How did the majority of my messages have prefix * SPAM * even if I have them in my address book?

Most of my emails have started to come through with * SPAM * before the subject line. Where is this from-Thunderbird? It's more boring!

It makes no difference if the sender is in my address book, or if I leave hidden content. And even if I'm on the subject, why should I allow content hidden each time?

Best regards, Penny

If you see the word 'Spam', then it is applied by the server (you will move to the coast server, but for minor irritations, it would be worth keeping) or you have installed a spam as Spam Assassin software and use it.
Thunderbird does not 'Spam' add to any email.
Thunderbird uses the term "Junk".

Re, why should I leave the hidden content each time?
Thunderbird takes your life private in return very seriuosly.
Please read:
https://support.Mozilla.org/en-us/KB/remote-content-in-messages
http://KB.mozillazine.org/Privacy_basics_%28Thunderbird%29

If you are certain that comes from the email, then you have a few options.
When you see the message:
"In order to protect your privacy, Thunderbird has blocked remote content in this message.
There will be a 'Options' button to the right of the message.
Click on the 'Options' button to see fall selections...

To allow remote images in this email only:
Select: "display remote content in this message.

To information contained in all messages from this e-mail address:
Select: "allow remote content to the e-mail address.

If it is possible to permanently turn off this protection, it is not advisable. You can also change the e-mail addresses that you have selected as exceptions.
«Select: Edit distance content "options «»

It will open a small window called Options
In the upper part of the "content of Mail."
To turn off permanently:
Select: "allow remote content in messages.

To check the exceptions list, click on the top of the page content of Mail 'Exceptions' button

If you make changes remember to click the OK buttons.

Tags: Thunderbird

Similar Questions

  • How did the keyboard set on the baseplate on Satellite C855-1TD

    C855-1TD model *.

    How did the keyboard attached to the base plate?
    There is not any screws holding it down. Is it just stuck to the plate?

    Thank you

    It s a bit complicated on this model of laptop. I just hope you won't damage anything.
    Before you remove the keyboard, you must remove the optical disk drive. When ODD is deleted, you must use a plastic stick to push the back of the keyboard of the ODD housing slot. Push the keyboard until the corner rises on the upper surface of the case.
    After doing this a slice of plastic lever allows to insert between the keyboard and top box, carefully lift the edges of the keyboard until all locks are unlocked.

    * Be careful and all you are doing is on your own risk.*

  • How do the box values ring to have figures after the decimal point

    How do the box values ring to have figures after the decimal point

    Thanks in advance

    Control properties editor:

    Change the representation in the floating point data Type tab type, DBL will do.

    Then go to the Page of display Format and increment 'Numbers' to something greater than 1

    That toggles the column of values on the tab change the items to % .6f, or 6 digits of precision. Uncheck sequential following, values and you're there.

    If you think that's too restrictive, go back the display Format, then select if rating and you can type anything (but, the editor has a hissing fit, so you must load chains and property [] with a property node values programmatically)

    I've been struggling to get OR improve this editor of properties of the years!

  • I have photos I want to decrease the dpi on but can not understand how with the Gallery Windows. I have Windows Vista operating system.

    I have photos I want to decrease the dpi on but can not understand how with the Gallery Windows. I have Windows Vista operating system.

    I have photos I want to decrease the dpi on but can not understand how with the Gallery Windows. I have Windows Vista operating system.

    ===============================================
    You can resize a picture in WLPG but if you want to change the .dpi you
    need a different application.

    Information about resizing...
    Right-click on one or more selected inches... Choose... "Resize" in the menu.
    Choose a format, access a folder to save in the left click the ' resize and
    Save "button. (I suggest that you save the photos resized in a new folder
    to prevent the replacement (replacement) the originals)

    Take a look at the following link:

    Resizing Photos in Windows Live Photo Gallery
    http://blogs.msdn.com/PIX/archive/2007/11/30/resizing-photos-in-Windows-Live-Photo-Gallery.aspx

    In addition, the free software IrfanView can change dpi. Simply open a photo in IrfanView
    and go... Image / information. Enter the resolution you want in the resolution
    fields and on the left, click change. Then go to... File / save as... and save
    your photo altered with a new name.

    IrfanView
    http://www.software.com/IrfanView
    (Download plugins too)
    http://www.software.com/IrfanView-plugin

    John Inzer - MS - MVP - Digital Media Experience - Notice_This is not tech support_I'm volunteer - Solutions that work for me may not work for you - * proceed at your own risk *.

