Cannot access the playlists on the new iMac
Just pulled-up new iMac with EL CAPITAN OSX but unable to access my reading/library lists.
Password accepted, but that's all.
Help very welcome.
You transfer the files from the old computer?
Tags: iTunes
Similar Questions
-
Cannot access the new passpord to the new hotmail account
Hello
I have created a new address hotmail and password account - then managed to send emails, disconnected.
However, when I went back in this new account (or tried to) it wouldn't accept my new password!
I tried several variations but still no luck.
I then opened a new page and tried to enter the characters of verification, but they were wrong. I checked my caps lock turned off (and it was!) yet despite trying to type the letters of character as I saw them in the box below it typed in capitals - so I'm not sure what the Devil's going on.
Help, please!
Thank you
Hello
The question you have posted is related to Windows Live and will be well suited in the Windows Live Forum. Click on the link below.Windows Live Solution Center -
Cannot drag files from the new iMac on my external hard drive that is already in use
I have a Seagate external hard drive that I used to back up files because my old iMac had difficulties. I bought a new iMac and can access the backup files, but cannot move the new files for the Seagate.
In the Finder...
- "Go menu > computer '"
- Select the drive in question, use ' file > Get Info...' to view details on the disk. ".
- You can see the value of "Format"? Expand the sections if it is hidden.
Please publish the value of 'Format' here please.
-
Is a necessary additional security, such as McAfee software on the new iMac and iPad?
Is a necessary additional security, such as McAfee software on the new iMac and iPad?
Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.
1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.
It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.
The comment is long because the issue is complex. The essential points are in articles 5 and 11.
OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.
2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."
The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.
The following restrictions apply to XProtect:
☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.
☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.
As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.
3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).
Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:
☞ It can easily be turned off or overridden by the user.
☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.
☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.
Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.
For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.
4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked
Install the system data files and security updates
If it is not already done.
As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.
5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.
The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.
Software from a reliable source
☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.
☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.
☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".
☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.
Software that is clearly illegal or doing something illegal
Commercial software ☞ high-end such as Photoshop is "cracked" or "free."
☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.
Conditional or unsolicited offer from strangers
☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)
☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.
☞ You win a prize in a competition that you are never entered.
☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.
☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.
☞ Online everything that you expect to pay is 'free '.
Unexpected events
☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.
☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.
☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.
☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.
I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.
6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.
Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.
Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.
Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.
7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked
Stop the plug-ins to save energy
in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.
8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.
Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.
Why you should not use products AV?
☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.
☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.
☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.
☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.
9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.
An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.
Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:
London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.
If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.
10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.
11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.
-
I disabled the toolbar > > Menu button (via a right click on a PC, Windows 7) and cannot access the toolbar to add items to the sail back in. Any ideas?
Don't see the menu bar not (File, Edit, View, history, Favorites, tools, help)?
Turn on/off the menu bar is a new feature in version 3.6.
(Linux and OSX see: what happened to the file, edit and view menus? )
Windows Method 1. Press and hold the key and press the letters of the following in this exact order: V T M
Windows method 2 Press and release the button. The Menu bar is displayed; then choose ~ ~ red: V ~ ~ iew > ~ ~ red: T ~ ~ oolbars and click on ~ ~ Red: M ~ ~ enu Bar.
The menu bar should now be displayed permanently, unless you turn it off again using view > toolbars. Check = not displayed, NO check mark is not displayed.
See: http://support.mozilla.com/en-US/kb/Menu+bar+is+missingNavigation, bar toolbar bookmarks and other toolbars under view > toolbars. By clicking on one of them will place a check mark (display) or remove the check mark (not shown).
To display the status bar, view, and then click status bar to place a check mark (display) or remove the check mark (not shown).
