{"id":3766,"date":"2019-03-25T17:45:51","date_gmt":"2019-03-25T20:45:51","guid":{"rendered":"http:\/\/xexeu.elipse.com.br\/pt\/spotting-and-reprogramming-a-cloned-softkey\/"},"modified":"2022-10-13T15:27:12","modified_gmt":"2022-10-13T18:27:12","slug":"spotting-and-reprogramming-a-cloned-softkey","status":"publish","type":"post","link":"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/","title":{"rendered":"How to spot and reprogram a cloned softkey."},"content":{"rendered":"<div align=\"justify\">\n<p>This article illustrates how to spot and reprogram a softkey that has been cloned. Softkeys can be cloned when the machine&#8217;s settings (Virtual MAC Address, UUID, PCU settings, NICs, etc.) are edited. To recover this softkey, you must first establish and understand why it has been cloned so you can keep this from happening again.<\/p>\n<p>Usually, this happens because the softkey has been installed in a virtual machine running in an environment with several hosts, where the VM is passed from one host to another dynamically (e.g.: VMware vCenter Server). This environment requires that <b>CPU Masking<\/b> be turned on, because this will guarantee the softkey will see all hosts with the same hardware configuration, thus avoiding cloning detection when the VM migrates to another host.<\/p>\n<p>To confirm the softkey status, access this address:<\/p>\n<\/div>\n<div align=\"justify\">\n<p><a href=\"http:\/\/localhost:1947\/_int_\/products.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/localhost:1947\/_int_\/products.html<\/a><\/p>\n<div align=\"center\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID5468\/1.png\" alt=\"\" width=\"560\" height=\"193\" align=\"Baseline\" border=\"0\" \/><\/div>\n<p>After you spot the cloned softkey, you must reprogram it with the <strong>Formatting <\/strong>procedure.<\/p>\n<\/div>\n<div align=\"justify\"><\/div>\n<div align=\"justify\">\n<h4><u><b>FORMATTING<\/b><\/u><\/h4>\n<p>To recover the softkey, you will need to save its memory and send it to Elipse Software. There are thre possibilities: via HKCustumer, via Elipse License Manager (eLic), or via .C2V file.<\/p>\n<p><b>a) via HKCustomer<\/b>: follow the procedures at <b><a href=\"http:\/\/kb.elipse.com.br\/pt-br\/questions\/5410\/Generating%7B47%7Dactivating+softkeys+for+servers+with+no+internet+connection.\" target=\"_blank\" rel=\"noopener noreferrer\">Generating\/activating softkeys for servers with no internet connection<\/a><\/b>.<\/p>\n<p><b>b) via eLic<\/b>: to generate the read file, go to <b>Protection Devices<\/b> tab at the main page. Then, choose the device to update, and click <b>Save Status<\/b>. Save the file generated (.elr extension) and send it to Elipse Software.<\/p>\n<p><strong>c) via .C2V file<\/strong>: follow the procedures described at <strong><a href=\"https:\/\/kb.elipse.com.br\/en\/generating-a-hardkey-softkey-file-in-c2v-format\/\" target=\"_blank\" rel=\"noopener\">Generating a hardkey\/softkey file in C2V format<\/a><\/strong>.<\/p>\n<p style=\"text-align: justify;\">In response, a recovery file with V2C extension is generated. Then, apply it to <strong>Admin Control Center<\/strong> (<a href=\"http:\/\/localhost:1947\/_int_\/checkin.html\">http:\/\/localhost:1947\/_int_\/checkin.html<\/a>), or use <b>ElipseRUS.exe\u00a0<\/b>(available at <a href=\"https:\/\/www.elipse.com.br\/downloads\/?key=hkcustomer&#038;language=ptbr\">HKCustomer<\/a> zip file).<\/p>\n<p style=\"text-align: justify;\">After applying the file, the softkey is recovered, and is not cloned anymore.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This article illustrates how to spot and reprogram a softkey that has been cloned. Softkeys can be cloned when the machine&#8217;s settings (Virtual MAC Address, UUID, PCU settings, NICs, etc.)&hellip;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0},"categories":[838],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to spot and reprogram a cloned softkey.<\/title>\n<meta name=\"description\" content=\"This article illustrates how to spot and reprogram a softkey that has been cloned. Softkeys can be cloned when the machine&#039;s settings (Virtual MAC Address, UUID, PCU settings, NICs, etc.) are edited.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to spot and reprogram a cloned softkey.\" \/>\n<meta property=\"og:description\" content=\"This article illustrates how to spot and reprogram a softkey that has been cloned. Softkeys can be cloned when the machine&#039;s settings (Virtual MAC Address, UUID, PCU settings, NICs, etc.) are edited.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/\" \/>\n<meta property=\"og:site_name\" content=\"Elipse Knowledgebase\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/elipsesoftware\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-25T20:45:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-13T18:27:12+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID5468\/1.png\" \/>\n<meta name=\"author\" content=\"D\u00e9lio Damin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"D\u00e9lio Damin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/\"},\"author\":{\"name\":\"D\u00e9lio Damin\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/be597eff34b5f24af940a55332870778\"},\"headline\":\"How to spot and reprogram a cloned softkey.\",\"datePublished\":\"2019-03-25T20:45:51+00:00\",\"dateModified\":\"2022-10-13T18:27:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/\"},\"wordCount\":721,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"articleSection\":[\"Softkey\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/\",\"url\":\"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/\",\"name\":\"How to spot and reprogram a cloned softkey.