Qualcomm Atheros Qca61x4a Driver is a software driver used in WI FI communication between OS and device itself. When this driver stops working usually it means loss of connection and no internet available.
This error knows to comes frequently and repeat itself over long periods of time which makes it quite annoying. If you are one of the unlucky users of Windows who get this error please keep reading in order to eliminate it and continue working on your computer normally.
Disable & Enable the Qualcomm Adapter Driver
Press ⊞ WINDOWS + X to open the secret menu, click on the device manager.
In device manager expand network adapters. Right-click on Qualcomm Atheros Qca61x4a wireless network adapter and click on disable Right-click on Qualcomm Atheros Qca61x4a wireless network adapter and click on enable
Rollback the Qualcomm Adapter driver
Press ⊞ WINDOWS + X to open the secret menu, click on the device manager.
In device manager expand network adapters. Right-click on Qualcomm Atheros Qca61x4a wireless network adapter and click on properties
Under properties, window click on Driver tab and left-click on Roll Back driver (if the option is greyed there is no previous driver, follow next step)
Choose your reason and click on OK
Update Qualcomm Atheros driver to the latest version
Press ⊞ WINDOWS + X to open the secret menu, click on the device manager.
In device manager expand network adapters. Right-click on Qualcomm Atheros Qca61x4a wireless network adapter and click on Update Driver
Install the new driver in compatibility mode
Right-click on the installer package and choose properties
Go to the compatibility tab
Choose compatibility settings and install.
Windows is one of the most popular operating systems in today's world. Plenty of software and plenty of hardware is working on it without any issues. In order for Windows to deal with this ever-growing hardware and in order for hardware manufacturer's to have stable products in the Windows environment is accomplished via Drivers.
A driver is a small piece of software whose sole purpose is to control and communicate with specific hardware and create a bridge between it and Windows itself. it is made in such a way that even if it brakes the rest of the operating system will continue working uninterrupted.
Having updated drivers means better performance and better stability for device performance so it is crucial to have the latest drivers installed. Outdated drivers can also lead to some security issues which could be exploited by malicious applications.
Here, in today's article, we are presenting you with 4 ways on how to keep your drivers updated and tidy for best performance and stability. The list goes from the most simple way to the most complex and time-consuming one.
Use one-click solution, DRIVEFIX
The most simple and most straightforward solution, install DRIVEFIX, and with only one click on a mouse button, you can have all drivers fixed and updated. This application is made for this purpose and it is doing its job pretty well.
Update Windows
Windows updates come with new drivers for new hardware and with newer versions of existing ones, do update on regular basis and you should have all of your drivers up to date.
Download drivers from the manufacturer's website
Go to the manufacturer's website for your device and download and install the latest driver package.
Use device manager to update drivers
Go to the device manager and right-click on the device which you would like to update the driver. Choose update device driver.
Often when we connect to the internet were browsing indexed pages through some well-known search engine, usually Google. But beneath the so-called normal internet lurks deep and dark web. You might have heard of the deep web and dark web if you have some geeky friends and we are here to explain what exactly is the deep and dark web.
The first thing to know is that the deep and dark web is not the same thing and they coexist separately from one another, you could say that beneath the deep web lies the dark web, yet another layer of the internet.
So let us explore first the deep web. What is exactly a deep web?
Deep web, hidden web, or invisible web
as sometimes referenced are part of worldwide web not indexed by search engines, meaning that engines do not basically see and index content of deep web sites.
The content of the deep web is hidden behind HTTP forms and includes many very common uses such as webmail, online banking, private or otherwise restricted access social-media pages and profiles, some web forums that require registration for viewing content, and services that users must pay for, and which are protected by paywalls, such as video on demand and some online magazines and newspapers.
The content of the deep web can be located and accessed by a direct URL or IP address but may require a password or other security access to get past public website pages.
While it is not always possible to directly discover a specific web server's content so that it may be indexed, a site potentially can be accessed indirectly (due to computer vulnerabilities).
To discover content on the web, search engines use web crawlers that follow hyperlinks through known protocol virtual port numbers. This technique is ideal for discovering content on the surface web but is often ineffective at finding deep web content. For example, these crawlers do not attempt to find dynamic pages that are the result of database queries due to the indeterminate number of queries that are possible. It has been noted that this can be (partially) overcome by providing links to query results, but this could unintentionally inflate the popularity of a member of the deep web.
Dark WEB
The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.