Mode full screen
http://KB.mozillazine.org/netbooks#Full_screenSee also:
Back and front toolbar buttons or others are missing
Customize controls, buttons, and Firefox toolbars -
ITunes problem previous library playing on the new iMac 4K
I just bought an iMac nine 4K El Capitan 10.11.1 running with iTunes 12.3.2.35. I also bought an iPad opportunity Air 2 out of glideslope. IPad is strictly for the use of music that I am a musician. Since I am unable to "migrate", I copied my old iTunes library on a hard drive, external, built of new playlists on the new iMac and then downloaded on the new iPad. (The HD was only a way to transfer the music.)
It's just a few of the songs on the iPad part - but they all play in iTunes on the iMac. As you can imagine it's very frustrating because I spent two great to finally have a platform of music to date.
Does anyone out there have a solution to this problem. Any thoughts would be greatly appreciated. Especially of Kenichi Watanabe, who has been most helpful.
Thank you very much
Michael Fitzgerald
PS: This is my first attempt at using a Forum and don't know yet how come back for possible answers. Therefore, my email is [email protected].
I know, I'm a model. I'm sorry.
-
Hello
I have a problem with my computer it has been infected by a virus that is not visible in normal mode. It prevents running any application that would help in the detection and removal. I tried running mrt, mcaffe, trendmicro rootkit detector rootkit detector, spybotSD, analysis windows Defender online Windows live onecar. All these works for a minute and then shutsdown, when I click it again I get the error, as mentioned in the title, 'windows cannot access the specified device file or the path, you do not have permissions.
This problem has a solution or re - install is the only way out?
The pointers/help appreciated.
Just to add, I am able to connect using my last known good configuration and only safe mode configurations.
Thank you
Id2View,
1. follow all the instructions in this thread: How to get rid of malware
2. If still no joy you can find Microsoft MVPs and other trained analysts on the following support sites:
Aumha.org
Atribune.org
SpywareHammer
BleepingComputer
Safer-Networking3. If you need help with virus-related issues, contact the Support Services Microsoft product.
To support the Canada and the United States, call toll-free (866) PCSAFETY (727-2338).
For support outside the United States and the Canada, visit the page Web of Product Support Services.
4. If you need more assistance for the position of the newsgroup Microsoft - security - virusvirus/worm.
Through your News Reader:
News://msnews.Microsoft.com/Microsoft.public.Security.virus
Via the Web:
http://www.Microsoft.com/communities/newsgroups/list/en-us/default.aspx?DG=Microsoft.public.Security.virusHope this helps,
Vincenzo Di Russo - Microsoft MVP Windows Internet Explorer, Windows Desktop Experience & security - since 2003. ~ ~ ~ My MVP profile: https://mvp.support.microsoft.com/profile/Vincenzo
-
When I try to backup Quicken, I received the error: cannot access the disk in the drive E:, please make sure that the drive is ready and the disk is not write protected. My last backup of Quicken was 16/07/2010. I don't know why I can't back up now. Is there a way to fix this?
Why not save to a folder on your hard drive and burn them to a CD - R from there? I can't tell from the little you wrote if the problem is with Quicken (not work or you have incorrectly backup location) or with your CD - RW drive. How about more details to work with? This will give you an idea of what to write:
The first Question of troubleshooting: If the problem is new, what has changed between the time things worked and the time they do not have?
http://www.elephantboycomputers.com/page2.html#Tech_Support - See the article "how to write a Post.
http://support.microsoft.com/default.aspx/kb/555375 - how to ask a QuestionMS - MVP - Elephant Boy computers - don't panic!
-
On my user account on my labtop when I click on a program, such as mozilla firefox, it happens 'windows cannot access the specified device, path or file. May not be the appropriate permissions for access you point. "This message appears for firefox, AVG, Windows live messenger, windows MediaPlayer etc.
I can access my documents, Panel etc. and everything is there, but it won't let me not get access to the programs.
Also when I go to click on itunes and open office it happens "this file has no program associated with it for performing this action. Create an association in the set associations Control Panel.
