Solved

Ghost Explorer Software

Posted on 2011-09-13
4
848 Views
Last Modified: 2013-12-09
I have a image that I would like to find out what the product key for Window is. I was told I could use ghost exploer to do this??

Where can I find a copy of ghost explorer?s
0
Comment
Question by:Neal_876
  • 2
  • 2
4 Comments
 
LVL 5

Accepted Solution

by:
ErikCamacho earned 500 total points
ID: 36532458
0
 

Author Comment

by:Neal_876
ID: 36532514
Thanks! I appreciate it.
0
 
LVL 5

Assisted Solution

by:ErikCamacho
ErikCamacho earned 500 total points
ID: 36532544
May want to use this instead

http://www.magicaljellybean.com/keyfinder/
0
 

Author Closing Comment

by:Neal_876
ID: 36542197
Thanks but I just download the ghost suite from sysmantec and it worked okay.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
antispam / virus gateway 5 58
svg file 10 96
"k" and "i" wont work in a dell lap top 5 31
Ransomware and encrypted backups 5 120
Some site administrators might be considering how to filter incoming traffic to a site by identifying the domains or networks of the traffic source, in the same way that a spam filter does on an email server, such as blocking all emails sent from th…
OVERVIEW This guide provides information on the process performed when the Symantec Endpoint Protection (SEP) client checks in with the Symantec Endpoint Protection Manager (SEPM). AUDIENCE Information Technology personnel responsible for suppo…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question