The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature. The Tor dark web or Onionland uses the traffic anonymization technique of onion routing under the network's top-level domain suffix .onion.
Dark & Deep WEB difference
The dark web has often been conflated with the deep web, the parts of the web not indexed (searchable) by search engines. The dark web forms a small part of the deep web but requires custom software in order to access its content. This confusion dates back to at least 2009. Since then, especially in reporting on Silk Road, the two terms have often been conflated, despite recommendations that they should be distinguished.
Darknet websites are accessible only through networks such as Tor ("The Onion Routing" project) and I2P ("Invisible Internet Project"). Tor browser and Tor-accessible sites are widely used among darknet users and can be identified by the domain ".onion". While Tor focuses on providing anonymous access to the Internet, I2P specializes in allowing anonymous hosting of websites. Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered encryption system. The darknet encryption technology routes users' data through a large number of intermediate servers, which protects the users' identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent node in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer. Due to the high level of encryption, websites are not able to track the geolocation and IP of their users, and users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.
Darknet
The darknet is also used for illegal activity such as illegal trade, forums, and media exchange for pedophiles and terrorists. At the same time, traditional websites have created alternative accessibility for the Tor browser in an effort to connect with their users. ProPublica, for example, launched a new version of its website available exclusively to Tor users.
TPM 2.0 requirement for Windows 11 has produced a lot of discussions since it was announced. A lot of somewhat older hardware seems to be left behind with this decision from Microsoft.
So naturally, when something like this is announced, especially when it is stated it is the must-have thing, people find a way to break it and to prove it is not the case.
In that spirit, I am proud to present you with not one but three-way you can install Windows 11 on hardware that does not has TPM 2.0. Please note that by bypassing this you will not be able to use some Windows 11 features tied to modules like Device encryption, vTPM in Hyper-V, and all TPM-related services.
I will cover methods from the most simple and straightforward ones to the more complicated using registry editor.
Bypass TPM with changing installation media
For this method to work you will need both Windows 10 ISO and Windows 11 ISO since it will require some file copying between them.
You will also need Rufus or another tool to make a new installation media once files are copied
All you have to do in this method is to go into your Windows 10 ISO and delete the install.esd, then just copy install.wim from Windows 11 installation media into the same place, and you are done.
Make install ISO with Rufus and install Windows 11.
Change DLL on installation media method
For this method, you will need everything like in the previous one and the process is almost the same, but this time instead of migrating the whole installation file, we will just replace the appraiserres.dll file.
Copy appraiserres.dll file from your Windows 10 installation media over the same file on Windows 11 installation and you are good to go.
Bypassing TPM via registry editor
If for some reason previous easy solutions have not worked for you do not lose hope just yet, there is one more way you can bypass TPM.
In this given method you will not need Windows 10 installation media but the process is a little more complicated than previous ones.
Create Windows 11 media installation
Start the installation process
Click the Next button.
Select region, language, and time when asked. You can change these settings later.
Click the Install now button.
If your device was already activated, click the I don’t have a product key option to continue.
Click the Next button.
Select the edition of Windows. When you’re installing the OS on an existing device, Windows won’t activate if you select the incorrect edition.
Click the Next button.
Select the I accept the license terms option and click next.
Select Custom: Install Windows only (Advanced)
During the Windows installation screen, now you will see a message stating that the PC can’t run Windows 11 if you do not have TPM 2.0
On this screen, press SHIFT + F10 to open Command Prompt window.
Launch the registry editor, type regedit.exe in Command Prompt, and press ENTER
Create a new key “LabConfig” by right-clicking on the Setup key and select New > Key under HKEY_LOCAL_MACHINE\SYSTEM\Setup.
Type LabConfig and press ENTER.
Right-click on the LabConfig key.
Select New > DWORD (32-bit) value.
Create two values: BypassTPMCheck and BypassSecureBootCheck.
Set their DWORD32 value to 1.
Press ENTER.
Close the Registry Editor.
Type exit in the Command Prompt and press ENTER or close its window.
Press the back button in the Windows installation setup if it still says “This PC can’t run Windows 11”.
Accept the terms & conditions.
Select Custom: Install Windows only (Advanced) option and configure the partition with the current installation.
Windows 11 has come a long way from its infant stage. Today it is incredibly good and stable operating system that also looks good and modern. Unfortunately, fancy animations and good graphics come with a price, in this case, slower performance on some little older and weaker computers.