Given that I was able to access control panel, I was able to create a new user and use it for now to send this message and all programs have worked on it and I was able to check for the presence of viruses on the Avg on this and everything was clear.
Could you please explain whats wrong and tell me how to fix this please: D thanks
Hello
1. don't you make changes before the show?
2. is the computer is joined to the domain controller?
You can not start any application on a client computer that is joined to the domain controller. When you try to start this type of application, you receive an error message similar to the following:
"Windows cannot access the specified device, path or file. You can not have the appropriate permissions to access the item.This can also occur if the user account is damaged. If the computer is not connected to a domain controller, try the following steps.
1. connect to another user account and create a new user account to fix the damaged user account.
For more information about creating a new user account and the fixing corrupt user account, visit this link: http://windows.microsoft.com/en-US/windows-vista/Fix-a-corrupted-user-profile
Previous post the results in more detail, so that we can help you further.
I hope this helps.
Kind regards
Syed
Answers from Microsoft supports the engineer. -
Windows cannot access the specified device path
I have a HP 2000 laptop with windows 7. I had problems playing a dvd. I can burn images and photos of viev on cd. When you try to play a dvd a message-" Windows cannot access the specified device path. You can have not permissions to access this item. "I uninstalled the drive so it is reinstalled on reboot of windows. I used to get a flag asking what program to open with. Now to see "cd" should open in my computer.
I use Google chrome.
Hey @Stern07 ,
Welcome to the HP Forums!
I understand that you are unable to play the DVD on your laptop of HP 2000 by using Windows 7.
There may be an easier way to solve this problem, but it's the method that I am referring usually to when having this problem:
1. launch Regedit (Windows key + R > type regedit > click OK).
2. navigate in the tree of HKEY_CLASSES_ROOT > DVD > shell > play > order.
3. double-click on the (default) value on the right side of the split dialog box (String edit dialog box should appear).
4 copy the contents of the value data field.
5. click Cancel on the dialog box change the strings.Figure 1:
6. right click on the right side of the split dialog box
7. Select new-> expandable string valueFigure 2:
8. just press ENTER if the cursor is what allows you to change the name of the new value
9. double-click on the new value that you just created (Edit String dialog should appear)
10. glue the string that you have already copied in the value data field
11. click OK in the Edit String dialog boxFigure 3:
12. now on the left side of the split dialog box, highlight the folder HKEY_CLASSES_ROOT\DVD\shell\play\command
13 right-click and choose export.
14. save this file in a location of your choice and a name of your choice.Figure 4:
15. close regedit.
16. go to the location you saved the file.
17. right click on the file, and then choose the Edit option (expected to launch the file open in Notepad (or any text editor).
18. you should see something similar to (not just copy and paste what I have below, because this PC has installed WinDVD):[HKEY_CLASSES_ROOT\DVD\shell\play\command]
@= "Files \"C:\\Program (x86)\\InterVideo\\WinDVD\\WinDVD.exe\ '%1'.
"New value #1" = hex (2): 22, 43, 00, 00, 3 a, 00 5 c 00, 50, 00, 72, 00, 6f, 00, 67, 00, 72, 00, 61,------.
00, 6 D, 00, 20, 00, 46, 00, 69, 00, 6 C, 00, 65, 00, 73, 00, 20, 00, 28, 00, 78, 00, 38, 00, 36, 00,------.
29.00, 5 c, 00, 6F 49, 00, 00, 00, 00, 65, 64, 00, 72, 56, 69, 00, 74, 00, 65, 00, 00, 6f, 00, 5 c,
00,57,00,69,00, 6F, 00, 44, 00, 56, 00, 44, 00, 5 C, 00, 00, 57, 69, 00, 6F, 00, 00, 56, 44, 00,------.