  • Always on display in the research of deleted messages (years ago and even), blank incoming emails and filters not auto running. * sigh *.

    Two problems here, maybe they are related. I went through and deleted to rebuild the database as other say to do and much more for a while. I'm puzzled.

    Now, I do receive a ton of emails and are struggling to go through all the and need to save a large group of them for my blog of the journal. However I also created subfolders (which btw filters I've implemented will not auto or filter)

    I made a blunder in terribly I suppose that set up e-mails or something, this is what I have going.

    First my biggest problem, emails see the list when they arrive (and it can be a whole bunch with the same date and time) which show the sender and date. When I go to open these emails, they are empty. I don't think that this shows the object, that I did not what happens today... If I log in e-mail that these emails have not the sender, subject, but all seem to have the same date and time and of course emails are empty.

    Annoying problem: my research through my emails will show old messages deleted and shippers with dates and summer topic. But of course, they are removed if no content. I would rather all of these old emails go goodbye altogether.

    3rd, my filters do not auto filter, I have to put this (new to me) option up badly. I'm not going in and manually filter.

    I'm sorry, I waited so long to write, and the problems have accumulated. I'm a newbie with all this, so please be gentle and detailed with me. I think generally these things read me solutions, but all the solutions I found were only for the first problem (above) and seems to help for a little while, then boom she is still with blank emails, which appear to be completely lost.

    Maybe you can guide me to maintain my emails (Imap) online on the server and only read, write, and delete Thunderbird? I am so lost and frustrated. Thank you.

    I'm sorry I let this get so out of hand here,
    Mariah

    That your description sounds a lot to Norton anti virus, but others do.

    Multiple copies of the same message are repeated almost always anti virus analyzes incoming messages. Disable analysis and the problem goes away then turn it on and it resumes.

    My guess is that your filter problems and research problems are also associated with this uniquitous and most ignored security tool that mess so far more than it should...

    Removal of the index
    I assume you mean the global-messages - db.sqlite. If you close Thunderbird and now delete. Research will be incomplete until it rebuilt and the time to do this will have a lot to do with how much mail is and how busy the computer is.

    Now, create an exclusion in your anti virus program for Thunderbird profile folders. My guess is it is scanning the files in your profile, every time that Thunderbird tries to open and turning usually things in a fierce struggle, including Thunderbird loses that he just does not wait if files are locked. He expects exclusive access to her files immediately, not in 10 minutes when anti virus did it's thing. So things are added to the index but not deleted. Mails do not move as the destination or source file is 'in service', etc..

  • Hello, I'm new here, I'm trying to find how to make my windows vista machine have a static IP address.

    The reason for this: British Colombia, I'm trying to port forward on my router 2wire AT & T. Everytime I turn my laptop off the IP reset and I can't do a check port on port forwarding, I did the day before. So I need a static IP address so that when I turn off my machine and then again on the INVESTIGATION period does not reset. Could I get a good suggestion on where to find this info.? I asked on other forums, but it seems that those who are not very active, and it's frustrating day waiting to get an answer lol. I really need my games to have a port before getting a low latency (ms). And also for download speeds appropriate downloading patches. Unfortunately, I do not know if my router 2wire has a UPnP enable/disable option of opening and closing ports properly. But I guess that even if it is not that I could always get the port forwarding to work. Thnx so you can really help me out here, I really appreciate it...

    Also, I looked everywhere for the forums. I can't seem to find no to no the case, Idk where to go or what to do lol...

    I thought about it, I had to use my routers IP address of my default gateway on my machine...

  • Backflip: Should your social networks have a contact in address book real?

    OK, so I figured out how to add some social networking and all, and ALL my friends on facebook and myspace has entered my real address on my phone book.

    I was wondering if you could change that, as did not not your FB/MS in your real directory on the phone. It's just a WAY for many people. and some people that I actually don't even know.

    If you add your social networks as an account on the phone it syncs all of your friends, etc to your address book. When you view your address book, you can type in the top of the screen and a list of groups will fall, you can select one of them to limit the contacts that you view.

    Alternatively, you can use different ways to track your social networks such as this Facebook app. There are other applications for facebook and other social networks.

    If you delete your social networking accounts, updates will not appear in the universal inbox.

    Advanced the ability to filter which of your social networking contacts follow you on your phone.