\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#website\"},\"datePublished\":\"2019-03-25T20:45:51+00:00\",\"dateModified\":\"2022-10-13T18:27:12+00:00\",\"description\":\"This article illustrates how to spot and reprogram a softkey that has been cloned. Softkeys can be cloned when the machine's settings (Virtual MAC Address, UUID, PCU settings, NICs, etc.) are edited.\",\"breadcrumb\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/kb.elipse.com.br\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to spot and reprogram a cloned softkey.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kb.elipse.com.br\/#website\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"name\":\"Elipse Knowledgebase\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kb.elipse.com.br\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\",\"name\":\"Elipse Software\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"sameAs\":[\"http:\/\/www.facebook.com\/elipsesoftware\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"contentUrl\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"width\":161,\"height\":58,\"caption\":\"Elipse Software\"},\"image\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/be597eff34b5f24af940a55332870778\",\"name\":\"D\u00e9lio Damin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fdf251d36430f8dd22144c3f1bc53376?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fdf251d36430f8dd22144c3f1bc53376?s=96&d=mm&r=g\",\"caption\":\"D\u00e9lio Damin\"},\"url\":\"https:\/\/kb.elipse.com.br\/en\/author\/delio\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to spot and reprogram a cloned softkey.","description":"This article illustrates how to spot and reprogram a softkey that has been cloned. Softkeys can be cloned when the machine's settings (Virtual MAC Address, UUID, PCU settings, NICs, etc.) are edited.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/","og_locale":"en_US","og_type":"article","og_title":"How to spot and reprogram a cloned softkey.","og_description":"This article illustrates how to spot and reprogram a softkey that has been cloned. Softkeys can be cloned when the machine's settings (Virtual MAC Address, UUID, PCU settings, NICs, etc.) are edited.","og_url":"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/","og_site_name":"Elipse Knowledgebase","article_publisher":"http:\/\/www.facebook.com\/elipsesoftware","article_published_time":"2019-03-25T20:45:51+00:00","article_modified_time":"2022-10-13T18:27:12+00:00","og_image":[{"url":"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID5468\/1.png"}],"author":"D\u00e9lio Damin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"D\u00e9lio Damin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/#article","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/"},"author":{"name":"D\u00e9lio Damin","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/be597eff34b5f24af940a55332870778"},"headline":"How to spot and reprogram a cloned softkey.","datePublished":"2019-03-25T20:45:51+00:00","dateModified":"2022-10-13T18:27:12+00:00","mainEntityOfPage":{"@id":"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/"},"wordCount":721,"commentCount":0,"publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"articleSection":["Softkey"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/","url":"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/","name":"How to spot and reprogram a cloned softkey.","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/#website"},"datePublished":"2019-03-25T20:45:51+00:00","dateModified":"2022-10-13T18:27:12+00:00","description":"This article illustrates how to spot and reprogram a softkey that has been cloned. Softkeys can be cloned when the machine's settings (Virtual MAC Address, UUID, PCU settings, NICs, etc.) are edited.","breadcrumb":{"@id":"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kb.elipse.com.br\/en\/spotting-and-reprogramming-a-cloned-softkey\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/kb.elipse.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"How to spot and reprogram a cloned softkey."}]},{"@type":"WebSite","@id":"https:\/\/kb.elipse.com.br\/#website","url":"https:\/\/kb.elipse.com.br\/","name":"Elipse Knowledgebase","description":"","publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kb.elipse.com.br\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kb.elipse.com.br\/#organization","name":"Elipse Software","url":"https:\/\/kb.elipse.com.br\/","sameAs":["http:\/\/www.facebook.com\/elipsesoftware"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","contentUrl":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","width":161,"height":58,"caption":"Elipse Software"},"image":{"@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/be597eff34b5f24af940a55332870778","name":"D\u00e9lio Damin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fdf251d36430f8dd22144c3f1bc53376?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fdf251d36430f8dd22144c3f1bc53376?s=96&d=mm&r=g","caption":"D\u00e9lio Damin"},"url":"https:\/\/kb.elipse.com.br\/en\/author\/delio\/"}]}},"_links":{"self":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/3766"}],"collection":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/comments?post=3766"}],"version-history":[{"count":10,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/3766\/revisions"}],"predecessor-version":[{"id":13832,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/3766\/revisions\/13832"}],"wp:attachment":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/media?parent=3766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/categories?post=3766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/tags?post=3766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}