热门 购物 团购 理财 文学 人才 体育 汽车 游戏 软件 军事 音乐 视频 媒体 论坛 博客 银行 交友 综合
一起购 唯品会 梦芭莎 趣玩网 凡客诚品 麦考林 乐淘鞋网 弗克尚品 绿盒子 俏物悄语 新蛋网 当当网 玛萨玛索
拉手网 糯米网 爱帮团 聚划算 58团购 美团网 QQ团购 大众点评团 窝窝团 美淘网 满座网 团宝网 饭统饭团
起点网 榕树下 小说阅读 潇湘书院 红袖添香 幻剑书盟 新浪游戏 太平洋游戏 163邮箱 中国游戏 游戏中国 霏凡软件 铁血军事
访问本站赠送红包啦!凡在支付宝搜索数字口令 528131323 都将获得红包,天天搜索此口令天天得红包^_^
Health Sitology Family Finance Appliances Shopping Clothing Education Legal Rituals Beauty Property Travel Pet Medical Cyclopedia History Military Computers Sports Job Anecdote Geographic Mixed Entertain Literature Emotion Agriculture

Activation fails when you try to activate Windows Vista or Windows Longhorn Server over the Internet

This article pertains to any of the following Vista errors.

1. Activation fails with error code 0x8004FE33.

2
The following Error events may be recorded in the Application log:

Log Name: Application
Source: Software Licensing Service
Event ID: 8198
Level: Error Description: License Activation (SLUI.exe) failed with the following error code: 0x80004005
Log Name: Application
Source: Software Licensing Service
Event ID: 1008
Level: Error Description: Acquisition of Secure Processor Certificate failed
Status Code=hr=0x8004FE33


3
Activation is not successful, and you are not prompted for credentials.

The reason for this may happen when you connect to the internet through a proxy server that has basic authentication enabled
When the proxy server is configured for Basic authentication, the server requires that you type a username and a password
However, the activation user interface does not let you enter these credentials
Therefore, the Basic authentication fails, and activation is not successful.

Here is what you can try.
1. Simply do not use the basic authentication on the proxy server or pick up that phone and activate over the phone
It is automated and should only take about 7 minutes.
2. If you must use the Basic Authentication then exclude the urls for the certificate revocation lists from
Do this by unauthenticating the CRLs from the proxy server

crl.microsoft.com/pki/crl/products/MicrosoftRootAuthority.crl
crl.microsoft.com/pki/crl/products/MicrosoftProductSecureCommunications.crl
microsoft.com/pki/crl/products/MicrosoftProductSecureCommunications.crl
crl.microsoft.com/pki/crl/products/MicrosoftProductSecureServer.crl
microsoft.com/pki/crl/products/MicrosoftProductSecureServer.crl


By Jacob Erdei
Reply content :
Photo link :
By Dennis JaylonBaby monitors are monitoring systems to keep tabs on your baby by listening or viewing your baby over a screen with the aid of a camera. It thus gives you the freedom to move around your house while still watching your baby. So y…  Details
Introduction Designing a disaster recovery system requires planning and consideration of the available options that will best fit your companys needs, SLA and budget. This guide will help you design an Exchange Disaster Recovery plan in conjunct…  Details
Besides the spam that you get on a daily basis there are actually real emails that you would like to keep, and you consider important enough that you might need them for reference some day, however storing those important e-mail on your hard drive is…  Details
In order for you to achieve a conceivable and satisfying result when you venture into a new kind of project the least thing that you would want to do is to rely on pure luckThere is this single skill that most people tend to overlook but in the end tr…  Details
Wireless keyboards and pointing devices are not uncommon, and they're far less brick-like than they were in the early days. One thing to keep in mind, however -- if you allow your organization to begin to heavily use bluetooth for things like wireles…  Details
It may not happen often, which is why, when it does it is a moment of complete panic and despairYour Windows mouse is dead and you are in the middle of heaps of work with several windows open and feel like your hands have been cut off.Despair no more,…  Details
CDs and DVDs are notorious for being easy to scratch or damage and for having a relatively short-term life span; but because they are highly affordable, available, compatible, easy to rip, burn, and share, they stay on as one of the most popular extern…  Details
Malware is now a common plague of computers these days and has become more common than the conventional virusIn this article you will find explanations of the different types of Malware, how to remove an infection and how to prevent an infection in …  Details
In this day and age, you can't be too complacent about the safety of your own homeCrime abounds everywhere, and even the seemingly safest areas are not sparedCrime prevention is a near impossible featHowever, crime detection leading to prosecution i…  Details
One thing that everyone should do, whether it is a home or business network, is map shared folders to other computers in the networkThis enables users to create shortcuts of the shared folder, provides for quick access and ease of useOnce the share…  Details