  • Satellite A40: How update the BIOS because I only have half of the Bios

    Hi guys

    I went to the local with my satellite A40 computer store because I only have half of the bios!
    I sent an email to support technique German toshiba and they said to try a bios update (which put bare in mind I still don't know how to do), then we have sent my laptop in a local computer store and told them the problem they do not put me to update the bios on a processor cempron.

    Why not? What are the risks in need to know.

    Please help me because I want to in the future might be upgraded to vista?

    Hello Daniel,.

    I'm a little confused about your message from Mr.
    What do you mean with half of the bios is enough?
    What s wrong with the BIOS?

    The support from Toshiba said-> try a BIOS update.
    On the Toshiba page, you can download the BIOS for Satellite A40.

    It seems you didn't check the download page detailed because on this page you will find this statement:
    IOS http://eu.Computers.Toshiba-Europe.com/cgi-bin/ToshibaCSG/FAQ.jsp?z=234&service=eu&from=faq_selection&CFID=B & FID = TRO0000000b07

    The update of the BIOS has been detailed described in this document and that you follow these guidelines for the update of the BIOS.

    Good bye

  • I can't copy my files to windows movie maker. When I try to copy them, I GET a POPUP STATING THAT PROBLEM OCCURRED. Windows Media did the same thing and I have service pack 3 so-called.

    MOVIE MAKER DOES NOT ALLOW ME TO IMPORT FILES TO CREATE A MOVIE. WHEN I create files to create a cd or a slide show with windows media player I have a popup indicating that there is a problem with my cd player or the idon't have a and there a burner cd, used it all the time so far.

    Hi I'mafteru.

    1. don't you make changes before the show?

    Sometimes no Microsoft programs running on the computer may cause this problem. Try the following steps:
    Step 1: Check if a non-Microsoft program is causing this issue
    see How to configure Windows XP to start in a "clean boot" State .
    b. restart the computer and check if the problem persists. If the issue is not persistent, then from the article, follow the method 1 and method 2 to find out if any program is causing the problem.
    c. Once you have found the culprit which is the program that is causing the problem, then uninstall it or reinstall once more to solve the problem.

    Note: Article, remember to follow 'steps to configure Windows to use a Normal startup state. "

    Step 2: Remove the unwanted registry entry
    a. see the CD-R or CD-RW drive is not recognized as a recordable device
    b. follow the steps in the article, and then restart the computer.
    c. check to see if the problem persists.

    Important: Modifying the registry incorrectly or remove will cause serious damage to the computer. It is recommended to back up the registry before you edit it.
    See How to back up and restore the registry in Windows

    For your reference: Movie Maker frequently asked questions

    Visit our Microsoft answers feedback Forum and let us know what you think.

  • How did the same predicate is completed access and filter?

    SELECT select, j.job_title, d.department_name

    OF e hr.employees, hr.departments d, hr.jobs j

    WHERE e.department_id = d.department_id

    AND e.job_id = j.job_id

    AND select LIKE 'a % ';

    Execution plan

    ----------------------------------------------------------

    Hash value of plan: 975837011

    ---------------------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ---------------------------------------------------------------------------------------------

    | 0 | SELECT STATEMENT | 3. 189. 7 (15) | 00:00:01 |

    |* 1 | HASH JOIN | 3. 189. 7 (15) | 00:00:01 |

    |* 2 | HASH JOIN | 3. 141. 5 (20) | 00:00:01 |

    | 3. TABLE ACCESS BY INDEX ROWID | EMPLOYEES | 3. 60. 2 (0) | 00:00:01 |

    |* 4 | INDEX RANGE SCAN | EMP_NAME_IX | 3 | | 1 (0) | 00:00:01 |

    | 5. TABLE ACCESS FULL | JOBS | 19. 513. 2 (0) | 00:00:01 |

    | 6. TABLE ACCESS FULL | DEPARTMENTS | 27. 432. 2 (0) | 00:00:01 |

    ---------------------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("E".") DEPARTMENT_ID "=" D ". ("" DEPARTMENT_ID ")

    2 - access("E".") JOB_ID '=' J '. ("' JOB_ID ')

    4 - access ("E". "Last_name" LIKE 'A %') "

    filter ("E". "LAST_NAME" LIKE 'A %') "

    I understand not only how to select column is evaluated by the access and filter? Can someone there explain please? Or recommend me an article or document that explain this predicate excatly explains to explain the plan?

    Thanks in advance.

    Near NightWing.

    I believe that the predicate can be used to access THE index entries and if entries of access could include potentially "false positives" then filtering is required to remove the FPs.

