Interesting. It always has worked from here in the UK. But, OK, what’s wrong 
with your VPN these days? Problem solved.

=================================================

My compliments and kindest regards
Gordon Smith:
<[email protected]>
Accessibility & Information Technology Support Specialist..

This Message Was Created Using 100% Recycled Electrons. If you can avoid 
printing it, please do so. Think of the environment, save a tree!

  Contact:

• UK Free Phone: 0800 8620538
• UK Mobile/SMS: +44 (0) 7907 823971
• Vic. Australia: +61 38 82059300
• US/Canada: +1 646 9151493
• UK Geographic / Global: +44(0) 1642 688095

----------------------------------------
——





> On 26 Aug 2017, at 11:18, Dane Trethowan <[email protected]> wrote:
> 
> Getting back to JAWS and to correct you, no the Authorisation reset doesn't 
> work from anywhere, I tried it first without VPN and I got a message back 
> from the web site telling me that this facility was only available to 
> residents of the US, if it had worked then I wouldn't have bothered trying to 
> talk to Freedom Scientific Tech Support <smile>.
> 
> 
> 
> On 26/08/2017 8:11 PM, Gordon Smith wrote:
>> This works from anywhere! I’ve used that a few times, when I’ve changed 
>> jobs, to deactivate both JAWS and OpenBook on my former work machines.
>> 
>> I’m going to tell you a little story about when I left work. There is a 
>> technical reason for my doing so, as you’ll see by reading on.
>> 
>> Actually, there was a big argument about this the last time I deactivated 
>> everything on the machine. All of the software, including Windows itself, 
>> belonged to me personally. The original deal was that if I provided all the 
>> software for their clients’ use whilst I worked there, the Mac which Access 
>> To Work provided for my use would leave with me.
>> 
>> However, when the time came, my former boss mysteriously changed her mind, 
>> claiming she needed all the stuff that Access To Work bought for me. So, 
>> just before I left, I destroyed the Boot Camp partition I’d set up for 
>> Windows.
>> 
>> When I told her what I’d done, she went into a towering temper. She tried to 
>> claim that it had all belonged to her, despite the fact that I’d bought it 
>> all in the first place. Anyway, she even went so far as to have my former 
>> support worker’s boyfriend try to recover the partition. The tale of the 
>> support worker is a joke in itself, because it turned out that she was in 
>> the manager’s close circle of friends, and in her pocket. But that’s by the 
>> by. As I said, they tried to recover the partition, failing miserably, I 
>> would add.
>> 
>> I erased not only the Windows partition, but also the MacOS one using Target 
>> Disk mode from another machine. And it’s this mode which I have been leading 
>> up too by relating this sad sorry tael.
>> 
>> For those who don’t know, Target Disk Mode is a special boot mode which 
>> allows you to manipulate the hardware of one Mac from the Finder on another 
>> Mac. The two have to be connected using Thunderbolt connectivity, (on modern 
>> machines), or Firewire on older ones.
>> 
>> So, what I did was to set the work machine as the “Target” using my own 
>> MacBook Air as the “Master”. I then erased absolutely everything, using 
>> secureWipe, so that it could’t be recovered even by professional data 
>> recovery experts.
>> 
>> I then re-created the primary partition on the Target machine, and 
>> reinstalled the then current version of MacOS, (El Capitan). I handed back 
>> the machine in the exact state it was in when I unpacked it from its box. In 
>> other words, they would have to configure the machine again from absolute    
>>      scratch.
>> 
>> When I last spoke to a friend of mine who attends the centre where I used to 
>> work as a trainer/support specialist, he informed me that the Mac was 
>> sitting there redundant, as nobody knew how to set up the base operating 
>> system, let alone Boot Camp and Windows. The manager of the centre had to 
>> pay out for another machine, distributed by one of the so-called 
>> accessibility companies. She bought a full-blown desktop with Supernova 
>> installed. It must have cost her well over £2000.00. Poetic justice, you 
>> might say. But I was damned if I was going to let her get away with all my 
>> licensed software!
>> 
>> Anyway, I wish that there was some way to do the same thing with a PC. I 
>> have a machine whose password we seem to have lost. Therefore, the only 
>> solution I can come up with is to reinstall Windows. Hence, if anybody does 
>> know how to install Windows 10 without visual assistance from the ground up 
>> on a bog-standard HP Pavilion Series 6 machine, I’d love to know about it.
>> 
>> =================================================
>> 
>> My compliments and kindest regards
>> Gordon Smith:
>> <[email protected] <mailto:[email protected]>>
>> Accessibility & Information Technology Support Specialist..
>> 
>> This Message Was Created Using 100% Recycled Electrons. If you can avoid 
>> printing it, please do so. Think of the environment, save a tree!
>> 
>>   Contact:
>> 
>> • UK Free Phone: 0800 8620538
>> • UK Mobile/SMS: +44 (0) 7907 823971
>> • Vic. Australia: +61 38 82059300