Animations itself which include also fading effects can sometimes feel slugging and laggy and have a general overall feeling of delay. For a more old-school instant experience, you can turn off animations.
In order to turn animations inside Windows 11 follow this simple guide:
First thing is to open Settings by pressing Windows + i key combination or you could open Start and in the search box type in Settings and then click on its icon.
Once inside settings on the left side find Accessibility and click on it to select it. Once it is selected on the right side choose Visual effects. Inside the visual effects section click on the switch next to Animation effects to OFF. You can also turn off transparency effects in this section if you wish if you have an older GPU in order to speed it up a little.
That is all you need to do, settings will be automatically saved and all animations will be turned off for a quicker and more responsive feeling when working inside W11
System Interrupts are operating system processes that function as an alert system for the CPU. So whenever a scenario needs the attention of the CPU, it alerts the CPU about it. In turn, the CPU suspends what it is doing, saves it, and then takes care of that important job and once that job is completed, it resumes back to what it was doing. This indicates that although System Interrupts appears as a process, it’s actually not. As a matter of fact, it is like a manager that reports to the CPU about all interrupts that happen on a hardware level, e.g. hardware interrupts. And if there are lots of interrupts, this means that there might be various errors occurring on a hardware level. As a result, it may take a lot of system resources. And if you consider disabling System Interrupts, stop right there as your computer will almost become useless without it.
So if you see System Interrupts consuming high CPU usage in your Windows 10 computer, you can fix it without having to disable it and cause more problems. If System Interrupts takes up more than 5 to 10% of CPU, then you definitely have a problem. This could be happening due to some hardware or driver issue. The first thing you can do is to try rebooting your computer once and see if the issue comes back or not.
High CPU usage of System Interrupts is a huge backlog for the CPU and it stays in the loop. If a simple system restart didn’t fix this issue, here are some suggestions you can try.
Option 1 – Try to update the hardware drivers
As stated, the problem might have something to do with hardware drivers so you can try to update these drivers and see if it works.
Reboot your computer into Safe Mode with networking support.
Tap the Win + R keys on your keyboard to open the Run dialog box.
After that, type “devmgmt.msc” in the field and hit Enter or click OK to open the Device Manager.
After opening the Device Manager, update all the outdated Hardware drivers on your computer.
Next, right-click on all the driver entries that are appropriately labeled, and then click the Update driver option.
Now restart your PC and check if the BSOD error is fixed or not.
Note: On the other hand, if a recent update has caused the System Interrupts high CPU usage, then you might want to roll back your hardware drivers to their previous versions.
You can check with the Windows Update History to check out any recent updates as well as the previous ones.
Option 2 – Try to disconnect and reconnect all hardware and cables
A lot of users reported that they were able to fix the problem by disconnecting and reconnecting cables and hardware like scanners, printers, cameras can help in fixing the problem. In addition, you can also boot your computer in a Clean Boot State so that you can find the problematic hardware by hit and trial method. Refer to the steps below to do so:
Log onto your PC as an administrator.
Type in MSConfig in the Start Search to open the System Configuration utility.
From there, go to the General tab and click “Selective startup”.
Clear the “Load Startup items” check box and make sure that the “Load System Services” and “Use Original boot configuration” options are checked.
Next, click the Services tab and select the “Hide All Microsoft Services” check box.
Click Disable all.
Click on Apply/OK and restart your PC. (This will put your PC into a Clean Boot State. And configure Windows to use the usual startup, just simply undo the changes.)
Option 3 – Try to enable or disable Hardware
If you do not want to remove hardware, you can just disable them using the Device Manager. Note that this can also be applied to the internal hardware.
Tap the Win + X + M keys to open the Device Manager.
Next, navigate to the device you want to disable.
Then right-click on it and choose to disable the device.
Note: Make sure that you disable one device at a time and then give it a couple of minutes and check if there are any changes in the CPU usage to pinpoint the hardware. And if there is no change, you need to enable the device you’ve just disabled and then proceed to disable the next hardware device. If there are changes, then it’s probably the culprit. Just keep in mind that you must no disable any device that is needed to keep your system up and running.
Option 4 – Try to update the BIOS/UEFI
Updating the BIOS/UEFI can help you fix the high CPU usage of System Interrupts but as you know, BIOS is a sensitive part of a computer. Even though it is a software component, the functioning of the hardware depends on it largely. Thus, you must be careful when modifying something in the BIOS. So if you don’t know much about it, it’s best if you skip on this option and try the other ones instead. However, if you are well-versed in navigating the BIOS, then follow the steps below.