    This filtering can be done in the same step of the operation (such as access) or as an extra step.

    My apologies, this has become much longer and more detailed that I intended it to be. :-(

    If I understand correctly,

    In terms of the explanation of the path, each step can include access and filtering process for "entries" (index or line). In the plan to explain the predicate section shows Information the use of predicate for step 'matching. "

    Some predicates can be "used" to ACCESS (ing) the entries, while the same or additional predicates (or even other) can be "used" to FILTER (ing) access entries (which have been consulted, but the optimizer is not sure that EACH AACCESSed entry is indeed a part of final result set). In such cases optimizer applies filtering predicate also during the operation stage. The optimizer can sometime even add additional operation steps or predicate [almost like a short circuit]

    So, using our previous configuration, allow us to run test cases.

    In this query we use AS predicate but the operand does NOT contain any 'wild' character In this case INDEX RANGE SCAN is performed, but since there is no wild characters are involved we can be sure that each entry using this predicate is indeed part of the final result set. This predicate Section shows that the predicate is used ONLY to access (index) entries.

    We know that the result set of this query is NULL lines.

    > explain plan for select v1 of tst where v1 as "A".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" = 'A')

    However, in this application, there is a wildcard character in the predicate, so while the INDEX RANGE SCAN step access entries using this predicate, it could potentially access entries that can be part of the final result set. So in the SAME step of the INDEX RANGE SCAN operation the predicate is also used for filtering. Since this is the only predicate, it may seem redundant.

    > explain plan for select v1 of tst where v1 like 'a % '.

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |    24.   168.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |    24.   168.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" LIKE 'A %')

    filter ("V1" LIKE 'A %')

    If we add an another predicate as below (also includes wild character), it gets interesting. INDEX RANGE SCAN step performs two access AND filtering.

    Please note that the predicate 'V1' AS '%' is used to ACCESS and FILTER, fine FILTER uses additional predicates.

    > explain plan for select v1 of tst where v1 like 'A %' and v1 as "%c".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" LIKE 'A %')

    filter ("V1" IS NOT NULL AND "V1" LIKE 'A %') AND "V1" LIKE "%c"

    When we change the predicate 'V1' LIKE 'A %' to 'V1' > 'A', then we can use the predicate to access entries AND do not forget that each entry using this predicate are

    Indeed part of results if other predicates are met. In this case optimizer of must not filter on 'V1' > 'A', wherever it must continue to filter on 'V1' LIKE '%c '.

    > explain plan for select v1 of tst where v1 > 'A' and v1 as "%c".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("V1">'A')

    filter ("V1" IS NOT NULL AND "V1" LIKE "%c")

    Of course, if we do the predicate so that the entries are NOT accessible using the predicate, then for INDEX FULL SCAN (no Beach cannot be determined) operation comes into play and the predicate of ACCESS goes. All entries in the index are ALWAYS accessible (predicate applied no ACCESS) and FILTER predicate is applied.

    > explain plan for select v1 of tst where v1 like '%c %'

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     8 S     1 (0) | 00:00:01 |

    |*  1 |  INDEX SCAN FULL | TSTV1_IDX |     1.     8 S     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter ("V1" IS NOT NULL AND "V1" LIKE '%A%c')

    For the example proposed by JL, two predicates are used in the INDEX RANGE SCAN step to access THE entries. In addition, we can be sure that all entries that are accessible with success using this predicate can be included in the final result set. So not necessary filtering.

    > explain plan for select v1 of tst where v1 > 'A' and v1<>

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |    24.   168.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |    24.   168.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("V1">'A' AND "V1")<>

    Interestingly, when we change the 'B' in the previous query to 'A', change predicates of inequality, so we cannot use index. Optimizer knows this and switches for FTS and introduced an additional step of operation FILTER. In my view, the filter predicate can be applied in operation of FTS. Additional FILTER stage is the predicate as FALSE hard-coded value. It does not yet use our predicate of the query.

    Well, don't know if he actually bypasses the operation of FTS. SQL trace can indicate that.

    > explain plan for select v1 of tst where v1 > 'A' and v1<>

    ---------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ---------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |      |     1.     8 S     0 (0) |          |

    |*  1 |  FILTER |      |       |       |            |          |

    |   2.   TABLE ACCESS FULL | TST |    49.   343.     3 (0) | 00:00:01 |

    ---------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter (NULL IS NOT NULL AND NULL IS NOT NULL)

    Subsequently, optimizer decides to use the INDEX RANGE SCAN, even if the predicate is always an inequality. Go figure...

