Author is a passionate Blogger and Writer at Dlightdaily . Dlightdaily produces self researched quality and well explained content regarding HowToGuide, Technology and Management Tips&Tricks.

Posts By: Dlightdaily


Windows 8.1 and Windows 10

The product key is located inside the product packaging, on the receipt or confirmation page for a digital purchase or in a confirmation e-mail that shows you purchased Windows.

If you purchased a digital copy from Microsoft Store, you can locate your product key in your Account under Digital Content.

Windows 7

The product key is located inside the box that the Windows DVD came in, on the DVD, on the receipt or confirmation page for a digital purchase or in a confirmation e-mail that shows you purchased Windows.

If you purchased a digital copy from Microsoft Store, you can locate your product key in your Account under Digital Content.

Academic Products

Your product key is located on the receipt page when you purchase or in the Order History section of the WebStore from which you ordered the software.

Devices Pre-Installed with Windows

Before using operating system copies from this site for install, re-install or recovery on devices with pre-installed operating systems, see your device manufacturer or reseller for the customized drivers and applications specific to your machine.

Using operating systems copied from this site for install, re-install or recovery may void your support agreement with your manufacturer or reseller.

Any drivers or programs that were installed by the device manufacturer or reseller may be removed during installation.

Windows 8.1 & 10:

The product key may be embedded on the motherboard or may be on the Certificate of Authenticity sticker on the bottom of the device.

Windows 7:

For devices that came with Windows 7 pre-installed, the product key may be on the Certificate of Authenticity sticker on the bottom of the device.

For more information about Windows product keys and genuine Microsoft products, see What is a product key and How to Tell site.


NSClient++ Return Code Of 139 IS Out Of Bound…

This means something is wrong. To find out what is wrong you need to check the NSClient++ log file. The message means that an plugin returned an invalid exit code and there can be many reasons for this but most likely something is miss configured in NSClient++ or a script your using is not working. So the only way to diagnose this is to check the NSClient++ log.

One simple way to show the log is to run in test mode like so:

net stop nscp

nscp test

… wait for errors to be reported …


net start nscp


How Do You Run A Script In Powershell?

Run A Script In PowerShell?

  1. Launch Windows PowerShell, and wait a moment for the PS command prompt to appear
  2. Navigate to the directory where the script lives

PS> cd C:\my_path\ (enter)

  1. Execute the script:

PS> .\run_import_script.ps1 (enter)

If it fails, you should check “setexecutionpolicy”


  1. Launch a Windows PowerShell window run as an administrator.
  2. Navigate to the location where the reactivateUsers.ps1 is located on the central node.
  1. Update the PowerShell execution policy on the system to allow the script to run.

In the PowerShell window, enter set-executionpolicy unrestricted.

The system will prompt to confirm the change.

Enter the letter “Y” or press the enter key to change the execution policy setting.


PowerShell’s execution policy settings dictate what PowerShell scripts can be run on a Windows system. To run the reactivateUsers script, the execution policy needs to be changed.

  1. Run the PowerShell script reactivateUsers.ps1. PowerShell requires specifying a path with the script in order to run. If the PowerShell window is in the current directory of the script _._ can be used for specifying the current path. Assuming the PowerShell window is in the directory where reactivateUsers.ps1, enter .\reactivateUsers.ps1 to run the script.
  1. Set the execution policy back to the value it was before running the script using the set-executionpolicy commandlet.
  1. And you’re done!

What am I missing??

Or: you can run the PowerShell script from cmd.exe like this:

powershell -noexit “& “”C:\my_path\run_import_script.ps1″”” (enter)


What are the process state in Unix ?


What is the process state in Unix?

This is a small experiment to show the life cycle of a Unix process. A Unix process is created in the idle state and is then moved between ready to run, running, and possibly waiting (or sleeping) , until it exits and becomes a zombie. Once a process, usually the parent process, reaps the exit status of the zombie, then the process is destroyed.

As a process executes it changes state according to its circumstances. Unix processes have the following states:

Running: The process is either running or it is ready to run.

Waiting: The process is waiting for an event or for a resource.

Stopped: The process has been stopped, usually by receiving a signal.

Zombie: The process is dead but has not been removed from the process table.

What is a zombie?

When a program forks and the child finishes before the parent, the kernel still keeps some of its information about the child in case the parent might need it – for example, the parent may need to check the child’s exit status. To be able to get this information, the parent calls `wait ()’; In the interval between the child terminating and the parent calling `wait ()’, the child is said to be a `zombie’ (If you do `ps’, the child will have a `Z’ in its status field to indicate this.)

How can a parent and child process communicate?

A parent and child can communicate through any of the normal inter-process communication schemes (pipes, sockets, message queues, shared memory), but also have some special ways to communicate that take advantage of their relationship as a parent and child. One of the most obvious is that the parent can get the exit status of the child.

write your view on this topic in the comment box!

WannaCRY Ransomware , How to keep your system safe

We will discuss about wannacry ransomware cyber attack and how to decrypt data which encrypted by wannacry.


The WannaCry ransomware began to spread across the all over the Internet on Friday May 12th, 2017. I took my phone to see the text from my friend, “What should we do to beware the ransomware?” My stomach tightened. It was time for friendly IT support.

Their home system was set to auto-install patches. All of their files were backed up remotely to a secure system and their firewall & malicious software protections were current.

I determined to share the steps that I use to protect my friend’s computer so that end users can better protect themselves when issues like the WannaCry ransomware crop up from time to time. If you are using a Windows operating system here is a helpful steps to follow.

Open Windows Update by clicking the Start button in the lower left corner. In the search box, type Update, and then, in the list of results, click Windows Update.


  1. Click on Check for updates, and then wait while Windows looks for the latest updates for your computer.

  2. Then turn on the automatic windows update


   3.  Click Install updates.


If you’re not of a mind to do thing automatically you can set it to manually install patches.

• Use this link to download update Manual :

MS17-010 Update for Windows 8.1
The first option is for 64bit system and another option for 32bit system
MS17-010 Update for Windows 10
The first option is a 32bit system and a second option for a 64bit system
Update link for MS17-010 for Windows 7 and Server 2008
Choose the first 64bit system choice or the second 32bit option.
Links Update for MS17-010 for Windows XP and Server2003 and 8

In the case of a user that has MacOS who might not be technically sound knowledge, have them click on the AppStore and select “update” next to the patches that need to be installed.



  •  No matter what your platform of choice.
  • Make sure that you have malicious software protections   installed and that they are kept up to date.
  • Your system firewall should deny inbound connections and anti-virus should be kept current.
  • While these programs are not a 100% guarantee, by any stretch of the imagination, they will help with the lot of the cruft that could negatively affect your systems.


How to Decrypt WannaCRY.


A tool under the name WanaKiwi is “able” to decrypt the data in the hands of the ransom software,But only if the user has not restarted or turned off the computer.

This condition must come from how the rudimentary software algorithm works. The researcher focused on the initial numbers stored in the random memory of the computer on which the software is based to perform the encryption process.

More generally and simply, the tool searches for these numbers and begins the process of decrypting encrypted data in advance, hence the importance of the above requirement, in addition to the reference of some other reports to another condition is not to take off new software after infection such as games and office applications which can damage the order Store those numbers on your computer’s memory by using that space for another program.

Note: The new tool works on both Windows 2008, 7, XP and Vista, and has been proven effective by some security companies. Another tool named WanaKey is based on the same principle
Link Download direct: or

For more information and reference.

Often I see people finding fault to the end users. Rather than do that, I preferred to share what should be done to better protect their systems. Hopefully, if we preserve to share more information like this it will help to better protect the home user.