Cannot logon to Windows XP without activation beyond 30 days

Well, guys this is the most common, issue faced with system administrators who forgot to activate XP within 30 days of its installation.

In my case, the issue was P2V of Windows XP physical machine and due to drastic hardware architecture changes, Windows XP loses its activation and requires re-activation.
See my previous blog post

With the instructions i was successfully able to first configure network settings and then activated the OS.
Here is the brief step by step instructions:

  • Turn on your computer and login to your account. You get a message telling you that you need to activate your product, Click Yes and the Activate Windows screen will load.
  • Now press the windows key + U and Microsoft Narrator should pop up. Click OK for the little disclaimer Narrator gives you and behind it will be the Narrator option screen. In the top left of the Narrator option screen, you’ll see a little computer icon, click it and a drop-down menu will appear.
  • Click on About Narrator. On the next pop-up, click the link Microsoft Web site. You now have access to Internet Explorer!!! Whether you have an internet connection at the time or not, it doesn’t matter, we aren’t actually trying to get online.

Now we are going to access your desktop and Start bar. In the address bar, type: C:\WINDOWS\explorer.exe and press enter.

VOILA! You have access to your entire computer just like you normally would! Don’t close Narrator though, because windows tends to realize what you’re doing and reset back to the Activation screen. It’s not bullet-proof, sometimes my computer will reset back to the activation screen, but you can just do the same thing again as many times as you want!

Thanks to this internet article

XVA won’t start after successful import

I converted a physical machine (Windows XP) successfully & imported to my XenServer with XenConvert. The import appears to be successful. However, when I start the machine, all I get is a black console screen with the following info:

Citrix XenServer
cirrus-compatible VGA is detected

Processor 1: Xen(R) Virtual CPU
XS Virtual IDE Controller Hard Drive (73GB)
XS Virtual ATAPI-4 CD-Rom/DVD-Rom

Boot device: Hard Drive – success.

Some licensed legacy application was running on this machine and we needed to eliminate any physical PC in Datacenter.
Else there was no need to import XP rather would have built new one.
Well after repeated reboot no success with the VM, searching the forum someone suggested to fix boot sector with Windows XP repair disk.
The iso of existing XP-SP3 didn’t offer repair screen since the original install didn’t match the iso file.

SystemRescueCd-x86-2.5.1 iso came handy, booted from this gentoo based linux distro and fixed the boot sector with “ntfsfix”.
Disconnected the iso and voila the VM booted successfully.

So far only the vm booted successfully, but any geek would guess that due to HAL changes between the physical and virtual, XP ends up in re-activation process.
Without network the VM cannot connect to internet.. how will i fix this.
look out for next blog post… 🙂

How To Whitelist Hosts/IP Addresses In Postfix

If you are administrating a mail server and use blacklists to block spam (like in this article: How To Block Spam Before It Enters The Server (Postfix)), you probably know this problem: from time to time your customers complain that they cannot receive emails from certain freemailers. Most often this happens because a freemailer was abused to send out spam and therefore got blacklisted. This short guide shows how you can whitelist such a mail server in Postfix to make your customers happy again.

I do not issue any guarantee that this will work for you!

If a blacklisted server tries to send mail to your server, you should find something like this in your mail log:

SMTP error from remote mail server after RCPT TO:<>: host []: 554 5.7.1 Service unavailable; Client host [] blocked using; Currently Sending Spam See:

In this example, the mail server is blacklisted and therefore blocked.

To whitelist that server, create the file /etc/postfix/rbl_override where you list all IP addresses or host names (one per line!) that you want to whitelist:

vi /etc/postfix/rbl_override OK OK
mail.freemailer.tld OK

After you’ve created/modified that file, you must run

postmap /etc/postfix/rbl_override

Next open /etc/postfix/ and search for the smtpd_recipient_restrictions parameter. Add check_client_access hash:/etc/postfix/rbl_override to that parameter, after reject_unauth_destination, but before the first blacklist.

So if smtpd_recipient_restrictions looks like this now…

vi /etc/postfix/

[...] smtpd_recipient_restrictions = reject_invalid_hostname,<br />                               reject_unauth_pipelining,                               permit_mynetworks,                               permit_sasl_authenticated,                               reject_unauth_destination,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               permit [...]

… modify it so that it looks as follows:

[...] smtpd_recipient_restrictions = reject_invalid_hostname,                               reject_unauth_pipelining,                               permit_mynetworks,                               permit_sasl_authenticated,                               reject_unauth_destination,                               check_client_access hash:/etc/postfix/rbl_override,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               reject_rbl_client,                               permit <br />[...]