    > explain plan for select v1 of tst where v1 > 'A' and v1<=>

    -------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    -------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     8 S     0 (0) |          |

    |*  1 |  FILTER |           |       |       |            |          |

    |*  2 |   INDEX RANGE SCAN | TSTV1_IDX |     1.     8 S     0 (0) | 00:00:01 |

    -------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter (NULL IS NOT NULL)

    2 - access("V1">'A' AND "V1")<>

    As others have said, it is difficult to understand and predict the path, but fortunately Oracle doing the right thing, 99% of the time.

    VR

    Sudhakar

  • How is the new warnings to date have the same version as the oldest?

    I got an email about new updates to my PC. In any case I noticed that I think that all or certain updates have the same version as the previous drivers.

    So why is it?

    Hello

    Is the update also the same thing? In any case, if your device works Scott it is not useless to put anything.

    It will also be interesting to know what model of laptop you have and updates are available.

  • How did the contrast of the display on my P Satellite stopped

    I need to adjust the screen contrast, so that I can use photoshop color Manager software, but there is nothing of visual contrast in the manual.
    Can anyone help?

    Hello

    Did you check the settings of your graphics card?
    You didn t write anything on your model of laptop, OS or what graphics card you are using but in my graphics card settings, I was able to find an option that changes the color, contrast and other parameters

    Should check this too

  • How did the type of data stored in oracle timestamp

    I want to know how the timestamp is stored in the oracle database.

    If the data type of a colume's timestamp, the number of bytes is busy?

    What is the principle?

    Thank you.

    Mark - it's a DATE, not a TIMESTAMP

    SQL > create table test (a date, timestamp, b);

    Table created.

    SQL > insert into values test (sysdate, systimestamp);

    1 line of creation.

    SQL > select dump (a) test;

    DUMP (A)

    ------------------------------------------------------------------------

    Typ = Len 12 = 7: 120,115,1,14,17,60,3

    SQL > select dump (b) of the test;

    DUMP (B)

    ------------------------------------------------------------------------

    Typ = 180 Len = 11: 120,115,1,14,17,60,3,17,103,145,0

  • How did the account charge generated in Oracle iProcurement for a request of?

    Hello

    In vanilla Oracle R12, on what criteria a current account is generated in a query?

    Please point to the right documents.

    Kind regards

    Caroline

    Hi Carolina,.

    Please check the note:

    How to debit an account is set by default to iProcurement lines? (Doc ID 455847.1)

    Thank you

    Clarino

  • How did the foreign key that is recognized by the primary key

    Hi, when I have two user tables and userLevel and the primary key of the user is the user name and I add a field to userLevel userID is only to make the userID field in userLevel automatically the foreign key of the table? Or do you switch the engine of MyISAM tables to InnoDB to make relational links. Can someone please explain this in English clear to me, because I just can't get my head around this.

    In the case of a query such as SELECT statement, we talked, being a key actually means that the field is indexed so that the database can quickly look up.  Thus, in phpMyAdmin, you set the field to be indexed by the visualization of the structure of the table and clicking the icon index (the one with the Lightning) for the field in the Action section.

    If you are looking for integrity refrential between tables we also talked about and using the InnoDB engine, you can click the link 'Show the relational' in the table structure page of phpMyAdmin and define foreign key constraints.

Maybe you are looking for

  • How to assign a name to the ip address?

    I often connect to the servers in my company on our Windows network, but is not the name of Windows network. Accordingly, I must specify the equivalent IP address directly. Under Windows, I could change my etc\hosts file and create a relationship bet

  • Communicator Dell printer not in use

    PROBLEMS to make the printer work

  • Best operating system for my PC specs

    * Original title: Windows appropriate Can anyone here tell suggest me that which windows will be fitted for my pc after xp. I want to change my windows XP to another IE. MYSYSTEM information are provided below. If you need more information, I will tr

  • help E1200 wired bridge mode? (you call it?)

    Signal from my main router does not reach to the basement in my house. so I was using router E1200 as a secondary router. It was hard wired to the main router and worked very well. Recently, I had to reset E1200 because I forgot the password of the r

  • Help with 16-bit games on Windows 7 64 bit Edition home premium

    OK, so basically what I'm trying to run Lego rock raiders and other 16-bit on my computer games. I tried different modes of compadability The game worked on windows vista and xp, the problem is I have no more of these computers and the virtual xp is