>> • US/Canada: +1 646 9151493
>> • UK Geographic / Global: +44(0) 1642 688095
>> 
>> ----------------------------------------
>> ——
>> 
>> 
>> 
>> 
>> 
>>> On 26 Aug 2017, at 04:18, Iaen Cordell <[email protected] 
>>> <mailto:[email protected]>> wrote:
>>> 
>>> Thanks Sire, good tip.
>>> 
>>> 
>>> -----Original Message-----
>>> From: Dane Trethowan [mailto:[email protected] 
>>> <mailto:[email protected]>] 
>>> Sent: Saturday, 26 August 2017 12:58 PM
>>> To: Techno-Chat ... Technology Enthusiasm! <[email protected] 
>>> <mailto:[email protected]>>
>>> Subject: [Techno-Chat]: Reseting Authorisation: a tip for JAWS users
>>> 
>>> Hi!
>>> Those of us who use our JAWS license on multiple computers may have 
>>> encountered a situation where our authorisation needs to be reset.
>>> If you live in the US then the reset of your Authorisation - computer count 
>>> for your license - is extremely easy, just jump onto the Activation web 
>>> page, choose reset your authorisation, type in the information and press 
>>> the reset button however those outside the US face another layer to work 
>>> with, that being the contacting of your local dealer to initiate a 
>>> Authorisation Reset.
>>> So why haven’t people outside the US got the access to the automated 
>>> Authorisation Reset that US customers have? We did - after all - buy JAWS 
>>> just the same.
>>> Well actually those outside the US can access the automated Authorisation 
>>> Reset using a VPN, I found this out for myself a few days ago when I needed 
>>> to reset my JAWS authorisation and I decided to give the VPN trick a go 
>>> having held on to speak to someone at Freedom Scientific’s Technical 
>>> Support line for just under half an hour, I have no objection to waiting 
>>> mind you but I thought that - if I could use the Automated system - then I 
>>> could save a whole heap of time.
>>> Anyway that’s how its done, for the moment at least <smile>.
>>> 
>>> ------------------------------
>>> 
>>> This post, like all posts to the Techno Chat E-Mail group has been scanned 
>>> by our server-side antivirus/malware solution. This should not, however, be 
>>> viewed as a substitution for your own security strategy. We assume no 
>>> culpability whatever, implicit or otherwise, for any compromise to your 
>>> systems as a result of opening any post to this group. Suffice it to say 
>>> that we remain vigilant within the boundaries of reason. We strongly urge 
>>> you to do likewise! You have been warned!!!
>>> 
>>> You can find an RSS listing of all posts to this group at:
>>> <https://mail.mac-access.net:7025/list/[email protected] 
>>> <https://mail.mac-access.net:7025/list/[email protected]>>
>>> or at:
>>> <https://www.mail-archive.com/search?l=all&[email protected] 
>>> <https://www.mail-archive.com/search?l=all&[email protected]>>
>>> 
>>> To encourage your friends to join this group, first accept our thanks for 
>>> spreading the word. Then, have them send a message to the list processing 
>>> engine at:
>>> <[email protected] <mailto:[email protected]>>
>>> To toggle on/off Digest (batch) mode for this group, please send a blank 
>>> message to:
>>> <[email protected] 
>>> <mailto:[email protected]>>
>>> To leave the group, please send a blank message to:
>>> <[email protected] 
>>> <mailto:[email protected]>>.
>>> 
>>> To contact the support address for this group, please write to:
>>> [email protected] <mailto:[email protected]>>
>>> 
>>> ------------------------------
>>> 
>>> 
>>> ------------------------------
>>> 
>>> This post, like all posts to the Techno Chat E-Mail group has been scanned 
>>> by our server-side antivirus/malware solution. This should not, however, be 
>>> viewed as a substitution for your own security strategy. We assume no 
>>> culpability whatever, implicit or otherwise, for any compromise to your 
>>> systems as a result of opening any post to this group. Suffice it to say 
>>> that we remain vigilant within the boundaries of reason. We strongly urge 
>>> you to do likewise! You have been warned!!!
>>> 
>>> You can find an RSS listing of all posts to this group at:
>>> <https://mail.mac-access.net:7025/list/[email protected] 
>>> <https://mail.mac-access.net:7025/list/[email protected]>>
>>> or at:
>>> <https://www.mail-archive.com/search?l=all&[email protected] 
>>> <https://www.mail-archive.com/search?l=all&[email protected]>>
>>> 
>>> To encourage your friends to join this group, first accept our thanks for 
>>> spreading the word. Then, have them send a message to the list processing 
>>> engine at:
>>> <[email protected] <mailto:[email protected]>>
>>> To toggle on/off Digest (batch) mode for this group, please send a blank 
>>> message to:
>>> <[email protected] 
>>> <mailto:[email protected]>>
>>> To leave the group, please send a blank message to:
>>> <[email protected] 
>>> <mailto:[email protected]>>.
>>> 
>>> To contact the support address for this group, please write to:
>>> [email protected] <mailto:[email protected]>>
>>> 
>>> ------------------------------
>>> 
>> 
> 
> -- 
> 
> **********
> "Live each day as if you were goiing to die tomorrow, learn each day as if 
> you were going to live forever"

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to