Tap the Win + R keys to open the Run dialog box.
Next, type “msinfo32” in the field and press Enter to open System Information.
From there, you should find a search field on the bottom where you have to search for the BIOS version and then press Enter.
After that, you should see the developer and version of the BIOS installed on your PC.
Go to your manufacturer’s website and then download the latest version of BIOS on your computer.
If you are using a laptop, make sure that you keep it plugged in until you have updated the BIOS.
Now double click on the downloaded file and install the new BIOS version on your computer.
Restart your computer to apply the changes made.
Option 5 – Run the Hardware and Devices Troubleshooter or the Performance Troubleshooter
Hardware and Devices Troubleshooter:
The first thing you need to do is click on Start and then on the gear-like icon to pull up the window for Settings.
After opening Settings, look for the Update and Security option and select it.
From there, go to the Troubleshoot option located on the left-hand side of the list.
Next, select Hardware and Devices from the list and open the Troubleshooter and run it. Once it is doing its job, wait for it to complete the process and then restart the system.
After the system restarts, check if the problem’s now fixed. If not, refer to the next option given below.
Performance Troubleshooter:
Tap the Win + R keys to open the Run dialog box.
Type “exe /id PerformanceDiagnostic” in the field and hit Enter to open the Performance troubleshooter.
Then click on Next to get started. Wait until the process is completed.
QR code or if you want to be more technical Quick Response code is a two-dimensional code made of square dots creating a pattern that can be scanned via QR scanner and then interpreted. Usually, they are present on product packaging, on business cards, websites, etc.
When you decode a QR code you can get a link to a website or link to a file or whatever, you can get text, image, email, contact information, etc.
QR Code Desktop Reader & Generator sample code
How to decode a QR Code? You can scan it with your mobile devices like iPhone, iPad, Android or Blackberry equipped with additional software for scanning QR Codes. You might want to check out tools like Barcode Scanner or Red Laser. If you don’t have a mobile device or you need to scan a barcode on your PC, simply use CodeTwo QR Code Desktop Reader & Generator.
How this program works
QR Code reading
CodeTwo QR Code Desktop Reader & Generator is a free tool that will let you quickly scan any QR Code from your screen – be it a part of the website, email, banner, or document. Simply run the program and hit From the screen on the top menu.
Your standard mouse cursor will change into a cross to help you make a selection on your screen. Simply select an area with a QR Code and the program will automatically scan it. You can scan QR codes from websites, documents, movie files – you name it.
You can also select an image file that contains a QR Code and the program will locate it automatically and decode it. To do that, simply click From file on the top menu of the program and select the desired image from your hard drive.
If you have a file copied to your clipboard, or if you make a screenshot of a QR Code, QR Code Desktop Reader & Generator will let you decode those QR codes in one click. Just click From clipboard and the program will automatically locate and decode the QR code for you.
That is not all, you can also use your camera to scan QR codes. If you have more than one camera, the program will let you choose which one to use. To use this option, simply click From webcam, and you will be able to scan QR codes with your recording device.
QR Code generation
CodeTwo QR Code Desktop Reader & Generator also acts as a QR code generator. Creating QR codes is as easy as reading them. Here is how to generate a QR code:
In the top menu, click Generate mode on and enter the text you want to translate into QR Code
Choose if you want to copy it to the clipboard or save it in a file. The QR Code will be scaled automatically, but you can resize it in the Size settings tab.
The resulting QR code can be used however you like. To name just a few options, you can:
Upload it to your blog/website which is especially useful for mobile users.
Print it on a poster, providing easily accessible links with more information on your event.
Send it in newsletters, or include it in your email signature.
QR Codes in email signatures
Inserting QR codes in email signatures lets mobile users quickly grab your contact details, or provides them with links so that they can get more information on your company or topic you were discussing. You can also provide your recipients with a link to QR Code Desktop Reader & Generator. This will help them easily decode QR codes when they open your email on a PC.
QR code
If you want to include a QR code automatically in email signatures throughout a whole organization, try CodeTwo central email signature management solution. It is a very useful tool, which enables you to unify email signatures on Exchange Server and Office 365 (Microsoft 365).
