logo

Sentinel SuperPro Emulator on Windows 7 64-bit

The following procedure allows to emulate the hardware keys like Sentinel SuperPro, with some changes is also possible to emulate the following key: HASP SRM / HL / 4 / Hardlock.

The procedure has been tested successfully on Windows 7 64-bit Sp1 installed on a MacBook Pro, if you are looking for 32-bit version read this article.

Download from here the followings tools:

Disable, from the Control Panel the “User Account Control” (UAC).

Run  Driver Signature Enforcement Overrider on machine  and click on “Enable Test Mode” (or from Command Prompt run the following command “bcdedit /set TESTSIGNING ON”)

test-mode

Confirm the operation.

test-mode-enabled

Exit and restart the PC and check if you’re in test mode.

windows-test

Install “multikey64”.

installa-multikey

Run “Driver Signature Enforcement Overrider” and select “Sign a System File” and click next button.

sign-system-file

Input full path of  “MultiKey.sys”  and click ok

(example C:\Windows\Sistem32\drivers\multikey.sys).

multikey-insert

Exit and restart the PC

Insert the Sentinel Hardware Key, run “ssp2mk” and click the icon on the top left corner.

clic

All fields will be compiled as follow.

ssp2mk

The state will be “connected”.

dettagli

Go in the middle field (under regedit4) and save the new text file with a .reg extension (example  33B4_86C9_0002-9003.reg)

regedit

Click on the new *.reg file and confirm to add the change to the System Registry.
editor-del-registro

Run “Regedit” and check if the changes was properly applied (HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / MultiKey / Dumps / key-name).

editor
Remove the Sentinel hardware key and restart the computer.

On restart you will not need to inserting the Sentinel Key to start up your software.

DNS leak: problemi di sicurezza

Un altro problema di sicurezza  e privacy da non sottovalutare nelle connessioni, anche in quelle realizzate tramite VPN, è il DNS leak.

Dns leak

Ovvero la richiesta che dal personal computer viene inoltrata al server DNS del nostro ISP (per convertire il nome del dominio in un indirizzo IP), è inviata al di fuori del tunnel  VPN, pertanto non protetta e rintracciabile (a tale proposito rimando all’articolo su DNSCrypt).

Sul sito http://dnsleak.com è possibile eseguire un DNS leak test per verificare il proprio DNS (un sito alternativo è https://www.dnsleaktest.com).

Utilizzando la connessione VPN di TunnelBear  il risultato è il seguente:

DNS no leak

Disattivando la connessione:

DNS leak

WordPress: Errori di WPML

Per risolvere i seguenti errori del plugin “WPML” di WordPress:

Warning: explode() expects parameter 2 to be string, array given in /wp-content/plugins/sitepress-multilingual-cms/sitepress.class.php on line 6270

Warning: Invalid argument supplied for foreach() in /wp-content/plugins/sitepress-multilingual-cms/sitepress.class.php on line 6272

Warning: explode() expects parameter 2 to be string, array given in /wp-content/plugins/sitepress-multilingual-cms/sitepress.class.php on line 6275

Sostituite nel  file wp-content/plugins/sitepress-multilingual-cms/sitepress.class.php:

la linea  6270:

$include_arr = explode(‘,’, $q->query_vars[ ‘include’ ]);

con:

$include_arr = explode(‘,’, (string) $q->query_vars[ ‘include’ ]);

la linea  6272:

foreach($include_arr as $include_arr_id)

con:

foreach((array)$include_arr as $include_arr_id)