a year. Buying a gift card allows a thief to extract money from the credit card before the cardholder notices the credit card is missing and cancels it. 'Gift cards are an anonymous account to put money on, and anything anonymous in the world of fraud is desirable,' says Weaver. 'It's seen as a way to launder money.' Better enforcement Fraud detection has gotten better both at card processors and among law enforcement agencies, says Dan DeFelippi, a former card thief who has consulted with the Secret Service on fraud techniques and now works as a web developer. Training has improved and there are now more links, formal and informal, between law enforcement and card processors' internal fraud detection departments. 'If they have inside contacts, it helps (law enforcement) investigate, and they'll catch more people and prevent more losses from happening,' DeFelippi says. Buyer beware You can protect yourself from gift card scams by following a few common-sense steps. • Treat gift cards like a food purchase. The same way you wouldn't eat a candy bar whose packaging is torn or battered, stay away from gift cards if the packaging appears damaged. Some card manufacturers are moving away from paper 'clamshell' packaging that can be sliced open and resealed in favor of tougher, plastic packaging that can't be opened without destroying the package. • Don't give out confidential information. There's no reason for a sales clerk to ask for the number of a gift card, so if you encounter that situation, challenge the request and refuse to provide the information. The same applies for callers who request such data to 'check the card's value.' • Investigate online sellers. If you're buying a card at an online marketplace like eBay or Gift Card Rescue, read what previous buyers say about any seller with whom you're consider doing business. Stay away from sellers with negative reviews. If your gift card balance is not what you expect it to be, contact the card issuer immediately. Not only do you improve your chances of retrieving your money, you help others, since scammers generally perpetrate the same fraud on multiple victims. See related:. Join the discussion We encourage an active and insightful conversation among our users. Please help us keep our community civil and respectful. For your safety, do not disclose confidential or personal information such as bank account numbers or social security numbers. Anything you post may be disclosed, published, transmitted or reused. If you are commenting using a Facebook account, your profile information may be displayed with your comment depending on your privacy settings. By leaving the 'Post to Facebook' box selected, your comment will be published to your Facebook profile in addition to the space below. The editorial content on CreditCards.com is not sponsored by any bank or credit card issuer. The journalists in the editorial department are separate from the company's business operations. The comments posted below are not provided, reviewed or approved by any company mentioned in our editorial content. Additionally, any companies mentioned in the content do not assume responsibility to ensure that all posts and/or questions are answered. ADVERTISER DISCLOSURE CreditCards.com is an independent, advertising-supported comparison service. The offers that appear on this site are from companies from which CreditCards.com receives compensation. This compensation may impact how and where products appear on this site, including, for example, the order in which they appear within listing categories. Other factors, such as our proprietary website's rules and the likelihood of applicants' credit approval also impact how and where products appear on the site. CreditCards.com does not include the entire universe of available financial or credit offers. Advertiser Disclosure CreditCards.com is an independent, advertising-supported comparison service. The offers that appear on this site are from companies from which CreditCards.com receives compensation. This compensation may impact how and where products appear on this site, including, for example, the order in which they may appear within listing categories. Other factors, such as our own proprietary website rules and the likelihood of applicants' credit approval also impact how and where products appear on this site. CreditCards.com does not include the entire universe of available financial or credit offers. Apple Footer This site contains user submitted content, comments and opinions and is for informational purposes only. Apple may provide or recommend responses as a possible solution based on the information provided; every potential issue may involve several factors not detailed in the conversations captured in an electronic forum and Apple can therefore provide no guarantee as to the efficacy of any proposed solutions on the community forums. Apple disclaims any and all liability for the acts, omissions and conduct of any third parties in connection with or related to your use of the site. All postings and use of the content on this site are subject to the.
0 Comments
For most Microsoft Windows XP installs, you'll never need to worry about the validity of the product key assigned to your copy of the OS. However, software does tend to get installed without authorization, even in the most carefully managed shops, and so from time to time you may need to reset the Windows XP product key. For example, perhaps a user installed a pirated copy of XP but now wants to go legal. Maybe you've been hired by an organization that installed 100 pirated copies of XP but now has a legitimate volume-licensing key (VLK). Perhaps an end user purchased an additional retail license for XP but needs to use his original CD to install the software. ![]() When situations like these arise, changing XP's product key is often the most practical-or only-solution. Determining if you have a valid product ID Hopefully you already know if you're dealing with a pirated copy of XP. But if you're unsure, a quick way to tell is to install Service Pack 1. Shortly after releasing Windows XP, Microsoft realized that most pirated XP installations were using two specific VLKs, the most popular of which begins with 'FCKGW.' These VLKs produce product IDs that match either XXXXX-6-23XXX or XXXXX-6-23XXX, where X is any number. If you try to install SP1 and get the following error message: The Product Key used to install Windows is invalid. ![]() Please contact your system administrator or retailer immediately to obtain a valid Product Key.' You are dealing with a pirated copy of Windows. For more information about obtaining a valid product key, see Microsoft Knowledge Base article. You can also directly check the operating system's product ID by right-clicking on My Computer, clicking Properties, and selecting the General tab. The machine's product ID will be located under the Registered To section. If the ID matches either of the two models commonly associated with VLK fraud, you'll need to obtain a valid XP product key before proceeding. None of the procedures described below will work without a legitimate product key. Two methods of changing Windows XP's product key You can change a Windows XP installation's product key either by editing the registry or by using one of two Windows Management Instrumentation (WMI) scripts. The registry editing method is outlined in Knowledge Base articles and and works on Windows XP Home, Windows XP Professional, and Windows XP Corporate Edition. The script method is outlined in article and is designed to work on Corporate Edition installations that use a VLK and do not require activation. It may work on a Home or Professional installation, but I have not tested this scenario. The script method is the practical solution for changing the product keys on a large number of machines. Regardless of the method you choose, make sure to backup important data before changing a product ID, since an unexpected problem could render the machine unbootable and necessitate a complete reinstallation of Windows. Warning The following instructions involve editing your system registry. Using the Windows Registry Editor incorrectly can cause serious problems that require the reinstallation of your operating system and possible loss of data. TechRepublic does not support problems that arise from editing your registry. Use the Registry Editor and the following directions at your own risk. Editing the registry Begin by opening the Registry Editor and navigating to HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsNTCurrent VersionWPAEvents In the right pane, right-click the ODBETimer binary value and select Modify. Change at least one character of this value to either a number from 0 to 9 or to a letter from A to F, then click OK and close the Registry Editor. This renders the current product key invalid and deactivates Windows. Now, it's time to reactivate Windows using your new product key. Click Start| Run and enter the command:%systemroot%system32oobemsoobe /a where%systemroot% is your Windows directory. In many cases, this command will look