Lately, Microsoft has trying to fix Print Nightmare with various methods and patches. The last patch has seemingly fixed Print Nightmare but it has broken the Alt-tab key combination.
It has been reported that the latest patch has broken famous key combinations for quickly switching from window to window. It seems that combination is not working or it is switching to desktop, even going to blank screen if switching from the full-screen game.
Fixing the issue
Luckily this issue is easily fixable.
The first and easier fix for this issue is surprising to turn off the news and info widget, right-click on it and choose News and interests and then click on turn off.
The second solution would be to uninstall the update. Go to Settings, then to Update & Security, and from there view Update History and remove the update.
If you are trying to connect an external device to your computer but you suddenly encounter an error that says, “Device requires further installation”, then you’ve come to the right place as this post will guide you on how exactly you can fix this error.
In most cases, USB sticks, headphones, speakers, and other external devices, install drivers automatically once you connect them to your computer which means that the drivers are downloaded and installed in the system as soon as the external device is plugged in. However, if the driver has become corrupted or outdated, you might encounter an error like the
“Device requires further installation”
Aside from corrupted or outdated drivers, the error could also be caused by pending updates, an incorrect version of the Intel PROSet Wireless driver, or checking the wrong event. Whatever the cause is, this post will provide you with some potential fixes that can help you resolve the problem. But before you troubleshoot the problem, ensure that your Windows 10 computer is updated to its latest version and you must also not forget to check that you’re checking the correct event on the Event Viewer. Once you have these things covered, proceed to the instructions below.
Option 1 – Try to update the device drivers to the latest version
One of the most likely root causes of the “Device requires further installation” error is either outdated or corrupted drivers in your computer. This kind of problem is more common on several devices like scanners and printers for which the drivers are provided with them.
First, boot your computer into Safe Mode.
After that, tap the Win + R keys to launch Run.
Type in devmgmt.msc into the box and tap Enter or click OK to open the Device Manager.
After that, a list of device drivers will be displayed. From there, look for any outdated device drivers and click on each one of them.
After that, right-click on each entry of the device drivers and select the “Uninstall Device” option from the menu.
Now restart your computer.
After restarting your computer, go to the Settings app and Check for Updates in the Windows Update section.
Note: You also opt to download the latest versions of the device drivers directly from the website of the manufacturer. Once you’ve downloaded them, you can install them into your computer right away and then try connecting the external device again. On the other hand, you can also try to reinstall the device drivers.
Option 2 – Try to install the latest version of the Intel PROSet Wireless driver
A lot of users who experience the problem reported that their wireless driver wasn’t also working properly and it was then found that it was caused by the outdated Intel PROSet wireless driver. Thus, to fix the problem, you need to install the latest version of this driver from the intel.com website and install it on your computer. When you download the driver, make sure that your computer is running an Intel system and then download the correct driver depending on whether your computer is a 64-bit system or a 32-bit one.
Spying via some malicious app on the target phone is not a new thing but it can be very uncomfortable and even against the law in some countries.
Infecting the target phone can be done in various ways, another person can intentionally download and install applications on it, and you can install them via some phishing attacks or by an online scam. Once installed this piece of software presents a very serious invasion of privacy since it can track text messages, track phone location in real-time, record calls in real-time, eavesdrop on calls, take control of the camera and microphone, and many other applications.
Here are some common symptoms of mobile phones infected with spyware.
Symptoms of spyware
Random reboots Slow performance Strange text messages Overheating Unusual high data usage Non-familiar apps in the app list The fast drain of the battery Long shutdown time Strange interference and sounds during calls Signs of activity during standby mode
If your phone exhibits any of these symptoms you might have a spyware app installed and running on it.
Common spy apps
There are many apps that have been designed to spy on people that can be downloaded in the app store or on Google Play today. Most of these spyware apps are aimed at parents wanting to keep an eye on and protect their children. However, these can be used by anyone in order to spy on a target person via their phone.
Below is a list of common apps that can be used to spy on you. Many spyware apps require a phone to be ‘jailbroken’ or ‘rooted’ before being installed, this is when the phone’s operating system is changed to allow the phone to become unlocked and customizable.
mSpy : An undetectable spying app for iOS devices. It can be used to read your chats, see your location, view your email, check your call history, record your keystrokes, and more.
Spyera : This app requires rooted and jail-broken iPhones to work. It can go undetected and monitors phone calls and your call history. It even allows call recording and eavesdropping on live calls.