44,00, 2nd, 00, 65, 00, 78, 00, 65, 00, 22, 00, 20, 00, 25, 00, 31, 00, 00, 0019. now delete the first line:
@= "Files \"C:\\Program (x86)\\InterVideo\\WinDVD\\WinDVD.exe\ '%1'.20. now replace all in front of the remaining line with just the character = @, final result should look like:
[HKEY_CLASSES_ROOT\DVD\shell\play\command]
@= hex (2): 22, 43, 00, 00, 3 a, 00 5 c 00, 50, 00, 72, 00, 6f, 00, 67, 00, 72, 00, 61,------.
00, 6 D, 00, 20, 00, 46, 00, 69, 00, 6 C, 00, 65, 00, 73, 00, 20, 00, 28, 00, 78, 00, 38, 00, 36, 00,------.
29.00, 5 c, 00, 6F 49, 00, 00, 00, 00, 65, 64, 00, 72, 56, 69, 00, 74, 00, 65, 00, 00, 6f, 00, 5 c,
00,57,00,69,00, 6F, 00, 44, 00, 56, 00, 44, 00, 5 C, 00, 00, 57, 69, 00, 6F, 00, 00, 56, 44, 00,------.
44,00, 2nd, 00, 65, 00, 78, 00, 65, 00, 22, 00, 20, 00, 25, 00, 31, 00, 00, 00Figure 5:
21 save the Notepad file and close Notepad.
22. now, double-click the file that you just saved, a warning must appear to say you want to add stuff in the registry.
23. click Yes to continue.
24. a dialog box should appear indicating that the values have been added to the registry.
25 re - open regedit.
26 cross to HKEY_CLASSES_ROOT\DVD\shell\play\command (you must already be there)
27. now the value on the side right hand (by default) must have the same data as before, but the Type must indicate that it is REG_EXPAND_SZFigure 6:
28. now, try to reboot your PC and try to play a DVD.
Let me know if it works!
-Source: DVD movie: Windows cannot access the specified device, path, or file. etc
-
Original title: I can't choose a default program
When I right click on a file and click on "choose program by default" I get the message "Windows cannot access the specified device, path or file. You can not have the appropriate permissions to access the item.
I use Windows7 that I've updated since Vista.
It started a few months ago, but it really bugs me.
Thanks for any help!When you run the command sfc/scannow., what the message said when it was over?
You can set file associations use the default programs feature?
http://Windows.Microsoft.com/en-us/Windows7/change-default-programs-using-set-program-access-and-computer-defaultsYou can check in a new user account to test if you have a corrupted profile:
http://Windows.Microsoft.com/en-us/Windows7/create-a-user-account
http://Windows.Microsoft.com/en-us/Windows7/fix-a-corrupted-user-profile -
executable files: cannot access the file because it is being used by another process
Hello
I created a file named test.bat on my desk
baptized "test.bat" and sent the notebook, wrote "REM" and recorded.
so, I closed my notebook and reopened, has added another "REM" and saved the file again.
then I tried to rename, move the file to another folder and delete
everything went without any problems.But if I create the file and run it, the command prompt will appear for a while and then disappear.
I can rename or move the file without any problem,
But if I try to edit the file in Notepad, I get this error:The process cannot access the file because it is being used by another process.
and the file is not saved.
also, if I try to delete the file, it seems to be deleted until I press F5, the file appears again.
When you try to rename/move this new file, I get another error:File Access Denied
You need permission to perform this action
You need the permission of the administrator of the computer to make changes
in this fileIt seems the file is opened (or if I choose to delete) after a few minutes, then it is not if I try to access
the file (I kept pressing F5 every few seconds for 15 minutes and the file is missing)the problem appears if occuar with any file name, anywhere, not just the office or home by car, not even on the same disk,
while I had no problem when I started in an old installation of windows xp and repeat the same steps.I tried to use the sysinternals utility handle, that's what I have:
After creating test.bat:
C:\Users\User>handle test.batCopyright (C) 1997-2013 Mark Russinovich
Sysinternals - www.sysinternals.comNo found the corresponding handle.
After you run test.bat:
C:\Users\User>handle test.bat
Handle v3.51
Copyright (C) 1997-2013 Mark Russinovich
Sysinternals - www.sysinternals.comSystem pid: 4 type: file A18: C:\Users\User\Desktop\t
EST.bathas obtained the result above after attempting to remove test.bat also.
After the creation of othertest.bat:
C:\Users\User>handle othertest.bat
Copyright (C) 1997-2013 Mark Russinovich
Sysinternals - www.sysinternals.comNo found the corresponding handle.
After execution of othertest.bat:
C:\Users\User>handle othertest.bat
Handle v3.51
Copyright (C) 1997-2013 Mark Russinovich
Sysinternals - www.sysinternals.comSystem pid: 4 type: BD0 file: C:\Users\User\Desktop\o
thertest.batAfter you rename the othertest.bat:
C:\Users\User>handle othertest.bat
Copyright (C) 1997-2013 Mark Russinovich
Sysinternals - www.sysinternals.comNo found the corresponding handle.
C:\Users\User>handle renamedtest.bat
Handle v3.51
Copyright (C) 1997-2013 Mark Russinovich
Sysinternals - www.sysinternals.comSystem pid: 4 type: BD0 file: C:\Users\User\Desktop\r
enamedtest.batthe also occuars when I run any .exe file and delete it after its finished running, I deleted
the handle.exe and the handle64.exe after the test above and at the same time returned when I updated their records.can someone help me?
IAM using Windows 7 ultimate 64-bit.
Thank you.I struggled with this VERY ENNUYANT thing for a long time on a Windows Server 2008 R2.
Just found the answer:
http://superuser.com/questions/260375/why-would-system-continue-locking-executable-file-handles-after-the-app-has-exit
Activation of the service 'Application Experience' does the trick for me.
If I got paid for every minute spent dealing with the mysteries of Microsoft... No, wait! Paid!
Thank you Microsoft!
-
Activation of Windows 7 - Windows cannot access the specified device
I enter a new key in my computer, it says that it is not genuine now.
When I try and and activate by clicking on the link activate it says:
S read - C:\Windows\system32\slui.exe pop-up box, with following information inside the box:
"Windows cannot access the specified device, path or file. You can not have the appropriate permissions to access the item.
I am the only user on the system and I am an administrator.
When I tried to run slui.exe 4 cmd prompt increased from I got access denied.
Thank you
Thank you for your help. In fact, I could solve the problem of installing the SP1, and then uninstall Windows Genuine Advantage was an option of front.
Thank you once again
-
Original title: help me :((
My computer won't let me open anything, if I click on what anyone outside of the internet it says "Windows cannot access the specified device, path, or file, you don't have the appropriate permissions to access the item"? How can I get permission? :((((((
Your profile seems to be corrupted. I could do this:- Create a new account. This also creates a new profile.
- See if the problem is resolved.
- If this is the case, move your data from the old account to the new account. To do this, you must temporarily promote your new administrator-level account.
Next time you have a problem like that, try to solve it immediately. The "System Restore" mechanism would have probably fixed it for you in ten minutes.
-
CANNOT ACCESS THE LAN WITH THE EASY VPN CONFIGURATION
Hello
I configured easy vpn server in cisco 1905 SRI using ccp. The router is already configured with zone based firewall. With the help of vpn client I can reach only up to the internal interface of the router, but cannot access the LAN from my company. I need to change any configuration of ZBF since it is configured as "deny everything" from outside to inside? If so that all protocols should I match? Also is there any exemption of NAT for VPN clients? Please help me! Thanks in advance.
Please see my full configuration:
Router #sh run
Building configuration...Current configuration: 8150 bytes
!
! Last modification of the configuration at 05:40:32 UTC Wednesday, July 4, 2012 by
! NVRAM config updated 06:04 UTC Tuesday, July 3, 2012 by
! NVRAM config updated 06:04 UTC Tuesday, July 3, 2012 by
version 15.1
horodateurs service debug datetime msec
Log service timestamps datetime msec
no password encryption service
!
router host name
!
boot-start-marker
boot-end-marker
!
!
Passwords security min-length 6
no set record in buffered memory
enable secret 5 xxxxxxxxxxx
!
AAA new-model
!
!
AAA authentication login default local
AAA authentication login ciscocp_vpn_xauth_ml_1 local
AAA authorization exec default local
AAA authorization ciscocp_vpn_group_ml_1 LAN
!
!
!
!
!
AAA - the id of the joint session
!
!
No ipv6 cef
IP source-route
no ip free-arps
IP cef
!
Xxxxxxxxx name server IP
IP server name yyyyyyyyy
!
Authenticated MultiLink bundle-name Panel
!parameter-map local urlfpolicy TSQ-URL-FILTER type
offshore alert
block-page message "Blocked according to policy"
parameter-card type urlf-glob FACEBOOK
model facebook.com
model *. Facebook.comparameter-card type urlf-glob YOUTUBE
mires of youtube.com
model *. YouTube.comparameter-card type urlf-glob CRICKET
model espncricinfo.com
model *. espncricinfo.comparameter-card type urlf-glob CRICKET1
webcric.com model
model *. webcric.comparameter-card type urlf-glob YAHOO
model *. Yahoo.com
model yapoparameter-card type urlf-glob PERMITTEDSITES
model *.parameter-card type urlf-glob HOTMAIL
model hotmail.com
model *. Hotmail.comCrypto pki token removal timeout default 0
!
Crypto pki trustpoint TP-self-signed-2049533683
enrollment selfsigned
name of the object cn = IOS - Self - signed - certificate - 2049533683
revocation checking no
rsakeypair TP-self-signed-2049533683
!
Crypto pki trustpoint tti
crl revocation checking
!
Crypto pki trustpoint test_trustpoint_config_created_for_sdm
name of the object [email protected] / * /
crl revocation checking
!
!
TP-self-signed-4966226213 crypto pki certificate chain
certificate self-signed 01
3082022B 30820194 02111101 300 D 0609 2A 864886 F70D0101 05050030 A0030201
2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43647274 31312F30
69666963 32303439 35323236 6174652D 3833301E 170 3132 30363232 30363332quit smoking
encryption pki certificate chain tti
for the crypto pki certificate chain test_trustpoint_config_created_for_sdm
license udi pid CISCO1905/K9 sn xxxxxx
licence start-up module c1900 technology-package datak9
username privilege 15 password 0 xxxxx xxxxxxx
!
redundancy
!
!
!
!
!
type of class-card inspect entire tsq-inspection-traffic game
dns protocol game
ftp protocol game
https protocol game
match icmp Protocol
match the imap Protocol
pop3 Protocol game
netshow Protocol game
Protocol shell game
match Protocol realmedia
match rtsp Protocol
smtp Protocol game
sql-net Protocol game
streamworks Protocol game
tftp Protocol game
vdolive Protocol game
tcp protocol match
udp Protocol game
match Protocol l2tp
class-card type match - all BLOCKEDSITES urlfilter
Server-domain urlf-glob FACEBOOK game
Server-domain urlf-glob YOUTUBE game
CRICKET urlf-glob-domain of the server match
game server-domain urlf-glob CRICKET1
game server-domain urlf-glob HOTMAIL
class-map type urlfilter match - all PERMITTEDSITES
Server-domain urlf-glob PERMITTEDSITES match
inspect the class-map match tsq-insp-traffic type
corresponds to the class-map tsq-inspection-traffic
type of class-card inspect correspondence tsq-http
http protocol game
type of class-card inspect all match tsq-icmp
match icmp Protocol
tcp protocol match
udp Protocol game
type of class-card inspect correspondence tsq-invalid-src
game group-access 100
type of class-card inspect correspondence tsq-icmp-access
corresponds to the class-map tsq-icmp
!
!
type of policy-card inspect urlfilter TSQBLOCKEDSITES
class type urlfilter BLOCKEDSITES
Journal
reset
class type urlfilter PERMITTEDSITES
allow
Journal
type of policy-card inspect SELF - AUX-OUT-policy
class type inspect tsq-icmp-access
inspect
class class by default
Pass
policy-card type check IN and OUT - POLICIES
class type inspect tsq-invalid-src
Drop newspaper
class type inspect tsq-http
inspect
service-policy urlfilter TSQBLOCKEDSITES
class type inspect tsq-insp-traffic
inspect
class class by default
drop
policy-card type check OUT IN-POLICY
class class by default
drop
!
area inside security
security of the OUTSIDE area
source of security OUT-OF-IN zone-pair outside the destination inside
type of service-strategy check OUT IN-POLICY
zone-pair IN-to-OUT DOMESTIC destination outside source security
type of service-strategy inspect IN and OUT - POLICIES
security of the FREE-to-OUT source destination free outdoors pair box
type of service-strategy inspect SELF - AUX-OUT-policy
!
Crypto ctcp port 10000
!
crypto ISAKMP policy 1
BA 3des
preshared authentication
Group 2
!
crypto ISAKMP policy 2
Group 2
!
ISAKMP crypto client configuration group vpntunnel
XXXXXXX key
pool SDM_POOL_1
include-local-lan
10 Max-users
ISAKMP crypto ciscocp-ike-profile-1 profile
vpntunnel group identity match
client authentication list ciscocp_vpn_xauth_ml_1
ISAKMP authorization list ciscocp_vpn_group_ml_1
client configuration address respond
virtual-model 1
!
!
Crypto ipsec transform-set TSQ-TRANSFORMATION des-esp esp-md5-hmac
!
Profile of crypto ipsec CiscoCP_Profile1
game of transformation-TRANSFORMATION TSQ
set of isakmp - profile ciscocp-ike-profile-1
!
!
!
!
!
!
the Embedded-Service-Engine0/0 interface
no ip address
response to IP mask
IP directed broadcast to the
Shutdown
!
interface GigabitEthernet0/0
Description LAN INTERFACE-FW-INSIDE
IP 172.17.0.71 255.255.0.0
IP nat inside
IP virtual-reassembly in
security of the inside members area
automatic duplex
automatic speed
!
interface GigabitEthernet0/1
Description WAN-INTERNET-INTERNET-FW-OUTSIDE
IP address xxxxxx yyyyyyy
NAT outside IP
IP virtual-reassembly in
security of the OUTSIDE member area
automatic duplex
automatic speed
!
interface Serial0/0/0
no ip address
response to IP mask
IP directed broadcast to the
Shutdown
no fair queue
2000000 clock frequency
!
type of interface virtual-Template1 tunnel
IP unnumbered GigabitEthernet0/0
ipv4 ipsec tunnel mode
Tunnel CiscoCP_Profile1 ipsec protection profile
!
local IP SDM_POOL_1 172.17.0.11 pool 172.17.0.20
IP forward-Protocol ND
!
no ip address of the http server
local IP http authentication
IP http secure server
!
IP nat inside source list 1 interface GigabitEthernet0/1 overload
IP route 0.0.0.0 0.0.0.0 yyyyyyyyy
IP route 192.168.1.0 255.255.255.0 172.17.0.6
IP route 192.168.4.0 255.255.255.0 172.17.0.6
!
access-list 1 permit 172.17.0.0 0.0.255.255
access-list 100 permit ip 255.255.255.255 host everything
access-list 100 permit ip 127.0.0.0 0.255.255.255 everything
access-list 100 permit ip yyyyyy yyyyyy everything
!
!
!
!
!
!
!
!
control plan
!
!