like: C:windowssystem32oobemsoobe.exe /a At this point, Windows will launch the Product Activation Wizard. Figure A Product Activation Wizard Select the option to telephone a Microsoft customer service representative to activate Windows, as shown in Figure A, and click Next. Now, select the Change Product Key option and enter your new product key as shown in Figure B. ![]() ![]() Finally, click Update and close the window. If Windows returns you to the previous screen, just select the Remind Me Later option. When the wizard is finished, reboot the system. Figure B Enter new product key When Windows reboots, your next step will depend on which Windows XP version you are using. If you have XP Home or Professional, you'll be prompted to reactivate your copy of Windows through the normal activation process. If you have XP Corporate, no activation is required and your machine should have a valid product ID. ![]() You can verify this by running the%systemroot% system32 oobe msoobe.exe /a command again. When the wizard loads this time, you should see a message indicating that your copy of Windows has already been activated. Using a WMI script Although the registry editing process is effective, it can be tedious and impractical if you need to change the product key on more than a few machines. So Microsoft provides two WMI scripts, one for XP machines with SP1 and one for XP machines without SP1. Copy the appropriate script's code into a text file and save it as either ChangeVLKey2600.vbs or ChangeVLKeySP1.vbs. Change the product key on Windows XP. If you have XP Corporate, no activation is required and. You can also execute the script from the command line to change. I was able to fix this problem by starting the PC in safe mode with command prompt. If you want to activate windows xp at zero cost then visit see this tutorial. Boot up in Safe Mode with Command Prompt. At the cmd window, type 'explorer' or 'explorer.exe' and then go to the run box (WINDOWS KEY + R). Type the following exactly without the quotation marks: 'rundll32.exe syssetup,SetupOobeBnk'. This will renew the 30-day activation for Windows XP. Restart your computer. Having rebuilt, tested, and reloaded hundreds of computers, I've become keenly aware of one of the unavoidable speedbumps during setup -- Windows XP's product activation. Mar 17, 2007. Having rebuilt, tested, and reloaded hundreds of computers, I've become keenly aware of one of the unavoidable speedbumps during setup -- Windows XP's product activation. After one too many activations, Windows complains that your product key is no longer valid or you've exceeded the limit. The scripts can act in conjunction with a valid product key as part of a login script to change the product ID on multiple machines. You can also execute the script from the command line to change the key on a single computer. For example, if you wanted to change the product key on an XP machine without SP1 and had already saved the script to root directory on the C: drive, you would click Start| Run and enter the following command: C:changevlkey2600.vbs xxxxx-xxxxx-xxxxx-xxxxx-xxxxx Of course, xxxxx-xxxxx-xxxxx-xxxxx-xxxxx in this scenario is a valid product key. The script should take only a few seconds to run and won't prompt you for further action unless there's a problem, such as an invalid product key. As with the registry editing method, you can verify that Windows is now using a valid product key by running the command:%systemroot%system32oobemsoobe.exe /a The Product Activation Wizard will load and should tell you that your copy of Windows has already been activated. Related Topics. Got a new phone you want to swap for one already on your account? • Be sure your new phone's battery is fully charged • Keep your phone and its box handy in case you need information from them (don't worry, we'll point out where to look) • Click 'Activate your phone' to start the process • Do not use cell phones for this. This will not work through your cell phone so use a laptop or desktop only. • You need to be the account owner or authorized to complete the swap. If you are not, log in and we'll help you request permission. ![]() ![]() ![]() ![]() Jun 03, 2010 Yes there is punch it into your phone & it will come up with reserve battery mobile. All mobiles will activate a reserve battery. Cell phones with. Toshiba Model Type Details General Keyboard Fn + F5 General Keyboard Fn + F8 General Physical switch Varies A100-078 Switch Right side of the laptop Eqium Series Switch Front of laptop Libretto Series Switch Front of laptop M1 & M2 Switch Left side of the laptop M40 and M70 Button Front side of the laptop Portege & Qosmio Series Switch Left side of the laptop Quantium Series Switch Left side of the laptop R100 Switch Right side of the laptop Satego Series Switch Right side of the laptop Satellite (General) Switch Lower left of the keyboard. Fn + F8 shows wireless status. Satellite 1400/1405 Switch Right side of case, below floppy drive Satellite L355D-S7825 Switch Below keyboard just left of center Satellite A60-S1662 Switch Right side next to USB port Satellite Pro Button On the Side or Front TE2000 Switch Left side of laptop, by volume control Tecra 2100 Switch Left side of laptop, by volume control. Fn + F8 shows wireless status. • • • How to enable Wi-Fi on a laptop Wi-Fi can be enabled by performing any of the steps below. Enable with laptop Wi-Fi button Some laptops have an On/Off button or switch for the Wi-Fi connection, like the button shown in the picture to the right. ![]() It is usually found on the front edge of the laptop or just above the keyboard. Find the button or switch and make sure it is enabled. When enabled, the button should be illuminated as blue, or the switch should be in the On position. Enable with laptop Fn and Function key Some laptops enable and disable Wi-Fi using the and one of the (F1-F12). As seen in the picture to the right, some laptops use the Fn and F12 key to enable and disable Wi-Fi and may show a small LED that is either orange when disabled or blue when enabled. Enable in Windows Look in the Windows to find the icon for Wi-Fi or wireless Internet. With your on the icon and select the option for enabling (or turning off) the Wi-Fi device in the pop-up menu. If no Enable option is available in the pop-up menu, there may be an option called Open Network and Sharing Center. If so, select this option and then select Change adapter settings. You should see an icon for the wireless network card, which you can right-click and select Enable. Note: In Windows 8, when you right-click the Wi-Fi icon, check to see if Airplane Mode is turned on. If it is, turn it off to enable the wireless network card. The Wi-Fi adapter can also be enabled in the, click on the Network and Sharing Center option, then click on the Change adapter settings link in the left navigation pane. ![]() Right-click on the Wi-Fi adapter and select Enable. Enable in Windows Device Manager Access the by right-clicking with your mouse on the icon on your Desktop or in the Windows. Windows can turn your PC into a wireless hotspot, allowing it to share its wired or wireless Internet connection with other wireless devices. Connectify Hotspot is great if you're at a hotel that charges per device, or if you're on a plane and you connect your laptop but don't want to pay more to connect your. Use your keyboard to enable your wireless adapter. Most laptops have a key or switch that can be used to toggle the wireless adapter on or off. The key will have a logo of an antenna with radio waves coming out of each side, or it may have an image of an airplane to signify. How to Locate the Wireless Connection Switch on a. If your laptop has an exterior wireless connection. You can also choose to activate or deactivate these. A wireless adapter, sometimes called a wireless network card or Wi-Fi card, is a device that allows a computer to connect to wireless Internet signals. This is the most basic thing when troubleshooting any wireless connection. Don’t blame it all to your laptop. The issue may be on the internet connection itself. ![]() Select Properties from the pop-up menu, click on the Hardware tab in the window that opens up, and click on the Device Manager button. Note: In Windows Vista and later, there is no Hardware tab. Just click the Device Manager link in the System window. Find the Wi-Fi adapter in the list of hardware devices. Right-click on the adapter name and select Enable from the pop-up menu. If no Wi-Fi adapter is found in Device Manager, the Wi-Fi adapter are not installed. Enable in CMOS setup Finally, there is also the option of enabling the Wi-Fi device from within the computer's. However, it is very unlikely that the Wi-Fi device would be disabled in CMOS. How to disable Wi-Fi on a laptop Wi-Fi can be disabled by performing any of the steps below. Disable with laptop Wi-Fi button Some laptops have an On/Off button or switch for the Wi-Fi device, like the button shown in the picture to the right. It is usually found on the front of the laptop or just above the keyboard. Find the button or switch and make sure