Flexispy : Flexispy prides itself as the #1 phone monitor for parents and can monitor everything from calls to social texts.
Umobix : This powerful spyware app has a dashboard that allows users to easily monitor someone’s location, calls, texts, keystrokes, all major social media, and more. You can detect Umobix because it heats up the infected phone and greatly affects the battery life of the infected device.
Ikey Monitor : Although it requires the device to be rooted for Android or jailbroken for iPhones, this spy app captures keystrokes, passwords, and screenshots, allows for call recording and supports multiple languages.
Clevguard : Available for both iOS and Android, Clevguard allows users to track GPS and Wi-Fi locations, capture screenshots remotely, and more. Due to a recent update, the spy app drains the target phone’s battery significantly.
Remove spyware from your phone
If any of the beforementioned apps are present on your phone you need to remove them right away.
Go to your phone settings and remove the malicious applications, then download some protection suite and scan the whole phone for any other trace of software remains or other malware apps.
Download the nlm11.16.2.0_ipv4_ipv6_mac_universal.tar.gz file to the Desktop.
To install the Autodesk Network License Manager:
Double click on nlm11.16.2.0_ipv4_ipv6_mac_universal.tar.gz to unpack the installer package.
After unpacking nlm11.16.2.0_ipv4_ipv6_mac_universal.pkg, will be /Downloads/adlm/FLEXnet folder.
Double click on nlm11.16.2.0_ipv4_ipv6_mac_universal.pkg to start installation and follow the installation wizard.
The license server will be installed in /usr/local/flexnetserver/ directory.
Change permissions for /usr/local/flexnetserver/ directory to 777
Open Terminal (located in /Applications/Utilities/Terminal) and enter the following command:
sudo chmod -R 777 /usr/local/flexnetserver
Note: Administrator password may be asked. While typing no characters are shown, just type out the password and hit return key.
Note: To start the license server only with elevated permissions (using sudo command), change permissions to 755 instead of 777.
Create /usr/local/flexnetserver/licenses directory for network license file location
sudo mkdir /usr/local/flexnetserver/licenses
Find the license server Host Name and Host ID.
Generate the Network License File in the Autodesk Account
Once the license file is generated, make sure it has a .lic extension (e.g. adsk_license.lic) and is in a plain text format and place it in /usr/local/flexnetserver/licenses directory
Note: In this article we will refer to adsk_license.lic as network license file name. Feel free to change the actual name of the license file, but make sure to reflect the new name when using the commands below.
Create a debug.log file in the /usr/local/flexnetserver/ directory using the following command:
touch debug.log
To start the Network License Server use the following command:
To configure the license manager use the following steps:
Download Autodesk Network License Manager v. 11.16.2 for Linux from this link
Download the nlm11.16.2.0_ipv4_ipv6_linux64.tar.gz file to your desktop.
To install the Autodesk Network License Manager run following command as root.
tar –zxvf nlm11.16.2.0_ipv4_ipv6_linux64.tar.gz
rpm -vhi nlm11.16.2.0_ipv4_ipv6_linux64.rpm
The license server will be installed in /opt/flexnetserver/ directory.
Find the license server Host Name and Host ID
To obtain the license server system hostid run the following command
/opt/flexnetserver/lmutil lmhostid
From the command output note the hostid in quotes, if the system has two active NIC cards, select the first MAC address.
lmutil - Copyright (c) 1989-2018 Flexera. All Rights Reserved.
The FlexNet host ID of this machine is "000c297949e0"
To obtain the license server system hostname run the following command
/opt/flexnetserver/lmutil lmhostid hostname
From the command output note the hostname of the license server.
mutil - Copyright (c) 1989-2018 Flexera. All Rights Reserved.
The FlexNet host ID of this machine is "HOSTNAME=Centos7.localdomain"
Generate your Network License File in Autodesk Account
Once the license file is generated, make sure it has .lic extension (e.g. adsk_license.lic) and place it in /opt/flexnetserver/licenses directory. If the directory doesn't exits, create it with this command: sudo mkdir /opt/flexnetserver/licenses
Note: in this article we will refer by adsk_license.lic your network license file name.