That’s it! Restart Postfix, and you’re done:

/etc/init.d/postfix restart


Amazing product, technologies & things I use every day of my life.






iPhone 3GS



SUV Blazer 1998


Server Virtualization Home Lab

XenServer v6.2


Cloud Storage, Cross Platform Sync




VMware WorkStation v8.0


Wrist watch

Sapphire Tungsten


Sync notes, capture anything, access anywhere



Search engine, personal email

Search, Gmail


Personal Laptop

HP Pavilion DV6000


Virtual Machine OS

Windows 7 x64


Cellular Provider

Alwaha: Prepaid Voice/Data 3G Sim




Open Source

Personal Laptop OS

Ubuntu Desktop Linux  11.10


Social Interaction

Facebook, Twitter, Linkedin & Pinterest


DSL BroadBand & Landline Telephone

Mband Jood: 4 MB Plus Free Calls


And the list goes on and on and on and on…..

Next time more on individual product, technologies, things & favorites

Share yours.

Bluecoat Proxy – Site restriction

Hey, sysadmin’s

Those administering Bluecoat Proxy SG appliance and has encountered that allowing certain sites/url for selected users does not work properly.

This is due to that the main site accessing  different subsites/urls in background for providing the associated services.

All those sites/urls have to be taken into consideration while providing access to particular site.

Well lets take for example you give access to only hotmail/ and its not working properly then in that case the following all urls needs to be permitted for flawless working:

hotmail site     

and for facebook here are the URL which includes games apps too.

facebook site


iPhone & Gmail account

If You have iPhone and are not able to add your gmail account or if authentication fails, then following condition applies:

You have turned on two steps verification for gmail account then you need to authorize your iPhone device. When this is done a password DIFFERENT from your google account password is autogenerated by Google. It is this autogenerated password that you need to enter into your iphone. So here’s what worked.

Log into your Google account through and go to Personal Settings > Security > Authorizing applications & sites and revoke your previous access to iphone (if any)

Then create it again and when the password is generated in the ‘Generate new application-specific password box’, use that new generated password in your Gmail Account Information on the iPhone below your email address.

Changing the World for the Better with Big Data, The Cloud

Original Post here

It’s an exciting time to be in technology. As IT professionals, we get to say we are the generation that witnessed how Big Data transformed the world. we saw how virtualization revolutionized IT and gave birth to the cloud. But more importantly, we get to say that we are the generation that witnessed how technology helped us feed the world quicker, warm the world quicker, cure the world and maybe even heal the world.

You see, everything we do on a daily basis as IT professionals means something if we can put it in context. They say every action generates a reaction, an event could lead to a sequence of events or could have a trickle effect, but there is so much data out there, so much information and our brain can only process small nuggets, can only address information from a very narrow perspective.

Bottom line is, we are slow, and most research takes years. It takes years because it is necessary to correlate data and make sense of it. So, what if there was a way to correlate data and all sorts of information in real time? If that were possible, would you not be able to make better decisions for your business? Would that not enable you to find cures for disease faster? Or maybe even avert epidemics altogether? Maybe even avert wars? Stop terrorist attacks? The possibilities are limitless. They say society is knowledge, and knowledge is power. Well, Big Data promises to deliver information of all sorts, correlate it and analyze it so that you can make a better, more informed decision in real time.

Enough philosophy — let’s look at an example. What if the shortage in certain types of food, which is high in certain vitamins was responsible for people getting sick? Getting the flu? This type of data research and analysis would take years to gather, to understand and to conclude. The data would be so old and after-the-fact that it would only be useful in university studies and research papers. So, what if that information was available in real time? What can government do with it? How about they alert the communities mostly affected, suggest certain vitamin intakes or perhaps the consumption of other foods high in that vitamin. What about pharmaceutical companies? They could use that data to develop a cure to a flu variation that has not spread yet. But you will say that is all for large enterprise. I say Big Data is for all sizes of enterprise. If you owned a pharmacy, would this information help you? Absolutely it would. Based on Big Data analysis, you might stock more of a certain type of medicine

That’s just one example of many on how Big Data can impact and better our lives, but processing that large amount of data requires a platform capable of handling that amount of data, computing it fast enough and is capable of scaling as fast as we generate data. Today, there are many platforms capable of doing that. Hadoop is one such platform, capable of ingesting structured and unstructured data, Hadoop is quickly becoming the platform of choice and has garnered support from the three largest database developers: Microsoft, Oracle and IBM.

The power of Hadoop is that you can deploy it on standard x86 computers and you can scale it by adding more nodes, a true implementation of grid computing. As a result, Big Data can be leveraged by large and small enterprises. As the data grows and your ability to manage it becomes more challenging, there is always the cloud, ready and able to address these concerns, able to scale, absorbing large quantities of data and unlimited computational resources.

Make no mistake, Big Data is here and enterprises that appreciate it, leverage it, will reap the benefits and grow substantially. Big Data for me is the first time I can literally appreciate the technology beyond the geeky aspect of engineering or putting it all together, and being able to know that our efforts make a difference in the world we live in.