it is disabled. When disabled, the button should not be illuminated or illuminated as orange or red, or the switch should be in the Off position. Disable with laptop Fn and Function key Some laptops enable and disable Wi-Fi using the and one of the (F1-F12). As seen in the picture to the right, some laptops use the Fn and F12 key to enable and disable Wi-Fi and may show a small LED that is either orange when disabled or blue when enabled. Disable in Windows Right-click on the Wi-Fi icon in the Windows and select Disable (or Turn Off) from the pop-up menu. If no Disable option is available in the pop-up menu, there may be an option called Open Network and Sharing Center. If so, select this option and then select Change adapter settings. You should see an icon for the wireless network card, which you can right-click and select Disable. Note: In Windows 8, when you right-click the Wi-Fi icon, you can turn off Wi-Fi by turning on Airplane Mode. The Wi-Fi adapter can also be disabled by accessing the, clicking on the Network and Sharing Center option, then click on the Change adapter settings link in the left navigation pane. Right-click on the Wi-Fi adapter and select Disable. Disable in Windows Device Manager Access the by right-clicking with your mouse on the icon on your Desktop or in the Windows. Select Properties from the pop-up menu, click on the Hardware tab in the window that opens up, and click on the Device Manager button. Note: In Windows Vista and later, there is no Hardware tab. Just click the Device Manager link in the System window. Find the Wi-Fi adapter in the list of hardware devices. Right-click on the adapter name and select Disable from the pop-up menu. If no Wi-Fi adapter is found in Device Manager, the Wi-Fi adapter are not installed. Disable in CMOS Setup As is the case with enabling the Wi-Fi device, it can also be disabled in the computer's. Wi-Fi on Desktop computers Wi-Fi adapters are also available for. The Wi-Fi button mentioned above is not available with most Desktop computers. However, there is the possibility that the Wi-Fi adapter itself (typically an external version, like a USB Wi-Fi adapter) has an On/Off button or switch. If there is no button or witch, disconnecting the adapter from the computer will disable the device. If the Wi-Fi adapter is not an external device, it is either an internal or built onto the. When you install the software for the Wi-Fi adapter, an icon will then show in the Windows, giving you access to enable and disable the device. Alternatively, you can disable and enable the Wi-Fi adapter through the or the. In, the primer ( ) is a component of and and, and is responsible for initiating the that will push the out of the. Early primers were simply the same used to fire but poured into an external, where it could be ignited by an ignition source such as a or a. This external powder was connected through a small opening at the rear of the gun barrel that led to the main charge within the barrel. As gunpowder will not burn when wet, this made it difficult (or even impossible) to fire these types of weapons in rainy or humid conditions. Modern primers are made of chemicals. In the primer is usually integrated into the base of a cartridge. In the larger, the primer is a separate component placed inside the barrel to the rear of the main propellant charge. ![]() ![]() 223 Rem + 223 AI Cartridge Guide. And most small rifle primers. Important if you are going to use military brass is to remove the primer crimp. Problems chambering and light primer strikes. A unreliable rifle is no differant from a heavy. Neither one would activate the bolt stop. 180 gr Remington works. These non-corrosive, all weather primers deliver fast, dependable ignition under any shooting condition. Primers are constantly and. ![]() Upon being struck with sufficient force generated by the, or typically electrically ignited in larger weapons, these primers react chemically to produce heat, which gets transferred to the main propellant charge and ignites it, and in turn propels the projectile. Due to their small size, these primers themselves lack the power to shoot the projectile, but still have enough energy to drive a bullet partway into the barrel — a dangerous condition called a, which was instrumental in of actor. Contents • • • • • • • • • • • • • • • Priming methods [ ] The first step to firing a firearm of any sort is igniting the propellant. The earliest firearms were, which were simple closed tubes. There was a small aperture, the 'touchhole', drilled in the closed end of the tube, leading to the main charge. ![]() This hole was filled with finely ground powder, which was then ignited with a hot. With the advent of hand-held firearms, this became an undesirable way of firing a gun. Holding a burning stick while trying to pour a charge of black powder carefully down a barrel is dangerous, and trying to hold the gun with one hand while simultaneously aiming at the target and looking for the touchhole makes it very difficult to fire accurately. External priming [ ] Matchlock [ ]. Main article: The first attempt to make the process of firing a small arm easier was the 'matchlock'. The matchlock incorporated a 'lock' (so called because of its resemblance to door locks of the day) that was actuated by a, originally called a 'tricker.' The lock was a simple lever which pivoted when pulled, and lowered the down to the touchhole. The match was a slow burning made of plant fibers that were soaked in a solution of,, and, and dried. This 'slow-match' was ignited before the was needed, and it would slowly burn, keeping a hot ember at the burning end. After the gun was loaded and the touchhole primed with powder, the burning tip of the match was positioned so that the lock would bring it into contact with the touchhole. To fire the gun, it was aimed and the trigger pulled. This brought the match down to the touchhole, igniting the powder. With careful attention the slow-burning match could be kept burning for long periods of time, and the use of the lock mechanism made fairly accurate fire possible. Wheel-lock [ ]. Main article: The next revolution in ignition technology was the 'wheel-lock'. It used a spring-loaded, which rubbed against a piece of, similar to a modern. A key was used to wind the wheel and put the spring under tension. Once tensioned, the wheel was held in place by a trigger. When the trigger was pulled, the serrated edge of the steel rubbed against the pyrite, generating. These sparks were directed into a pan, called the ', filled with loose powder which led into the touchhole. The flashpan usually was protected by a spring-loaded cover that would slide out of the way when the trigger was pulled, exposing the powder to the sparks. The wheel-lock was a major — since it did not rely on burning material as a source of, it could be kept ready for extended periods of time. The covered flashpan also provided some ability to withstand bad weather. Wind, rain, and wet weather would render a matchlock useless, but a wheel-lock that was loaded and waterproofed with a bit of around the flashpan could be fired under most conditions. Flintlock [ ]. Main article: The wheel-lock enjoyed only a brief period of popularity before being superseded by a simpler, more robust design. The 'flintlock', like the wheel-lock, used a flashpan and a spark to ignite the powder. As the name implies, the flintlock used rather than iron pyrite. The flint was held in a spring-loaded arm, called the 'cock' from the resemblance of its motion to a pecking chicken. The cock rotated through approximately a 90 degree arc, and was held in the tensioned, or 'cocked' position by a trigger. Usually, flintlocks could lock the cock in two positions. The 'half-cock' position held the cock halfway back, and used a deep notch, so that pulling the trigger would not release the cock. Half-cock was a safety position, used when loading, storing or carrying a loaded flintlock. The 'full-cock' position held the cock all the way back, and was the position from which the gun was fired. The L-shaped 'frizzen' was the other half of the flintlock's ignition system. It served as both a flashpan cover and a steel striking surface for the flint. The frizzen was hinged and spring-loaded so that it would lock in the open or closed position. When closed, the striking surface was positioned so that the flint would strike at the proper angle to generate a spark. The striking flint would also open the, exposing the flashpan to the spark. The flintlock mechanism was simpler and stronger than the wheel-lock, and the flint and steel provided a good, reliable source of ignition. The flintlock remained in military service for over 200 years, and flintlocks are still made today for historical re-enactments and muzzle-loading target competition, and for hunters who enjoy the additional challenge that the flintlock provides. Percussion caps The next major leap in ignition technology was the invention of the chemical primer, or 'cap', and the mechanism which used it, called the 'caplock'. Percussion ignition was invented by Scottish clergyman