This works from anywhere! I’ve used that a few times, when I’ve changed jobs, 
to deactivate both JAWS and OpenBook on my former work machines.

I’m going to tell you a little story about when I left work. There is a 
technical reason for my doing so, as you’ll see by reading on.

Actually, there was a big argument about this the last time I deactivated 
everything on the machine. All of the software, including Windows itself, 
belonged to me personally. The original deal was that if I provided all the 
software for their clients’ use whilst I worked there, the Mac which Access To 
Work provided for my use would leave with me.

However, when the time came, my former boss mysteriously changed her mind, 
claiming she needed all the stuff that Access To Work bought for me. So, just 
before I left, I destroyed the Boot Camp partition I’d set up for Windows.

When I told her what I’d done, she went into a towering temper. She tried to 
claim that it had all belonged to her, despite the fact that I’d bought it all 
in the first place. Anyway, she even went so far as to have my former support 
worker’s boyfriend try to recover the partition. The tale of the support worker 
is a joke in itself, because it turned out that she was in the manager’s close 
circle of friends, and in her pocket. But that’s by the by. As I said, they 
tried to recover the partition, failing miserably, I would add.

I erased not only the Windows partition, but also the MacOS one using Target 
Disk mode from another machine. And it’s this mode which I have been leading up 
too by relating this sad sorry tael.

For those who don’t know, Target Disk Mode is a special boot mode which allows 
you to manipulate the hardware of one Mac from the Finder on another Mac. The 
two have to be connected using Thunderbolt connectivity, (on modern machines), 
or Firewire on older ones.

So, what I did was to set the work machine as the “Target” using my own MacBook 
Air as the “Master”. I then erased absolutely everything, using secureWipe, so 
that it could’t be recovered even by professional data recovery experts.

I then re-created the primary partition on the Target machine, and reinstalled 
the then current version of MacOS, (El Capitan). I handed back the machine in 
the exact state it was in when I unpacked it from its box. In other words, they 
would have to configure the machine again from absolute scratch.

When I last spoke to a friend of mine who attends the centre where I used to 
work as a trainer/support specialist, he informed me that the Mac was sitting 
there redundant, as nobody knew how to set up the base operating system, let 
alone Boot Camp and Windows. The manager of the centre had to pay out for 
another machine, distributed by one of the so-called accessibility companies. 
She bought a full-blown desktop with Supernova installed. It must have cost her 
well over £2000.00. Poetic justice, you might say. But I was damned if I was 
going to let her get away with all my licensed software!

Anyway, I wish that there was some way to do the same thing with a PC. I have a 
machine whose password we seem to have lost. Therefore, the only solution I can 
come up with is to reinstall Windows. Hence, if anybody does know how to 
install Windows 10 without visual assistance from the ground up on a 
bog-standard HP Pavilion Series 6 machine, I’d love to know about it.

=================================================

My compliments and kindest regards
Gordon Smith:
<[email protected]>
Accessibility & Information Technology Support Specialist..

This Message Was Created Using 100% Recycled Electrons. If you can avoid 
printing it, please do so. Think of the environment, save a tree!

  Contact:

• UK Free Phone: 0800 8620538
• UK Mobile/SMS: +44 (0) 7907 823971
• Vic. Australia: +61 38 82059300
• US/Canada: +1 646 9151493
• UK Geographic / Global: +44(0) 1642 688095

----------------------------------------
——





> On 26 Aug 2017, at 04:18, Iaen Cordell <[email protected]> wrote:
> 
> Thanks Sire, good tip.
> 
> 
> -----Original Message-----
> From: Dane Trethowan [mailto:[email protected]] 
> Sent: Saturday, 26 August 2017 12:58 PM
> To: Techno-Chat ... Technology Enthusiasm! <[email protected]>
> Subject: [Techno-Chat]: Reseting Authorisation: a tip for JAWS users
> 
> Hi!
> Those of us who use our JAWS license on multiple computers may have 
> encountered a situation where our authorisation needs to be reset.
> If you live in the US then the reset of your Authorisation - computer count 
> for your license - is extremely easy, just jump onto the Activation web page, 
> choose reset your authorisation, type in the information and press the reset 
> button however those outside the US face another layer to work with, that 
> being the contacting of your local dealer to initiate a Authorisation Reset.
> So why haven’t people outside the US got the access to the automated 
> Authorisation Reset that US customers have? We did - after all - buy JAWS 
> just the same.
> Well actually those outside the US can access the automated Authorisation 
> Reset using a VPN, I found this out for myself a few days ago when I needed 
> to reset my JAWS authorisation and I decided to give the VPN trick a go 
> having held on to speak to someone at Freedom Scientific’s Technical Support 
> line for just under half an hour, I have no objection to waiting mind you but 
> I thought that - if I could use the Automated system - then I could save a 
> whole heap of time.
> Anyway that’s how its done, for the moment at least <smile>.
> 
> ------------------------------
> 
> This post, like all posts to the Techno Chat E-Mail group has been scanned by 
> our server-side antivirus/malware solution. This should not, however, be 
> viewed as a substitution for your own security strategy. We assume no 
> culpability whatever, implicit or otherwise, for any compromise to your 
> systems as a result of opening any post to this group. Suffice it to say that 
> we remain vigilant within the boundaries of reason. We strongly urge you to 
> do likewise! You have been warned!!!
> 
> You can find an RSS listing of all posts to this group at:
> <https://mail.mac-access.net:7025/list/[email protected]>
> or at:
> <https://www.mail-archive.com/search?l=all&[email protected]>
> 
> To encourage your friends to join this group, first accept our thanks for 
> spreading the word. Then, have them send a message to the list processing 
> engine at:
> <[email protected]>
> To toggle on/off Digest (batch) mode for this group, please send a blank 
> message to:
> <[email protected]>
> To leave the group, please send a blank message to:
> <[email protected]>.
> 
> To contact the support address for this group, please write to:
> [email protected]>
> 
> ------------------------------
> 
> 
> ------------------------------
> 
> This post, like all posts to the Techno Chat E-Mail group has been scanned by 
> our server-side antivirus/malware solution. This should not, however, be 
> viewed as a substitution for your own security strategy. We assume no 
> culpability whatever, implicit or otherwise, for any compromise to your 
> systems as a result of opening any post to this group. Suffice it to say that 
> we remain vigilant within the boundaries of reason. We strongly urge you to 
> do likewise! You have been warned!!!
> 
> You can find an RSS listing of all posts to this group at:
> <https://mail.mac-access.net:7025/list/[email protected]>
> or at:
> <https://www.mail-archive.com/search?l=all&[email protected]>
> 
> To encourage your friends to join this group, first accept our thanks for 
> spreading the word. Then, have them send a message to the list processing 
> engine at:
> <[email protected]>
> To toggle on/off Digest (batch) mode for this group, please send a blank 
> message to:
> <[email protected]>
> To leave the group, please send a blank message to:
> <[email protected]>.
> 
> To contact the support address for this group, please write to:
> [email protected]>
> 
> ------------------------------
> 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to