Monthly Archives: May 2014

My Linux Access Recovery Technique on Linux CentOS

Some time ago I got an idea on granting access to my Linux machine which had the passwd and shadow files CRC protected, the SSH and Single User Mode both disabled.

To apply this method, the user needs some sort of physical access to the machine. So, finally I put together a script – all the other instructions are included in description (see below the link from the end of this article). You may also want to read the following post too:

Before going ahead with the reading, please also read the disclaimer below.

DISCLAIMER: This technique is presented for educational purposes only and you take full responsibility for all your actions.

You can download the script from here:

How to Extend Windows XP Update

I read an article yesterday which describes how and why the Windows XP/2003 update period can be extended by doing a simple registry hack. It appears that the modification from Windows Registry makes the Windows appear as Windows Embedded POSReady 2009.

So, the idea is that the following registry key has to look as below:


Great stuff, huh?! :-O OK, the good part is that Windows Embedded POSReady 2009 receives updates until April 2019. At least, that’s what the article says.