in 1807 but needed further refinements before it was gradually accepted in the 1820s to 1830s. By the middle of the 19th century the percussion or caplock system was well established. It was adopted by both sides in the, as it was simpler and more reliable than the flintlock. The main reason the caplock was so quickly adopted was its similarity to the flintlock and the ease of converting older arms to use percussion-cap ignition; usually the same lock and barrel could be used with minor changes. The flashpan and frizzen were removed and replaced by a small, hollow horizontal cylinder (drum) screwed into the bored-out and tapped flash hole and carrying a 'nipple' over which the cap could be fitted. A 'hammer' which also had half-cock (for loading and applying the cap) and full-cock positions replaced the cock. When released by pulling the trigger, the hammer would strike the cap, crushing it against the nipple. The was a thin metal cup that contained a small quantity of pressure-sensitive explosive. When crushed, the explosive would detonate, sending a stream of hot down through a hole in the nipple and into the touchhole of the gun to ignite the powder charge. In the process of firing, the cap generally split open and would fall off when the hammer was moved to half-cock position for loading. The caplock system worked well, and is still the preferred method of ignition for and recreational shooters who use arms. Electric-fired [ ] A small number of cartidges use no primer at all, but the primary propellant is ignited using an externally provided electric charge, such as with the and the O'Dwyer VLe. This is not to be confused with an electrically ignited internal primer (see below). Internal priming [ ]. Fired rimfire and centerfire casings Chemical primers, advanced and techniques all came together in the 19th century to create an entirely new class of firearm — the cartridge arm. Flintlock and caplock shooters had long carried their in, which served to hold a measured charge of powder and a in one convenient package; the paper also served to seal the bullet in the bore. Still, the source of ignition was handled separately from the cartridge. With the advent of chemical primers, it was not long before several systems were invented with many different ways of combining bullet, powder, and primer into a single package which could be loaded quickly from the of the firearm. This greatly streamlined the reloading procedure and paved the way for semi- and fully automatic firearms. This big leap forward came at a price. It introduced an extra component into each round – the cartridge case - which had to be removed before the gun could be reloaded. While a flintlock, for example, is immediately ready to be reloaded once it has been fired, adopting brass cartridge cases brought in the problems of extraction and ejection. The mechanism of a modern gun not only must load and fire the piece, but also must remove the spent case, which may require just as many moving parts. Probably most involve this process, either through failure to extract a case properly from the chamber or by allowing it to jam the action. Nineteenth-century inventors were reluctant to accept this added complication and experimented with a variety of before acknowledging that the advantages of brass cases far outweighed their one drawback. The three systems of self-contained metallic cartridge ignition which have survived the test of time are the, the Berdan primer, and the Boxer centerfire primer. Main article: A pinfire firearm cartridge is an obsolete type of brass cartridge in which the priming compound is ignited by striking a small pin which protrudes radially from just above the base of the cartridge. Invented by Casimir Lefaucheaux in 1828 but not patented until 1835, it was one of the earliest practical designs of metallic cartridge. However, the protruding pin was vulnerable to damage, displacement and accidental ignition. Moreover, the pin had to be positioned carefully in a small notch when loading, making the pinfire's use in repeating or self-loading weapons impossible. The pinfire survives today only in a few very small blank cartridges designed as noisemakers and in novelty miniature guns. Main article: Rimfire cartridges use a thin case with a hollow bulge, or rim, around the back end. This rim is filled during manufacture with an impact-sensitive primer. In the wet state, the primer is stable; a pellet of wet primer is placed in the shell and simply spun out to the full extremes of the rim. (For more on the exact process and one set of chemical compounds that have been used successfully, see, a 1932 Remington Arms patent by James E. Burns.) In the dry state, the primer within the rim becomes impact-sensitive. When the rim is then crushed by the hammer or firing pin, the primer detonates and ignites the powder charge. Rimfire cartridges are single-use and normally cannot be reloaded. Also, since the rim must be thin enough to be easily crushed, the peak pressure possible in the case is limited by the strength of this thin rim. Rimfire cartridges originally were available in up to 1' (100 caliber), however, all but the small.22 caliber rounds eventually died out. The, also fired in, is the most popular recreational caliber today because it is inexpensive, quiet, and has very low. While the rimfire priming method is limited due to the thin cases required, it has enjoyed a few resurgences recently. First was Winchester's.22 Magnum Rimfire, or, in the 1950s, followed in 1970 by Remington's short-lived, based on Winchester's magnum case. In 2002 introduced a new.17 caliber cartridge based on the.22 WMR, the. The.17 HMR is essentially a.22 WMR cartridge necked down to accept a.17-caliber bullet, and is used as a flat-shooting, light-duty round. The.17 HMR was followed a year later by Hornady's.17 Mach 2, or, which is based on a slightly lengthened and necked-down.22 Long Rifle cartridge. Both of the.17 caliber rimfires have had widespread support from firearms makers, and while the high-tech, high-velocity.17 caliber jacketed bullets make the cartridges quite a bit more expensive than the.22 caliber versions, they are excellent for shorter-range shooting and still far less expensive than comparable centerfire cartridges. In 2013, Winchester released the, which utilizes the larger case of the long-obsolete allowing for velocities approaching 3000fps with a 20gr bullet and making it the world's fastest rimfire round. Centerfire [ ]. Main article: The identifying feature of centerfire ammunition is the metal cup containing the primer inserted into a recess in the center of the base of the cartridge. The firearm crushes this explosive between the cup and an anvil to produce hot gas and a shower of particles to ignite the powder charge. Berdan and Boxer primers are used in centerfire cartridges; the primers differ in construction. Various priming mixtures have been used in different sized primers to effect prompt ignition of the powder charge. Particles with relatively high are required to promptly ignite deterrent coatings. Some priming explosives decompose into incandescent solids or liquids. Inert ingredients may be heated into incandescent sparks when the explosive decomposes into gas. Cartridges for military use require stable priming formulations so war reserves of small-arms ammunition will dependably function after years of storage. Electric-primed [ ] Some rapid-fire, and larger military gun and cannon rounds (such as the M50 20mm) utilize an internal electric primer that is activated by an externally provided electric charge, as opposed to a mechanical impact. The primer in turn ignites the primary propellant. See also [ ] • • References [ ]. Primer Usage Chart Primer Type Product Type Product Usage Part # Boxed Part # In APS Strips APS Strip Color Code Shotshell 209 A general purpose shotshell primer for most field and target loads. 0008 — — 209M† A true Magnum shotshell primer for waterfowl and heavy field loads. 0009 — — Small Rifle 400 For most standard loads in cases requiring small rifle primers. 0013 0080 yellow 450 Mag† Magnum primer for ball propellants. 0017 0081 blue No.41/5.56MM Military small rifle primer with NATO sensitivity. 0001 — — BR4 Benchrest small rifle primer for critical accuracy needs. 0019 0082 black Large Rifle 200 For most standard loads in cases requiring large rifle primers. 0011 0086 yellow 250 Mag† Magnum primer for large-capacity cases and/or ball propellants. 0015 0087 blue No. 34/7.62MM Military large rifle primer with NATO sensitivity. 0002 — — BR2 Benchrest large rifle primer for critical accuracy needs. 0010 0088 black Small Pistol 500 For most handgun cartridges requiring a small pistol primer. 0014 0078 white 550 Mag† For heavy loads using ball propellants. 0018 0079 red Large Pistol 300 For most handgun cartridges requiring a large pistol primer. 0012 0084 white 350 Mag† For heavy loads using ball propellants. 0016 0085 red Muzzleloading 209 Reduced fouling when used with blackpowder substitutes. 0307 — — Percussion Caps #10 A special percussion cap for revolvers fitted with #10 nipples. 