/opt/flexnetserver/lmutil lmstat -a -c /opt/flexnetserver/licenses/adsk_license.lic
To stop your license server service
/opt/flexnetserver/lmutil lmdown -q -force
alternatively you can also run ps command to obtain process ids for lmgrd and adskflex and then kill those processes
ps -aw | grep lmgrd
ps -aw | grep adskflex
kill -9 (provide process ids obtained by previous commands individually)
To start the license server automatically after the system reboot
Open /etc/rc.d/rc.local script as root and enter license server start up command in it.
touch /var/lock/subsys/local
/opt/flexnetserver/lmgrd -c /opt/flexnetserver/licenses/adsk_license.lic -l /opt/flexnetserver/server_log.logNote: To ensure that the script will be executed during boot, run following command as root.
chmod +x /etc/rc.d/rc.local
Make sure that all necessary ports are open:
lmgrd.exe needs ports 27000 to 27009.
adskflex.exe needs port 2080.
Note: Errors may occur if the network license file is corrupt or in the case of a combined network license it has incorrectly combined licenses. To learn more about combining licenses, see Combining License Files for Multiple Autodesk Products. Use the License File Parser to verify that the license contains the appropriate products and FLEXnet feature codes and does not display an error
Verify that TCP ports (2080, 27000-27009) used by Autodesk Network License Manager are not blocked by Firewall.
The FLEXlm® based version uses the following incoming ports:
TCP ports 2080 (for the adskflex vendor daemon)
TCP ports 27000 to 27009 (for the lmgrd master daemon, which uses the first open port in the range)
Note: If these port addresses are restricted by a router or firewall software, users on the remote side of the router will not have access to licenses controlled by the Network License Manager.
Verify that the client computer is configured with the correct license server name or IP.
Windows:
Clear license server information from the system registry.
Type regedit in the Windows Search box and hit Enter key.
As the key is selected, in right panel ADSKFLEX_LICENSE_FILE will be visible.
Right click on the key and delete it.
Specify the license server in ADSKFLEX_LICENSE_FILE system variable
Go to Start > Control Panel > System and Security > System.
Select Advanced system settings.
On the System Properties dialog, click Environment Variables.
Under System Variables, click New.
Enter ADSKFLEX_LICENSE_FILE for the variable name and 2080@SERVER_NAME _OR _IP for the variable value.
Note: the license server information most often is recorded in LICPATH.lic file and can be verified there too. ADSKFLEX_LICENSE_FILE system variable supersedes LICPATH.lic. Thus, setting the system variable is preferable when this error is seen.
If the license server is on a VPN or a remote network set the FLEXLM_TIMEOUT environment variable:
Go to Start > Control Panel > System and Security > System.
Select Advanced system settings.
On the System Properties dialog, click Environment Variables.
Under System Variables, click New.
Enter FLEXLM_TIMEOUT for the variable name and 5000000 for the variable value.
Click OK to save the setting.
Note: if needed the variable value can be increased to 10000000.
Mac/Linux:
Specify the Autodesk Network License server information in $HOME/.flexlmrc file.
Use a text editor to create a flexlmrc.txt file and save it in Plain text format (In TextEdit on Mac: Format - Make Plain Text) on desktop.
The file content should look like this, except with the name or IP address of the license server.
ADSKFLEX_LICENSE_FILE=@SERVER_NAME _OR _IP
If the license server is on the same machine as the Autodesk software, use localhost as the license server name. Thus, the content of flexlmrc file could look like this:
ADSKFLEX_LICENSE_FILE=@localhost
Note: On firewall restricted network or when accessing the license server via VPN, need to include TCP port/s (usually 27000 or 2080) into Autodesk License Server service as follows: ADSKFLEX_LICENSE_FILE=2080@SERVER_NAME _OR _IP
Once flexlmrc file is created move it to user's $HOME folder as follows:
Open a Terminal window
Type open ~ (Mac) or nautilus ~ (Linux) to open $HOME folder
Drag and drop flexlmrc.txt file from Desktop to the home folder.
To make the file a configuration file, rename it to .flexlmrc (please note . [DOT] in front of the file name) by running the following command:
mv flexlmrc.txt .flexlmrc (Mac)
mv flexlmrc .flexlmrc (Linux)
Verify that the license server information registered with the product is correct (versions 2020 and later only)
In versions 2020 and later, the license server information is registered with the AdskLicensing service running locally on the workstation. When changing to a new license server, the old server information may still be registered with AdskLicensing and result in the error above, if this is not appropriately updated.
See the below steps to solve this:
Click the Start menu and type cmd.
Right-click on the Command prompt and choose "Run As Administrator."
In the Command prompt, run the following command, followed by ENTER: