Cannot access the playlists on the new iMac

Just pulled-up new iMac with EL CAPITAN OSX but unable to access my reading/library lists.

Password accepted, but that's all.

Help very welcome.

You transfer the files from the old computer?

Tags: iTunes

Similar Questions

  • Cannot access the new passpord to the new hotmail account

    Hello

    I have created a new address hotmail and password account - then managed to send emails, disconnected.

    However, when I went back in this new account (or tried to) it wouldn't accept my new password!

    I tried several variations but still no luck.

    I then opened a new page and tried to enter the characters of verification, but they were wrong.  I checked my caps lock turned off (and it was!) yet despite trying to type the letters of character as I saw them in the box below it typed in capitals - so I'm not sure what the Devil's going on.

    Help, please!

    Thank you

    Hello

                
    The question you have posted is related to Windows Live and will be well suited in the Windows Live Forum. Click on the link below.
    Windows Live Solution Center
  • Cannot drag files from the new iMac on my external hard drive that is already in use

    I have a Seagate external hard drive that I used to back up files because my old iMac had difficulties. I bought a new iMac and can access the backup files, but cannot move the new files for the Seagate.

    In the Finder...

    • "Go menu > computer '"
    • Select the drive in question, use ' file > Get Info...' to view details on the disk. ".
    • You can see the value of "Format"? Expand the sections if it is hidden.

    Please publish the value of 'Format' here please.

  • Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

    1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

    It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

    The comment is long because the issue is complex. The essential points are in articles 5 and 11.

    OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

    2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

    The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

    The following restrictions apply to XProtect:

    ☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

    ☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

    As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

    3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

    Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

    ☞ It can easily be turned off or overridden by the user.

    ☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

    ☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

    Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

    For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

    4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

    Install the system data files and security updates

    If it is not already done.

    As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

    5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

    The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

    Software from a reliable source

    ☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

    ☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

    ☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

    ☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

    Software that is clearly illegal or doing something illegal

    Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

    ☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

    Conditional or unsolicited offer from strangers

    ☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

    ☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

    ☞ You win a prize in a competition that you are never entered.

    ☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

    ☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

    ☞ Online everything that you expect to pay is 'free '.

    Unexpected events

    ☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

    ☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.

    ☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

    ☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

    I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

    6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

    Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

    Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

    Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

    7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

    Stop the plug-ins to save energy

    in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

    8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

    Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

    Why you should not use products AV?

    ☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

    ☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

    ☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

    ☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

    9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.

    An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

    Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

         London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

    You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

    If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

    10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

    11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

  • I disabled the toolbar > > Menu button (via a right click on a PC, Windows 7) and cannot access the toolbar to add items to the sail back in. Any ideas?

    I disabled the toolbar > > Menu button (via a right click on a PC, Windows 7) and cannot access the toolbar to add items to the sail back in. Any ideas?

    Don't see the menu bar not (File, Edit, View, history, Favorites, tools, help)?
    Turn on/off the menu bar is a new feature in version 3.6.
    (Linux and OSX see: what happened to the file, edit and view menus? )
    Windows Method 1. Press and hold the key and press the letters of the following in this exact order: V T M
    Windows method 2 Press and release the button. The Menu bar is displayed; then choose ~ ~ red: V ~ ~ iew > ~ ~ red: T ~ ~ oolbars and click on ~ ~ Red: M ~ ~ enu Bar.
    The menu bar should now be displayed permanently, unless you turn it off again using view > toolbars. Check = not displayed, NO check mark is not displayed.
    See: http://support.mozilla.com/en-US/kb/Menu+bar+is+missing

    Navigation, bar toolbar bookmarks and other toolbars under view > toolbars. By clicking on one of them will place a check mark (display) or remove the check mark (not shown).

    To display the status bar, view, and then click status bar to place a check mark (display) or remove the check mark (not shown).

    Mode full screen
    http://KB.mozillazine.org/netbooks#Full_screen

    See also:
    Back and front toolbar buttons or others are missing
    Customize controls, buttons, and Firefox toolbars

  • ITunes problem previous library playing on the new iMac 4K

    I just bought an iMac nine 4K El Capitan 10.11.1 running with iTunes 12.3.2.35. I also bought an iPad opportunity Air 2 out of glideslope. IPad is strictly for the use of music that I am a musician. Since I am unable to "migrate", I copied my old iTunes library on a hard drive, external, built of new playlists on the new iMac and then downloaded on the new iPad. (The HD was only a way to transfer the music.)

    It's just a few of the songs on the iPad part - but they all play in iTunes on the iMac. As you can imagine it's very frustrating because I spent two great to finally have a platform of music to date.

    Does anyone out there have a solution to this problem. Any thoughts would be greatly appreciated. Especially of Kenichi Watanabe, who has been most helpful.

    Thank you very much

    Michael Fitzgerald

    PS: This is my first attempt at using a Forum and don't know yet how come back for possible answers. Therefore, my email is [email protected].

    I know, I'm a model. I'm sorry.

  • RootKit/Malware/Virus problem - windows cannot access the specified device file or the path, you don't have permissions

    Hello

    I have a problem with my computer it has been infected by a virus that is not visible in normal mode. It prevents running any application that would help in the detection and removal. I tried running mrt, mcaffe, trendmicro rootkit detector rootkit detector, spybotSD, analysis windows Defender online Windows live onecar. All these works for a minute and then shutsdown, when I click it again I get the error, as mentioned in the title, 'windows cannot access the specified device file or the path, you do not have permissions.

    This problem has a solution or re - install is the only way out?

    The pointers/help appreciated.

    Just to add, I am able to connect using my last known good configuration and only safe mode configurations.

    Thank you

    Id2View,

    1. follow all the instructions in this thread: How to get rid of malware

    2. If still no joy you can find Microsoft MVPs and other trained analysts on the following support sites:
    Aumha.org
    Atribune.org
    SpywareHammer
    BleepingComputer
    Safer-Networking

    3. If you need help with virus-related issues, contact the Support Services Microsoft product.

    To support the Canada and the United States, call toll-free (866) PCSAFETY (727-2338).

    For support outside the United States and the Canada, visit the page Web of Product Support Services.

    4. If you need more assistance for the position of the newsgroup Microsoft - security - virusvirus/worm.
    Through your News Reader:
    News://msnews.Microsoft.com/Microsoft.public.Security.virus
    Via the Web:
    http://www.Microsoft.com/communities/newsgroups/list/en-us/default.aspx?DG=Microsoft.public.Security.virus

    Hope this helps,

    Vincenzo Di Russo - Microsoft MVP Windows Internet Explorer, Windows Desktop Experience & security - since 2003. ~ ~ ~ My MVP profile: https://mvp.support.microsoft.com/profile/Vincenzo

  • Cannot access the disk in the drive E:, please make sure that the drive is ready and the disk is not write protected.

    When I try to backup Quicken, I received the error: cannot access the disk in the drive E:, please make sure that the drive is ready and the disk is not write protected.  My last backup of Quicken was 16/07/2010.  I don't know why I can't back up now.  Is there a way to fix this?

    Why not save to a folder on your hard drive and burn them to a CD - R from there? I can't tell from the little you wrote if the problem is with Quicken (not work or you have incorrectly backup location) or with your CD - RW drive. How about more details to work with? This will give you an idea of what to write:

    The first Question of troubleshooting: If the problem is new, what has changed between the time things worked and the time they do not have?

    http://www.elephantboycomputers.com/page2.html#Tech_Support - See the article "how to write a Post.
    http://support.microsoft.com/default.aspx/kb/555375 - how to ask a Question

    MS - MVP - Elephant Boy computers - don't panic!

  • On my user account on my labtop when I click on a program, such as mozilla firefox, it happens 'windows cannot access the specified device, path or file. May not be the appropriate permissions for access you point. "Please help

    On my user account on my labtop when I click on a program, such as mozilla firefox, it happens 'windows cannot access the specified device, path or file. May not be the appropriate permissions for access you point. "This message appears for firefox, AVG, Windows live messenger, windows MediaPlayer etc.

    I can access my documents, Panel etc. and everything is there, but it won't let me not get access to the programs.

    Also when I go to click on itunes and open office it happens "this file has no program associated with it for performing this action. Create an association in the set associations Control Panel.

    Given that I was able to access control panel, I was able to create a new user and use it for now to send this message and all programs have worked on it and I was able to check for the presence of viruses on the Avg on this and everything was clear.

    Could you please explain whats wrong and tell me how to fix this please: D thanks

    Hello
     
    1. don't you make changes before the show?
    2. is the computer is joined to the domain controller?
     
    You can not start any application on a client computer that is joined to the domain controller. When you try to start this type of application, you receive an error message similar to the following:
    "Windows cannot access the specified device, path or file. You can not have the appropriate permissions to access the item.

    This can also occur if the user account is damaged. If the computer is not connected to a domain controller, try the following steps.
    1. connect to another user account and create a new user account to fix the damaged user account.
    For more information about creating a new user account and the fixing corrupt user account, visit this link: http://windows.microsoft.com/en-US/windows-vista/Fix-a-corrupted-user-profile
     
    Previous post the results in more detail, so that we can help you further.
     
    I hope this helps.
     
    Kind regards
    Syed
    Answers from Microsoft supports the engineer.

  • Windows cannot access the specified device path

    I have a HP 2000 laptop with windows 7. I had problems playing a dvd. I can burn images and photos of viev on cd. When you try to play a dvd a message-" Windows cannot access the specified device path. You can have not permissions to access this item. "I uninstalled the drive so it is reinstalled on reboot of windows. I used to get a flag asking what program to open with. Now to see "cd" should open in my computer.

    I use Google chrome.

    Hey @Stern07 ,

    Welcome to the HP Forums!

    I understand that you are unable to play the DVD on your laptop of HP 2000 by using Windows 7.

    There may be an easier way to solve this problem, but it's the method that I am referring usually to when having this problem:

    1. launch Regedit (Windows key + R > type regedit > click OK).
    2. navigate in the tree of HKEY_CLASSES_ROOT > DVD > shell > play > order.
    3. double-click on the (default) value on the right side of the split dialog box (String edit dialog box should appear).
    4 copy the contents of the value data field.
    5. click Cancel on the dialog box change the strings.

    Figure 1:

    6. right click on the right side of the split dialog box
    7. Select new-> expandable string value

    Figure 2:

    8. just press ENTER if the cursor is what allows you to change the name of the new value
    9. double-click on the new value that you just created (Edit String dialog should appear)
    10. glue the string that you have already copied in the value data field
    11. click OK in the Edit String dialog box

    Figure 3:

    12. now on the left side of the split dialog box, highlight the folder HKEY_CLASSES_ROOT\DVD\shell\play\command
    13 right-click and choose export.
    14. save this file in a location of your choice and a name of your choice.

    Figure 4:

    15. close regedit.
    16. go to the location you saved the file.
    17. right click on the file, and then choose the Edit option (expected to launch the file open in Notepad (or any text editor).
    18. you should see something similar to (not just copy and paste what I have below, because this PC has installed WinDVD):

    [HKEY_CLASSES_ROOT\DVD\shell\play\command]
    @= "Files \"C:\\Program (x86)\\InterVideo\\WinDVD\\WinDVD.exe\ '%1'.
    "New value #1" = hex (2): 22, 43, 00, 00, 3 a, 00 5 c 00, 50, 00, 72, 00, 6f, 00, 67, 00, 72, 00, 61,------.
    00, 6 D, 00, 20, 00, 46, 00, 69, 00, 6 C, 00, 65, 00, 73, 00, 20, 00, 28, 00, 78, 00, 38, 00, 36, 00,------.
    29.00, 5 c, 00, 6F 49, 00, 00, 00, 00, 65, 64, 00, 72, 56, 69, 00, 74, 00, 65, 00, 00, 6f, 00, 5 c,
    00,57,00,69,00, 6F, 00, 44, 00, 56, 00, 44, 00, 5 C, 00, 00, 57, 69, 00, 6F, 00, 00, 56, 44, 00,------.
    44,00, 2nd, 00, 65, 00, 78, 00, 65, 00, 22, 00, 20, 00, 25, 00, 31, 00, 00, 00

    19. now delete the first line:
    @= "Files \"C:\\Program (x86)\\InterVideo\\WinDVD\\WinDVD.exe\ '%1'.

    20. now replace all in front of the remaining line with just the character = @, final result should look like:
    [HKEY_CLASSES_ROOT\DVD\shell\play\command]
    @= hex (2): 22, 43, 00, 00, 3 a, 00 5 c 00, 50, 00, 72, 00, 6f, 00, 67, 00, 72, 00, 61,------.
    00, 6 D, 00, 20, 00, 46, 00, 69, 00, 6 C, 00, 65, 00, 73, 00, 20, 00, 28, 00, 78, 00, 38, 00, 36, 00,------.
    29.00, 5 c, 00, 6F 49, 00, 00, 00, 00, 65, 64, 00, 72, 56, 69, 00, 74, 00, 65, 00, 00, 6f, 00, 5 c,
    00,57,00,69,00, 6F, 00, 44, 00, 56, 00, 44, 00, 5 C, 00, 00, 57, 69, 00, 6F, 00, 00, 56, 44, 00,------.
    44,00, 2nd, 00, 65, 00, 78, 00, 65, 00, 22, 00, 20, 00, 25, 00, 31, 00, 00, 00

    Figure 5: 

    21 save the Notepad file and close Notepad.
    22. now, double-click the file that you just saved, a warning must appear to say you want to add stuff in the registry.
    23. click Yes to continue.
    24. a dialog box should appear indicating that the values have been added to the registry.
    25 re - open regedit.
    26 cross to HKEY_CLASSES_ROOT\DVD\shell\play\command (you must already be there)
    27. now the value on the side right hand (by default) must have the same data as before, but the Type must indicate that it is REG_EXPAND_SZ

    Figure 6:

    28. now, try to reboot your PC and try to play a DVD.

    Let me know if it works!

    -Source: DVD movie: Windows cannot access the specified device, path, or file. etc

  • I can't choose a default program, error: "Windows cannot access the specified device, path or file. You can not have the appropriate permissions to access the item.

    Original title: I can't choose a default program

    When I right click on a file and click on "choose program by default" I get the message "Windows cannot access the specified device, path or file. You can not have the appropriate permissions to access the item.
    I use Windows7 that I've updated since Vista.
    It started a few months ago, but it really bugs me.
    Thanks for any help!

    When you run the command sfc/scannow., what the message said when it was over?

    You can set file associations use the default programs feature?
    http://Windows.Microsoft.com/en-us/Windows7/change-default-programs-using-set-program-access-and-computer-defaults

    You can check in a new user account to test if you have a corrupted profile:
    http://Windows.Microsoft.com/en-us/Windows7/create-a-user-account
    http://Windows.Microsoft.com/en-us/Windows7/fix-a-corrupted-user-profile

  • executable files: cannot access the file because it is being used by another process

    Hello
    I created a file named test.bat on my desk
    baptized "test.bat" and sent the notebook, wrote "REM" and recorded.
    so, I closed my notebook and reopened, has added another "REM" and saved the file again.
    then I tried to rename, move the file to another folder and delete
    everything went without any problems.

    But if I create the file and run it, the command prompt will appear for a while and then disappear.
    I can rename or move the file without any problem,
    But if I try to edit the file in Notepad, I get this error:

    The process cannot access the file because it is being used by another process.

    and the file is not saved.

    also, if I try to delete the file, it seems to be deleted until I press F5, the file appears again.
    When you try to rename/move this new file, I get another error:

    File Access Denied

    You need permission to perform this action

    You need the permission of the administrator of the computer to make changes
    in this file

    It seems the file is opened (or if I choose to delete) after a few minutes, then it is not if I try to access
    the file (I kept pressing F5 every few seconds for 15 minutes and the file is missing)

    the problem appears if occuar with any file name, anywhere, not just the office or home by car, not even on the same disk,
    while I had no problem when I started in an old installation of windows xp and repeat the same steps.

    I tried to use the sysinternals utility handle, that's what I have:

    After creating test.bat:
    C:\Users\User>handle test.bat

    Copyright (C) 1997-2013 Mark Russinovich
    Sysinternals - www.sysinternals.com

    No found the corresponding handle.

    After you run test.bat:

    C:\Users\User>handle test.bat

    Handle v3.51
    Copyright (C) 1997-2013 Mark Russinovich
    Sysinternals - www.sysinternals.com

    System pid: 4 type: file A18: C:\Users\User\Desktop\t
    EST.bat

    has obtained the result above after attempting to remove test.bat also.

    After the creation of othertest.bat:

    C:\Users\User>handle othertest.bat

    Copyright (C) 1997-2013 Mark Russinovich
    Sysinternals - www.sysinternals.com

    No found the corresponding handle.

    After execution of othertest.bat:

    C:\Users\User>handle othertest.bat

    Handle v3.51
    Copyright (C) 1997-2013 Mark Russinovich
    Sysinternals - www.sysinternals.com

    System pid: 4 type: BD0 file: C:\Users\User\Desktop\o
    thertest.bat

    After you rename the othertest.bat:

    C:\Users\User>handle othertest.bat

    Copyright (C) 1997-2013 Mark Russinovich
    Sysinternals - www.sysinternals.com

    No found the corresponding handle.

    C:\Users\User>handle renamedtest.bat

    Handle v3.51
    Copyright (C) 1997-2013 Mark Russinovich
    Sysinternals - www.sysinternals.com

    System pid: 4 type: BD0 file: C:\Users\User\Desktop\r
    enamedtest.bat

    the also occuars when I run any .exe file and delete it after its finished running, I deleted
    the handle.exe and the handle64.exe after the test above and at the same time returned when I updated their records.

    can someone help me?
    IAM using Windows 7 ultimate 64-bit.
    Thank you.

    I struggled with this VERY ENNUYANT thing for a long time on a Windows Server 2008 R2.

    Just found the answer:

    http://superuser.com/questions/260375/why-would-system-continue-locking-executable-file-handles-after-the-app-has-exit

    Activation of the service 'Application Experience' does the trick for me.

    If I got paid for every minute spent dealing with the mysteries of Microsoft... No, wait! Paid!

    Thank you Microsoft!

  • Activation of Windows 7 - Windows cannot access the specified device

    I enter a new key in my computer, it says that it is not genuine now.

    When I try and and activate by clicking on the link activate it says:

    S read - C:\Windows\system32\slui.exe pop-up box, with following information inside the box:

    "Windows cannot access the specified device, path or file. You can not have the appropriate permissions to access the item.

    I am the only user on the system and I am an administrator.

    When I tried to run slui.exe 4 cmd prompt increased from I got access denied.

    Thank you

    Thank you for your help. In fact, I could solve the problem of installing the SP1, and then uninstall Windows Genuine Advantage was an option of front.

    Thank you once again

  • Windows 7 - Windows cannot access the specified device, path, or file... permissions

    Original title: help me :((

    My computer won't let me open anything, if I click on what anyone outside of the internet it says "Windows cannot access the specified device, path, or file, you don't have the appropriate permissions to access the item"? How can I get permission? :((((((

    Your profile seems to be corrupted. I could do this:
    1. Create a new account. This also creates a new profile.
    2. See if the problem is resolved.
    3. If this is the case, move your data from the old account to the new account. To do this, you must temporarily promote your new administrator-level account.

    Next time you have a problem like that, try to solve it immediately. The "System Restore" mechanism would have probably fixed it for you in ten minutes.

  • CANNOT ACCESS THE LAN WITH THE EASY VPN CONFIGURATION

    Hello

    I configured easy vpn server in cisco 1905 SRI using ccp. The router is already configured with zone based firewall. With the help of vpn client I can reach only up to the internal interface of the router, but cannot access the LAN from my company. I need to change any configuration of ZBF since it is configured as "deny everything" from outside to inside? If so that all protocols should I match?   Also is there any exemption of NAT for VPN clients? Please help me! Thanks in advance.

    Please see my full configuration:

    Router #sh run
    Building configuration...

    Current configuration: 8150 bytes
    !
    ! Last modification of the configuration at 05:40:32 UTC Wednesday, July 4, 2012 by
    ! NVRAM config updated 06:04 UTC Tuesday, July 3, 2012 by
    ! NVRAM config updated 06:04 UTC Tuesday, July 3, 2012 by
    version 15.1
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    router host name
    !
    boot-start-marker
    boot-end-marker
    !
    !
    Passwords security min-length 6
    no set record in buffered memory
    enable secret 5 xxxxxxxxxxx
    !
    AAA new-model
    !
    !
    AAA authentication login default local
    AAA authentication login ciscocp_vpn_xauth_ml_1 local
    AAA authorization exec default local
    AAA authorization ciscocp_vpn_group_ml_1 LAN
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    !
    !
    No ipv6 cef
    IP source-route
    no ip free-arps
    IP cef
    !
    Xxxxxxxxx name server IP
    IP server name yyyyyyyyy
    !
    Authenticated MultiLink bundle-name Panel
    !

    parameter-map local urlfpolicy TSQ-URL-FILTER type
    offshore alert
    block-page message "Blocked according to policy"
    parameter-card type urlf-glob FACEBOOK
    model facebook.com
    model *. Facebook.com

    parameter-card type urlf-glob YOUTUBE
    mires of youtube.com
    model *. YouTube.com

    parameter-card type urlf-glob CRICKET
    model espncricinfo.com
    model *. espncricinfo.com

    parameter-card type urlf-glob CRICKET1
    webcric.com model
    model *. webcric.com

    parameter-card type urlf-glob YAHOO
    model *. Yahoo.com
    model yapo

    parameter-card type urlf-glob PERMITTEDSITES
    model *.

    parameter-card type urlf-glob HOTMAIL
    model hotmail.com
    model *. Hotmail.com

    Crypto pki token removal timeout default 0
    !
    Crypto pki trustpoint TP-self-signed-2049533683
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 2049533683
    revocation checking no
    rsakeypair TP-self-signed-2049533683
    !
    Crypto pki trustpoint tti
    crl revocation checking
    !
    Crypto pki trustpoint test_trustpoint_config_created_for_sdm
    name of the object [email protected] / * /
    crl revocation checking
    !
    !
    TP-self-signed-4966226213 crypto pki certificate chain
    certificate self-signed 01
    3082022B 30820194 02111101 300 D 0609 2A 864886 F70D0101 05050030 A0030201
    2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43647274 31312F30
    69666963 32303439 35323236 6174652D 3833301E 170 3132 30363232 30363332

    quit smoking
    encryption pki certificate chain tti
    for the crypto pki certificate chain test_trustpoint_config_created_for_sdm
    license udi pid CISCO1905/K9 sn xxxxxx
    licence start-up module c1900 technology-package datak9
    username privilege 15 password 0 xxxxx xxxxxxx
    !
    redundancy
    !
    !
    !
    !
    !
    type of class-card inspect entire tsq-inspection-traffic game
    dns protocol game
    ftp protocol game
    https protocol game
    match icmp Protocol
    match the imap Protocol
    pop3 Protocol game
    netshow Protocol game
    Protocol shell game
    match Protocol realmedia
    match rtsp Protocol
    smtp Protocol game
    sql-net Protocol game
    streamworks Protocol game
    tftp Protocol game
    vdolive Protocol game
    tcp protocol match
    udp Protocol game
    match Protocol l2tp
    class-card type match - all BLOCKEDSITES urlfilter
    Server-domain urlf-glob FACEBOOK game
    Server-domain urlf-glob YOUTUBE game
    CRICKET urlf-glob-domain of the server match
    game server-domain urlf-glob CRICKET1
    game server-domain urlf-glob HOTMAIL
    class-map type urlfilter match - all PERMITTEDSITES
    Server-domain urlf-glob PERMITTEDSITES match
    inspect the class-map match tsq-insp-traffic type
    corresponds to the class-map tsq-inspection-traffic
    type of class-card inspect correspondence tsq-http
    http protocol game
    type of class-card inspect all match tsq-icmp
    match icmp Protocol
    tcp protocol match
    udp Protocol game
    type of class-card inspect correspondence tsq-invalid-src
    game group-access 100
    type of class-card inspect correspondence tsq-icmp-access
    corresponds to the class-map tsq-icmp
    !
    !
    type of policy-card inspect urlfilter TSQBLOCKEDSITES
    class type urlfilter BLOCKEDSITES
    Journal
    reset
    class type urlfilter PERMITTEDSITES
    allow
    Journal
    type of policy-card inspect SELF - AUX-OUT-policy
    class type inspect tsq-icmp-access
    inspect
    class class by default
    Pass
    policy-card type check IN and OUT - POLICIES
    class type inspect tsq-invalid-src
    Drop newspaper
    class type inspect tsq-http
    inspect
    service-policy urlfilter TSQBLOCKEDSITES
    class type inspect tsq-insp-traffic
    inspect
    class class by default
    drop
    policy-card type check OUT IN-POLICY
    class class by default
    drop
    !
    area inside security
    security of the OUTSIDE area
    source of security OUT-OF-IN zone-pair outside the destination inside
    type of service-strategy check OUT IN-POLICY
    zone-pair IN-to-OUT DOMESTIC destination outside source security
    type of service-strategy inspect IN and OUT - POLICIES
    security of the FREE-to-OUT source destination free outdoors pair box
    type of service-strategy inspect SELF - AUX-OUT-policy
    !
    Crypto ctcp port 10000
    !
    crypto ISAKMP policy 1
    BA 3des
    preshared authentication
    Group 2
    !
    crypto ISAKMP policy 2
    Group 2
    !
    ISAKMP crypto client configuration group vpntunnel
    XXXXXXX key
    pool SDM_POOL_1
    include-local-lan
    10 Max-users
    ISAKMP crypto ciscocp-ike-profile-1 profile
    vpntunnel group identity match
    client authentication list ciscocp_vpn_xauth_ml_1
    ISAKMP authorization list ciscocp_vpn_group_ml_1
    client configuration address respond
    virtual-model 1
    !
    !
    Crypto ipsec transform-set TSQ-TRANSFORMATION des-esp esp-md5-hmac
    !
    Profile of crypto ipsec CiscoCP_Profile1
    game of transformation-TRANSFORMATION TSQ
    set of isakmp - profile ciscocp-ike-profile-1
    !
    !
    !
    !
    !
    !
    the Embedded-Service-Engine0/0 interface
    no ip address
    response to IP mask
    IP directed broadcast to the
    Shutdown
    !
    interface GigabitEthernet0/0
    Description LAN INTERFACE-FW-INSIDE
    IP 172.17.0.71 255.255.0.0
    IP nat inside
    IP virtual-reassembly in
    security of the inside members area
    automatic duplex
    automatic speed
    !
    interface GigabitEthernet0/1
    Description WAN-INTERNET-INTERNET-FW-OUTSIDE
    IP address xxxxxx yyyyyyy
    NAT outside IP
    IP virtual-reassembly in
    security of the OUTSIDE member area
    automatic duplex
    automatic speed
    !
    interface Serial0/0/0
    no ip address
    response to IP mask
    IP directed broadcast to the
    Shutdown
    no fair queue
    2000000 clock frequency
    !
    type of interface virtual-Template1 tunnel
    IP unnumbered GigabitEthernet0/0
    ipv4 ipsec tunnel mode
    Tunnel CiscoCP_Profile1 ipsec protection profile
    !
    local IP SDM_POOL_1 172.17.0.11 pool 172.17.0.20
    IP forward-Protocol ND
    !
    no ip address of the http server
    local IP http authentication
    IP http secure server
    !
    IP nat inside source list 1 interface GigabitEthernet0/1 overload
    IP route 0.0.0.0 0.0.0.0 yyyyyyyyy
    IP route 192.168.1.0 255.255.255.0 172.17.0.6
    IP route 192.168.4.0 255.255.255.0 172.17.0.6
    !
    access-list 1 permit 172.17.0.0 0.0.255.255
    access-list 100 permit ip 255.255.255.255 host everything
    access-list 100 permit ip 127.0.0.0 0.255.255.255 everything
    access-list 100 permit ip yyyyyy yyyyyy everything
    !
    !
    !
    !
    !
    !
    !
    !
    control plan
    !
    !
    !
    Line con 0
    line to 0
    line 2
    no activation-character
    No exec
    preferred no transport
    transport of entry all
    output transport lat pad rlogin lapb - your MOP v120 udptn ssh telnet
    StopBits 1
    line vty 0 4
    transport input ssh rlogin
    !
    Scheduler allocate 20000 1000
    end

    A few things to change:

    (1) pool of IP must be a single subnet, it is not the same subnet as your subnet internal.

    (2) your NAT ACL 1 must be changed to ACL extended for you can configure NAT exemption, so if your pool is reconfigured to be 10.10.10.0/24:

    access-list 120 deny ip 172.17.0.0 0.0.255.255 10.10.10.0 0.0.0.255

    access-list 120 allow ip 172.17.0.0 0.0.255.255 everything

    overload of IP nat inside source list 120 interface GigabitEthernet0/1

    No inside source list 1 interface GigabitEthernet0/1 ip nat overload

    (3) OUT POLICY need to include VPN traffic:

    access-list 121 allow ip 10.10.10.0 0.0.0.255 172.17.0.0 0.0.255.255

    type of class-card inspect correspondence vpn-access

    game group-access 121

    policy-card type check OUT IN-POLICY

    vpn-access class

    inspect

  • Error message: "Windows Media Player cannot access the file. The file may be in use, you won't have access to the computer on which the file is stored, or your proxy settings are may not be incorrect. »

    Original title: problems of residential group after system recovery

    I started a homegroup on my computer.  I added another computer to the homegroup.  Everything worked fine until I had to perform a system recovery on the laptop that I used to start the homegroup.  I implemented the homegroup again, but I can't access the files on the other computer via Windows Media Player.  I get an error message that says "Windows Media Player cannot access the file. The file may be in use, you won't have access to the computer on which the file is stored, or your proxy settings are may not be incorrect. "I can access all the music files via Windows Explorer.  I have to start over with a new password?  Can I just create a new homegroup?  What other options do I have?  You can provide any help would be greatly appreciated.  Thank you.

    Hello

    Please follow the methods and check the issue:

    Method 1:

    Open the homegroup troubleshooting utility:

    http://Windows.Microsoft.com/en-us/Windows7/open-the-HomeGroup-Troubleshooter

    Method 2:

    Why can't I access my homegroup? :

    http://Windows.Microsoft.com/en-us/Windows7/why-cant-I-access-my-HomeGroup

    For reference:

    Homegroup: frequently asked questions:

    http://Windows.Microsoft.com/is-is/Windows7/HomeGroup-frequently-asked-questions

    Method 3:

    See the steps in "include a folder shared in a library" from the link below:

    Access to files and printers on other homegroup computers: http://Windows.Microsoft.com/is-is/Windows7/access-files-and-printers-on-other-HomeGroup-computers

    I hope this helps.

Maybe you are looking for