0309 — — #11 Our general-purpose percussion cap for most rifles and handguns. 0311 — — #11 Magnum A hotter #11 cap for reliable ignition of replica black powders. 0310 — — Four Wing Musket Caps Designed especially for reenactment. 0301 — — 50 Caliber BMG No.35 A modern MIL-SPEC primer for the 50 caliber BMG cartridge. 0320 — — All CCI primers, including our muzzleloading products, are non-mercuric and non-corrosive. † — Safety Note: use Magnum primers only when specified in published load data. The 41's and 34's contain Magnum priming mix and should be treated as such. ![]() Attention, Internet Explorer User Announcement: Jive has discontinued support for Internet Explorer 7 and below. In order to provide the best platform for continued innovation, Jive no longer supports Internet Explorer 7. ![]() Jive will not function with this version of Internet Explorer. Please consider upgrading to a more recent version of Internet Explorer, or trying another browser such as Firefox, Safari, or Google Chrome. (Please remember to honor your company's IT policies before installing new software!) • • • •. I think photolady is right, perhaps since you are using the honest to goodness, physical Adobe software you don't need the activation like you would if you downloaded the program from the website. (assuming that's what you did, of course =)I installed it from a disk I bought from B&H via a link on the NAPP website. No shipping charge. While I installed it I also registered it. I think the registration page came up very early in the process. However, Adobe's website says registration and activation are two separate things so I don't think it was activated simply because I registered it While installing, my computer informed me that the software was seeking access to Adobe (my McAfee AV has this feature). Once was after I registered and once again later. Perhaps the second time was an automatic activation. One other thing. When I opened CS4 and clicked on Help, one of the options in the drop-down menu had the word Deactivate. That suggests to me that the program was indeed activated. 'originally posted by Niki. Perhaps since you are using the honest to goodness, physical Adobe software you don't need the activation like you would if you downloaded the program from the website.That was not what I meant. I was saying if the software old timer bought was indeed an upgrade and not full retail version of CS4, the Adobe would see this as an upgrade which the original already being activated, the upgrade wouldn't need to be activated again. This is like upgrading an operating system that requires activation. Those don't need to be reactivated either if you're only doing an upgrade because it uses the same key code as the original software. That was not what I meant. I was saying if the software old timer bought was indeed an upgrade and not full retail version of CS4, the Adobe would see this as an upgrade which the original already being activated, the upgrade wouldn't need to be activated again.Perhaps. But previously when I upgraded from PS7 to CS, then from CS to CS2, I got the activation window during installation. Those were upgrade disks. We would like to show you a description here but the site won’t allow us. And my computer was connected to the Internet each time. I suspect that Adobe changed the activation process with CS4 (and maybe CS3). Activation of Adobe Photoshop CS4 adds a line of text to the 'hosts' file found in the folder C: WINDOWS system32 drivers etc. If the same line of text was added to the hosts file by another adobe product, activation may not be needed for further installations of Adobe products. If you decide to uninstall CS4, you need to Deactivate the program before doing the uninstall. If you fail to deactivate CS4 before running the uninstall, you will not be able to reinstall CS4 on the same computer.Thanks for the info. I'll keep it in mind. Hi OldTimer 56 Your computer is directed to the Adobe site where the activation process takes place. If the copy you have installed in bogus you will soon know. It will shut the installation down untillyou buy a valid number (eg a legal copy af the software. I just upgraded from CS2 to CS4. Previously, upon completion of the installation of CS and CS2, a window appeared asking me to activate the software. However, when I finished installing CS4, no such window appeared. I was connected to the Internet during installation so maybe activation was automatic. Anybody know? Ron McDermott. If you decide to uninstall CS4, you need to Deactivate the program before doing the uninstall. If you fail to deactivate CS4 before running the uninstall, you will not be able to reinstall CS4 on the same computer.It's a bit worse than that, actually. Failure to deactivate the software prior to uninstalling it causes you to lose the license for that software. I had a bugger of a time with CS-3. I had put a legitimate copy of it on my workstation at the studio. One of the photographers came in with a hacked copy of CS-4 which they installed, and then they uninstalled my CS-3 without deactivating it and bam! I'm down to one license, and Adobe can't seem to do anything about it. I had to take my home machine into the shop, and for some reason CS-3 couldn't deactivate from my machine and bam! All of a sudden I have no active licenses for CS-3, so when I want to install it, I have to call Adobe and go through a beg and plead song and dance to get it working. My CS-4 upgrade went smoothly, you put in the serial number very early on in the process and then it installs. Activation takes place immediately upon the completion of the install. Simple way to activate Adobe CS4 infamous activation permanently for Mac OS X. * If you’ve previously entered a serial, run any Adobe CS4 application. Effective December 13, Adobe disabled the activation server for CS2 products and Acrobat 7 because of a technical glitch. These products were released. It's a bit worse than that, actually. Failure to deactivate the software prior to uninstalling it causes you to lose the license for that software. I had a bugger of a time with CS-3. I had put a legitimate copy of it on my workstation at the studio. One of the photographers came in with a hacked copy of CS-4 which they installed, and then they uninstalled my CS-3 without deactivating it and bam! I'm down to one license, and Adobe can't seem to do anything about it. I had to take my home machine into the shop, and for some reason CS-3 couldn't deactivate from my machine and bam! All of a sudden I have no active licenses for CS-3, so when I want to install it, I have to call Adobe and go through a beg and plead song and dance to get it working. My CS-4 upgrade went smoothly, you put in the serial number very early on in the process and then it installs. Activation takes place immediately upon the completion of the install.This why I image my hardrive regularly or prior and after any major installations. You could have 'restore' which would or may have solved the problem. Ideally, imaging your drive with incremental regular updates is the the best solution. I pay $60 for the software which is used to image 2 PCs and 3 laptops. ![]() Three days ago, I signed up online for FreedomPop service using an unlocked Sprint iPhone 4S but the phone failed to activate. This is a Guide on how to activate a cell phone on Sprint that you. Sprint Activation Guide for Your New Cell Phone. 16GB 6'inch cell phone unlocked. Getting started is easy as buying a SIM (or activation code) and a plan. Just tell us which network your phone uses. VERIZON Compatible. AT&T Compatible. T-Mobile Map. T-MOBILE Compatible. SPRINT Compatible. Have a different carrier or not sure? Click here to check now ▻. ![]() SIM (Subscriber Identification Module) card is a specially programmed microchip that stores network identification data. It helps Sprint's network identify you as a customer. SIM cards are small, removable smart cards used to store data like your mobile phone number and the phone carrier you use. When you bring your phone to Sprint, you’ll need to replace your existing SIM card with a Sprint SIM card so that our network can identify you as a customer. We’ll walk you through the steps of popping out your old SIM and inserting ours. Your old carrier will have to domestically unlock your Apple devices before you can bring them to Sprint. Nexus 5 and Moto X Pure Edition devices are already domestically unlocked. Nexus 6 is already domestically unlocked—with the exception of Nexus 6 devices on AT&T. A domestic SIM unlock allows you to insert a Sprint SIM card into your device and attempt to activate it on the Sprint network. Unlocking your device will not necessarily make it interoperable with the Sprint network. In other words, a device designed for one network is not compatible with another network merely by unlocking it. Additionally, unlocking a device may enable some functionality of the device but not all (e.g. An unlocked device may support voice services but data services may not work or may be limited when activated on the Sprint network). Visit a to check your device's compatibility. • • • • • • • • • • ©2017 Straight Talk. Straight Talk is a registered trademark of TracFone Wireless, Inc. 2017, a subsidiary of America Movil. All other trademarks, service, marks, and trade names referenced in this site are the property of their respective owners. *At 2G speeds, the functionality of some data applications, such as streaming audio or video may be affected. Please refer always to the latest at StraightTalk.com. †To get 4G LTE speed, you must have a 4G LTE capable device and 4G LTE SIM. Actual availability, coverage and speed may vary. LTE is a trademark of ETSI. Straight Talk’s Bring Your Own Phone plan requires a compatible, unlocked phone, activation kit and Straight Talk unlimited service plan. User may need to change the phone’s Access Point Name Settings. Straight Talk reserves the right to terminate your service for unauthorized or abnormal use. ∆ By texting keywords to 611611 you are consenting to receive response messages. Message and Data rates may apply. Please refer always to Straight Talk's Privacy Policy at Please note, if you switch to Straight Talk, you may be subject to fees from your current provider. Having trouble with deploying a VMware Windows 2008 R2 Template and it failing to sysprep? It could be you’ve sysprep’d the template image too many times. Here’s the fix. Microsoft decided with 2008R2 and older OS’s that to help curb piracy you could only use sysprep to rearm the Windows activation counter 4 times. This is fine until you have a sysprep’d image that you want to maintain or if you inherit an image that has already used up it’s 4 rearms and you need to deploy a new server from the image. The official solution is to rebuild the image – which is fine because every image comes with a detailed rebuild guide, right? ? At least in Windows 2012 this problem has been mitigated as the rearm counter is now set at 1000. Wouldn’t it be nice if there was a sneaky fix to reset the rearm counter? Well there is. Caveats Be warned you will need to re-enter your activation key and reactivate Windows using this process (not a big issue if you are using a KMS key). Windows Server 2008R2 Virtual Lab Activation strategies? You can prolong / reset the counter 3 times. Windows 2008 R2 — Generate new activation key for. Feb 22, 2011 Windows Server 2008 R2 builds on the award-winning. Installing Windows Server 2008 R2; Windows Server 2008 R2. To reset the activation. May 11, 2011 Sysprep, SkipRearm, and Image Build Best. How many times you can reset activation on. Server 2008 R2 SP1. If you use KMS license activation. Type slmgr.vbs -dli, and then press ENTER to check the current status of your evaluation period. To reset the evaluation period, type slmgr.vbs –rearm, and then press ENTER. Restart the computer. You will also need to know the local administrator password of the server. The Fix To check the re-arm counter fire up the server (convert the template to a VM if necessary) and log in. From a command prompt run: slmgr.vbs /dlv Have a look at the re-arm counter value and confirm it is indeed zero (If it’s not zero you have another problem) Next, you need to jump through a few hoops to delete the activation product key. Use notepad to create a file which contains the following: reg load HKLM MY_SYSTEM “%~dp0Windows System32 config system” reg delete HKLM MY_SYSTEM WPA /f reg unload HKLM MY_SYSTEM Save it as a.bat file to the root of C: i.e. C: rearm.bat To run the.bat file you need to be in a recovery command prompt. ![]() ![]() To get there you need to: • Reboot the server and after the BIOS screen press F8 to get to the advanced boot options. • Select Repair Your Computer • Enter the local administrator credentials when required and choose to open a command prompt. (Alternatively, if you can’t see a Repair Your Computer option, boot from a 2008R2 DVD and choose the Repair your computer / Command Prompt options). Next you need to find your.bat file – note C: drive may now be on the D: due to how the disks are mounted in recovery mode. Switch between disks and use the DIR command to find your.bat file. Run your.bat file and then restart your computer. Your windows should now be in the activation grace period without a key and with the rearm count reset to 4. If you use KMS licensing follow for a guide on how to use slmgr to add the KMS key back into the registry using the command: slmgr.vbs /ipk I hope you find this one useful it certainly saved me a lot of effort as I didn’t need to rebuild multiple images just to add a few Windows updates! Applies to • Windows 10 • Windows 8.1 • Windows 8 • Windows 7 • Windows Server 2012 R2 • Windows Server 2012 • Windows Server 2008 R2 Looking for retail activation? • There are three possible scenarios for volume activation of Windows 10 or Windows Server 2012 R2 by using a Key Management Service (KMS) host: • Host KMS on a computer running Windows 10 • Host KMS on a computer running Windows Server 2012 R2 • Host KMS on a computer running an earlier version of Windows Check out. Key Management Service in Windows 10 Installing a KMS host key on a computer running Windows 10 allows you to activate other computers running Windows 10 against this KMS host and earlier versions of the client operating system, such as Windows 8.1 or Windows 7. Clients locate the KMS server by using resource records in DNS, so some configuration of DNS may be required. This scenario can be beneficial if your organization uses volume activation for clients and MAK-based activation for a smaller number of servers. To enable KMS functionality, a KMS key is installed on a KMS host; then, the host is activated over the Internet or by phone using Microsoft’s activation services. Configure KMS in Windows 10 • Open an elevated command prompt. • Enter one of the following commands. • To install a KMS key, type slmgr.vbs /ipk. • To activate online, type slmgr.vbs /ato. • To activate by using the telephone, type slui.exe 4. • After activating the KMS key, restart the Software Protection Service. For more information, see the information for Windows 7 in. Key Management Service in Windows Server 2012 R2 Installing a KMS host key on a computer running Windows Server allows you to activate computers running Windows Server 2012 R2, Windows Sever 2008 R2, Windows Server 2008, Windows 10, Windows 8.1, Windows 7, and Windows Vista. Note You cannot install a client KMS key into the KMS in Windows Server. This scenario is commonly used in larger organizations that do not find the overhead of using a server a burden. Note If you receive error 0xC004F015 when trying to activate Windows 10 Enterprise, see. Configure KMS in Windows Server 2012 R2 • Sign in to a computer running Windows Server 2012 R2 with an account that has local administrative credentials. • Launch Server Manager. • Add the Volume Activation Services role, as shown in Figure 4. Adding the Volume Activation Services role in Server Manager • When the role installation is complete, click the link to launch the Volume Activation Tools (Figure 5). Launching the Volume Activation Tools • Select the Key Management Service (KMS) option, and specify the computer that will act as the KMS host (Figure 6). This can be the same computer on which you installed the role or another computer. For example, it can be a client computer running Windows 10. Configuring the computer as a KMS host • Install your KMS host key by typing it in the text box, and then click Commit (Figure 7). Installing your KMS host key • If asked to confirm replacement of an existing key, click Yes. • After the product key is installed, you must activate it. Click Next (Figure 8). Activating the software The KMS key can be activated online or by phone. See Figure 9. Choosing to activate online Now that the KMS host is configured, it will begin to listen for activation requests. However, it will not activate clients successfully until the activation threshold is met. Verifying the configuration of Key Management Service You can verify KMS volume activation from the KMS host server or from the client computer. KMS volume activation requires a minimum threshold of 25 computers before activation requests will be processed. The verification process described here will increment the activation count each time a client computer contacts the KMS host, but unless the activation threshold is reached, the verification will take the form of an error message rather than a confirmation message. Note If you configured Active Directory-based activation before configuring KMS activation, you must use a client computer that will not first try to activate itself by using Active Directory-based activation. You could use a workgroup computer that is not joined to a domain or a computer running Windows 7 or Windows Server 2008 R2. To verify that KMS volume activation works, complete the following steps: • On the KMS host, open the event log and confirm that DNS publishing is successful. • On a client computer, open a Command Prompt window, type Slmgr.vbs /ato, and then press ENTER. The /ato command causes the operating system to attempt activation by using whichever key has been installed in the operating system. The response should show the license state and detailed Windows version information. • On a client computer or the KMS host, open an elevated Command Prompt window, type Slmgr /dlv, and then press ENTER. The /dlv command displays the detailed licensing information. The response should return an error that states that the KMS activation count is too low. This confirms that KMS is functioning correctly, even though the client has not been activated. For more information about the use and syntax of slmgr.vbs, see. Key Management Service in earlier versions of Windows If you have already established a KMS infrastructure in your organization for an earlier version of Windows, you may want to continue using that infrastructure to activate computers running Windows 10 or Windows Server 2012 R2. Your existing KMS host must be running Windows 7 or later. To upgrade your KMS host, complete the following steps: • Download and install the correct update for your current KMS host operating system. Restart the computer as directed. • Request a new KMS host key from the Volume Licensing Service Center. • Install the new KMS host key on your KMS host. • Activate the new KMS host key by running the slmrg.vbs script. For detailed instructions, see and. See also • Not finding content you need? Windows 10 users, tell us what you want on. Has anyone activated their DNA or know about DNA activation? I was downloading some other Brainwave beats (Hemi-Sync - The Gateway Experience $500 damn expensive) when I saw a collection of CD's from ShapShifter.co called ShapeShifter DNA Activation. I thought it looks interesting so I started downloading it (torrent leech) 2.05 gigs. It claims normal humans use 2 DNA strands and this program will open up your DNA to 12 strands. Has anyone activated their DNA? ![]() Configuration Best Practices for Motorola. Note that if you are using Mobile Companion. Please refer to Chapters 1 through 4 of the symbol user guide for a. Enjoy one free magazine article per month or subscribe now for unlimited access. Activate your access or sign in. About the Magazine. Advertise With Us. And did it have any side effects? And any information on DNA activation is appreciated. If anyone would like to try it I'm willing to upload. That way I can compare results with others using it. The description from the torrent site: Very special and amazing meditation tools. This music unlocks the dormat DNA strands. Here you are getting the complete four CD series and the companion guide in PDF. They were ripped in lossless. Can be listened to while working, excercising, sleeping for lucid dreaming, meditation. The more you listen the more you get out of it. I seen this series on here, but never in lossless. I purchased these and ripped them myself. The set, with the guide, cost me $96. Unlike Hemi-Sync, the Activation series has to be in lossless to get the full effect according to the creators (they could just be saying that to prevent pirating of course!). ![]() Also includes two other CD's from ShapeShifter. The two other CD's I found on another torrent site. They are 320kbps. Here are the files in this torrent: Shapeshifter - DNA Activation LevelOne Companion Guide Shapeshifter - DNA LevelOne - Activation 1 Shapeshifter - DNA LevelOne - Activation 2 Shapeshifter - DNA LevelOne - Activation 3 Shapeshifter - DNA LevelOne - Activation 4 Shapeshifter - Odyssey - Bioenergyfield Balancing And Harmonizing Shapeshifter - Shambala - Abundance, Opening, Clearing Here is the description from Amazon: This 4 CD set is accompanied by Companion Guide. Each CD contains multi-dimensional, shapeshifting, organic soundscapes channeled with clear and impeccable intent from a deep connection with the Creative Muse. This cybershamanic ambient music is a transcendent and profoundly powerful tool for awakening and activating the full 12 strand DNA codex - our bridge between the multiple dimensions of matter and the Divine. The Companion Guide provides insightful transmissions about the vast potential of this transformational music - the next step in sound healing. From the deepest space within, waveforms of a higher implicate order resonate the Light Body and the DNA matrix, which contain the blueprint for manifesting the multidimensional wonder and magic of all that you are and can truly become. The music and words in this truly unique project are powerful tools that connect you to your divine spirituality; balancing the chakra system, awakening past life memories and activating your evolutionary potential. I have the Gateway Experience. You're not missing much. The original recordings have Robert Monroe's voice guiding you through this or that. They are OK, but when you are zonked out from the binaural beats, and he chimes in again, it can startle you pretty good. Not cool to be feeling good, then get startled and feel like your heart is going to pop out of your chest from pumping so fast and the adrenaline hopping through your system. Read Monroe's books. They are much better than the Gateway Experience. Monroe did NOT have a pillow talk voice. IMO, no one needs this product. Try out something else for a lot cheaper, the Brainwave Generator. Binaural beats do show some promise to being effective in many areas. But it can be annoying to the ears if not 'covered up' with other sounds. I have used it (the brainwave generator) successfully to get rid of headaches or to feel a bit more mentally energized when I needed it. But I don't need that stuff any more. Once your brain gets used to the state, you can recall it anytime you wish and need no 'training wheels.' I don't buy into the whole DNA 'activation' bit. Just another thing to suck people in to blow some money thinking they are going to be better off. I've yet to hear anyone say they notice a difference. Kinda like that stupid bracelet they keep advertising on TV late at night. Nothing beats meditation, asking a ton of questions, and having an open mind receptive to the answers. No product out there on the market will top your own effort. There are no quick fixes, no fast tracks. I was actually going to use the whole Gateway Experience set but im not so sure about it anymore after what you said. I have used the Hemi-Sync Human Plus- 'Sweet Dreams' CD to help me sleep better and it has really worked well. It has let me remember my dreams when I haven't been able to remember much of my dreams at all for years. Also I'm still using it and learning to notice when I'm dreaming and I can take control of the dream. Though some times I don't know I'm dreaming and I still take control sometimes. I have used brainwave beats before from Brain-Sync Kelly Howell but I'm kind of off that now. It worked but it overloaded my brain and I want to try something new. I agree i can sync my brain into the frame of mind need to meditate or do different stuff with out the beats now that I have get used to it. Has the Gateway set worked for you at all? I really don't mind his voice, I have heard a lot scarier voices like BMV now that guys voice is creepy. I never made it through the whole program because a lot of the stuff repeats over and over again and it gets boring listening to him droll on and on. I just got fed up with it to be honest with you. The binaural beats no, but his voice. Good thing I never bought it. A friend loaned me his set. Are you willing to try an experiment for me? This will sound really strange. But seriously, try it. Eat a regular sized serving of Cream of Wheat, made with milk and on the stove, not the microwave, about an hour before you go to bed. Tell me if that increases your dream vividness or recall ability. Yes I know, funky stuff and weird advice. But humor me. Hehe And give it a few tries, not just a one-timer. Hehe Add some brown sugar and extra milk to it. Or fruit or whatever. Yes it surprised me actually and quite by accident. We sometimes have it in the late evening as a snack every now and then. It affected my husband too, who rarely if ever remember his dreams. He noticed a difference. Cooking it with milk instead of water actually makes it pretty good. Better than oatmeal it is in my opinion. I think it's the Vit B that does it. Just try it out a few times. It's very filing stuff tho so don't cook too much. I find the single serving recipe on the side of the box is plenty. Firstly.do you have a background of the history of symbology? Are you familiar with the power of your mind? Interested in meta/quantum physics? If you arent you should check those things out. If you are, then you would be ready to activate your own dna thru meditation. Hemisync helps your brain synchronize its hemispheres///theta waves once you have cleared all thought from your mind for a significant amount of time.see your dna with your minds eye. Visualize your dna while you are meditating and see it geometrically becoming more complex and visualize 'light' illuminating your latent strands. Now at first you will not be able to 'see' this light. Thats cool just use your imagination. Light is actually there, but your eye has