!
Line con 0
line to 0
line 2
no activation-character
No exec
preferred no transport
transport of entry all
output transport lat pad rlogin lapb - your MOP v120 udptn ssh telnet
StopBits 1
line vty 0 4
transport input ssh rlogin
!
Scheduler allocate 20000 1000
endA few things to change:
(1) pool of IP must be a single subnet, it is not the same subnet as your subnet internal.
(2) your NAT ACL 1 must be changed to ACL extended for you can configure NAT exemption, so if your pool is reconfigured to be 10.10.10.0/24:
access-list 120 deny ip 172.17.0.0 0.0.255.255 10.10.10.0 0.0.0.255
access-list 120 allow ip 172.17.0.0 0.0.255.255 everything
overload of IP nat inside source list 120 interface GigabitEthernet0/1
No inside source list 1 interface GigabitEthernet0/1 ip nat overload
(3) OUT POLICY need to include VPN traffic:
access-list 121 allow ip 10.10.10.0 0.0.0.255 172.17.0.0 0.0.255.255
type of class-card inspect correspondence vpn-access
game group-access 121
policy-card type check OUT IN-POLICY
vpn-access class
inspect
-
Original title: problems of residential group after system recovery
I started a homegroup on my computer. I added another computer to the homegroup. Everything worked fine until I had to perform a system recovery on the laptop that I used to start the homegroup. I implemented the homegroup again, but I can't access the files on the other computer via Windows Media Player. I get an error message that says "Windows Media Player cannot access the file. The file may be in use, you won't have access to the computer on which the file is stored, or your proxy settings are may not be incorrect. "I can access all the music files via Windows Explorer. I have to start over with a new password? Can I just create a new homegroup? What other options do I have? You can provide any help would be greatly appreciated. Thank you.
Hello
Please follow the methods and check the issue:
Method 1:
Open the homegroup troubleshooting utility:
http://Windows.Microsoft.com/en-us/Windows7/open-the-HomeGroup-Troubleshooter
Method 2:
Why can't I access my homegroup? :
http://Windows.Microsoft.com/en-us/Windows7/why-cant-I-access-my-HomeGroup
For reference:
Homegroup: frequently asked questions:
http://Windows.Microsoft.com/is-is/Windows7/HomeGroup-frequently-asked-questions
Method 3:
See the steps in "include a folder shared in a library" from the link below:
Access to files and printers on other homegroup computers: http://Windows.Microsoft.com/is-is/Windows7/access-files-and-printers-on-other-HomeGroup-computers
I hope this helps.
Maybe you are looking for
-
WiFi drops (DNS) when charger is connected
Hello Whenever I plug my charger on my Macbook Air 11 '', my fair blocks Wifi. Not only on my macbook, but on everything. It's sort of something to the router. I have no idea what. I had my ISP mechanic come over a few times to check if it's somethin
-
Upgrade - Windows 2008 for Mac - Entourage from mountain lion.
Hi, I have a MacBook Pro and just upgraded to snow Leopard Mountain Lion. I have also re-installed Windows 2008 for Mac and am having some problems that have been absolutely perfect beforehand. I'm unable to open or save attachments in entourage docu
-
CSE 895: printer making a noise
Yesterday the printer started to make a grinding noise when it starts. Now when he tries to print, I get printing but no ink. At out the inks and check them off and replaced. Did not help.
-
Latitude D - 630 material problems - you need to contact the manufacturer of the computer
I tried to understand what happened with the display Sometimes it was than just a backlight on and no display-other times 'Burned the Images' on the screen. Sometimes, when you move your mouse through them that they would be "Cleared" and other time
-
Link Office disappeared from my favorites in Windows 7 libraries; How to restore?
Yesterday, I inadvertently clicked in the wrong place on my screen of Windows 7 libraries and made my link strongly used for the display of my office disappear from the Favorites in the top box on the left. What should I do to restore that link offic