answersLogoWhite

0

i was had same problem in vista i found that trend micro internet security is the problem i turned it off the problem gone ---------------------------------------------------------- ------------------------------------------------------ mhmh said: oh thanks a lot ... I face this problem few days ago and i couldn't fix it ... no one talked about the anti virus in many sites that discuss the problem .. it helps .. thanx again .

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

Which permissions control the access to folders over a network while the windows server 2008 has several sets of permissions those operate independent of each other?

In Windows Server 2008, access to folders over a network is controlled by both share permissions and NTFS (New Technology File System) permissions. Share permissions dictate access when users connect to the folder over the network, while NTFS permissions govern access to the files and folders on the disk itself. These two sets of permissions operate independently; for a user to access a shared folder, they must have the appropriate permissions from both sets. If either permission set denies access, the user will not be able to access the folder.


Who can access a mail server?

Anyone who has the appropriate permissions.


What does it mean when you get a 'group not found' error on Windows using IBM WebSphere MQ?

A "group not found" error in IBM WebSphere MQ on Windows typically indicates that the specified user group for access control or permissions does not exist on the system. This can occur when a queue manager or an application attempts to reference a security group that has been deleted or was never created. To resolve this, check the user group settings in the operating system and ensure that the required groups are properly defined and associated with the appropriate permissions in WebSphere MQ.


What is the difference between a Discretionary Access Control List DACL and a System Access Control List on Microsoft Windows systems. What access permissions can be assigned to a file in Windows 7.?

cool nice cool


Where in windows xp professional do you specify which users have dial-in permissions to the remote access server?

Network Connections


Windows cannot access the specified device path file?

When you get a message that says, 'Windows cannot access the specified device path file,' this means that an error has occurred which has corrupted the file and made it inaccessible.


What do you do when you work maple story but it says this Windows cannot access the specified device path or file You may not have appropriate permission to access this item?

Check your antivirus vault and see if it blocked maplestory.. for me i had to check my spyware doctor program


What are required permissions for migrating a user's settings?

Administrative access to the USMT folder on the server from the Windows XP Professional computer Read access to the USMT folder to perform the migration Administrative access to the target Windows XP Professional computer


What do you mean by Access Permission?

If you cannot differentiate between Microsoft and people answering questions on a random website, you should not be altering Access Permissions. That said, you can configure who can access any given folder in a NT-based Windows operating system. The file owner or an Administrator can give or change these permissions.


How do you give a program access to windows registry in vista?

To give a program access to the Windows Registry in Vista, you can adjust the permissions of specific registry keys using the Registry Editor. First, open the Registry Editor by typing "regedit" in the Start menu search box. Navigate to the key you want to modify, right-click it, select "Permissions," and then modify the permissions for the user or group that needs access. Ensure you are cautious when making changes, as incorrect modifications can affect system stability.


What is responsible for providing users with access to appropriate data in a database?

A database management system (DBMS) is responsible for providing users with access to appropriate data in a database. The DBMS controls user access permissions, enforces security measures, and manages queries to ensure users can retrieve the data they are authorized to access.


How would you specify this protection scheme in UNIX?

In UNIX, a protection scheme can be specified using file permissions, which are represented by three sets of access rights: owner, group, and others. Each set can have read (r), write (w), and execute (x) permissions. These can be modified using the chmod command, which allows you to set permissions numerically or symbolically. Additionally, access control lists (ACLs) can provide more granular control over permissions for specific users or groups.