to learn how to see it. Its on a different frequency than visible light. Human beings are beings of light and dark energy. Yang and Yin energy. Electric and Magnetic energry. Ultimately, no matter what program you use, the activation is happening to you. Meaning that it is an experience in YOUR reality. YOU have the ultimate power over your own bodymind, so you can do it yourself. Remember, whether you think you can't or you think you can. Either way you are right. Cheers and have fun.its a great path to walk down. I am familiar with the power of my mind I think. Now as for the background of the history of symbology I have no clue. And meta/quantum physics I have no clue about either. Soo i guess i'm not really ready for it. I don't want any weird side effects if im not prepared. I actually used this ESP/Physic brainwave enhancing thing for a while and started seeing 'shadow people',more and more so I quit that. It's those things you catch at the corner of your eye but when you look nothing is there. Well I started seeing those more and more. Products are like training wheels to me too. I prefer doing it the 'old-fashioned' way, if you will. However, with the times that we are in right now.some people do need those wheels. Symbology, to me is very important, because I discovered that your subconscious communicates to you in symbols. Sometimes a symbol is something like a pyramid, or a ring, or some other physical object. Sometimes your whole dream could be a symbol. Day dreams also can communicate to you if you learn to listen. The background in metaphysics/quantum physics helps because it can help you understand the 'supernatural' and 'paranormal'. Then its not so scary, because then you learn that thought actually creates. Its also essential because dna is microscopic. Why do you want to have the gifts that come with DNA activation? Above all, you can unlock your own dna by simply meditating on it every day. If something talks to you, listen. Pay attention and ask a question. Remember there is nothing to fear, for you tread in the pastures of thought. There is nothing to be scared of when you are meditating as you should not allow the thought of fear to enter your mind, unless contemplating the tao of fear. Patience is a virtue, and if you go about activating your dna without the expectation of results you will see the good things that came to those who waited. Peace and positive energy. Thanks for the valuable information. The reason I want to activate DNA is because I want to better myself as a human. That way I can have an edge on anyone else around me. The reason I got scared while meditating that time is because I recently been seeing lots of UFO, more than I'm used to seeing and I have noticed that some of these UFOs notice me. Sounds mad I know but its true. At the time I was losing sleep and when I heard something trying to contact me in deep meditation in that way I instantly lost concentration and freaked out. Weather it was a ghost or a alien, its kind of scary. I will have to try to control this fear and stop being a pussy. I have had a couple Psychics tell me I have a strong 6th seance that I have yet to open up and I have a fear of unlocking it and being one of those people that can see ghosts. That would suck. But another part of me want to keep meditating so I can better myself, as I have become much smarter and my brain has been working better with just 4 months of meditation it did have some weird side effects. Well, I think it has something to do with the Vit B. Check the nutrition label for the amount, I don't have it memorized. I recall a couple of years ago reading something on an OBE forum where a guy was taking Vit B tablets and had similar results. He was also using the W.I.L.D. Method for lucid dreaming. (wake-initiated lucid dreaming) What Vit B does for dreaming, I know not. *shrugs* For some symbology, I always loved reading Manly P Hall's book 'The Secret Teachings of All Ages.' You can read it for free at a website called Sacred Texts. It's definitely not light reading, but very interesting. Hall was a great lecturer. Buds, the 'voice' you heard talking to you may have been something you probably wouldn't expect. It may have only been you. Let me explain. Sounds strange, but I feel this is the case, that we all have some sort of 'Oversoul' that is on a higher plane of existence, and we are a part of it and not the whole. That we took a portion of ourselves, separated from the Higher Self and chose to incarnate on Earth for learning purposes, experience and soul growth. But of course, the idea of reincarnation goes along with this. After physical death, we merge back into the higher self and the whole thing begins again, each time it's enriched with more experience. Earth is like a big giant school, full of possibilities and learning experiences. When we're done, we move on to something else. (a side note, I commonly have dreams of school, where I swore I graduated from high school but they keep telling me I didn't and I have to go back to class to learn more. Hehe Usually they say it's because of only one class I missed. I always get mad but just sigh and keep chugging, only to wake up and realize it was just a dream and yes I really did graduate in real life. ) I don't see it discussed on this forum, but there is a kind of 'movement' towards people connecting with their higher selves on a conscious level. All in all, I'd say if you hear a voice again, have a little chat. Ask questions. Test the response. If it feels negative and yucky, it's not your higher self. If it feels 'instructive' but you get no negative vibes from it, its either a part of you or another higher being that has your best interests in mind. Yeah it can be a bit disconcerting at first, making you think WTF was that?!?!? But after the initial shock, it gets easier. If you end up in contact with something you don't like, just tell it to bugger off and leave you alone for you have better things to do than to entertain it. So, chat it up I say. (Edited for a spelling boo boo.) [edit on 7/10/2008 by Ceara]. • Open Windows Update by clicking the Start button. In the search box, type Update, and then, in the list of results, click Windows Update. • In the left pane, click Check for updates, and then wait while Windows looks for the latest updates for your computer. • If you see a message telling you that important updates are available, or telling you to review important updates, click the message to view and select the important updates to install. • In the list, click the important updates for more information. ![]() Select the check boxes for any updates that you want to install, and then click OK. • Click Install updates. Read and accept the license terms, and then click Finish if the update requires it. If you're prompted for an administrator password or confirmation, type the password or provide confirmation. ![]() Welcome to SUmail! Your official Syracuse University email account has been established in a system called SUmail. SUmail is managed by the University and utilizes. Sign in - Google Accounts. NEW YORK (AP) - Meg Whitman, who oversaw the breakup of one of Silicon Valley's pioneering companies, is stepping down as CEO of Hewlett Packard Enterprise Co. HPE said Tuesday that Whitman will hand over the reins of the company to its president, Antonio Neri, on Feb. Whitman, 61, took over in 2011 at the former Hewlett-Packard Co., a company founded in 1939 and for years a tech bellwether. ![]() But it had struggled to keep up with industry trends toward mobile and cloud computing, shedding thousands of jobs in the process. In 2015, Hewlett Packard was split in two: one company, HP Inc., sells PCs and printers. The other led by Whitman, HPE, is focused on selling data-center hardware and other commercial tech gear to other big organizations. Since the breakup, Palo Alto, California-based HPE has furthered its transformation, spinning off a big chunk of its business software line-up last year in an $8.8 billion deal with Micro Focus International PLC. Both Whitman and Neri, 50, will serve on HPE's board. Whitman said Tuesday she plans on taking 'a little bit of downtime' after a 35-year career. And she ruled out working for a competitor. 'I've become quite loyal to Hewlett-Packard and Hewlett-Packard Enterprise,' she said. 'I love this company and I wouldn't ever go to a competitor.' She was in the running to replace Travis Kalanick as the CEO of ride-hailing app Uber but that job went to Dara Khosrowshahi in August. Before HP, Whitman served as chief executive of eBay Inc., a company she steered from a fledgling startup with just 30 employees into a household name beginning in 1998 until 2008. She also ran an unsuccessful California gubernatorial campaign, which cost her $144 million. Forbes recently listed her net worth as $3.2 billion. That makes her No. 6 on the magazine's list of U.S. Women who made their fortunes. HPE's stock dropped 6.5 percent in after-hours trading Tuesday following the announcement. Copyright 2017 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2018
Categories |