I did everything suggested. How do you keep it from 'not repsonding?

In the last six weeks, that I had to reinstall FireFox and follow all your suggestions, including Flash Player, who soon not to go haywire and needs to be redone as well. That is what it is? This was not happening.

It is possible that your security (firewall, antivirus) software blocks or limit Firefox or the process of plugin-container without you inform, possibly after the detection of changes (update) for the Firefox program.

Delete all rules for Firefox and the plugin-container in the permissions list in the firewall and leave your firewall again ask permission to get full unlimited access to the internet for Firefox and the plugin-container and the update process.

See:

Start the computer in safe mode Windows with network support (on the startup screen, press F8) as a test to see if that helps.

Tags: Firefox

Similar Questions

  • How do you keep users from creating directories deeper than 260 characters of the root of the drive?

    In Windows, it seems impossible to create/join the files with a path longer than 260 characters.

    Well, not completely: you can create these files if you create a shortcut or point a reader shared inside the path, but that's exactly how this problem gets so bad: a user creates a share X: pointing to \\myserver\longdirname\evenlongerdirname\verylongdirname\etc\verylongfilename

    then it creates a file in X:\evenlongerdirnamethanYouHaveEverSeen\SuperLongDirNameJustLongEnoughToBe260FromTheRoot

    Note: the names of directories must be long, you can also create a shorter longer string of names of directories (a\b\c\d\e\f\g...)

    now, someone trying to open this file of \\myserver fail miserable. In fact, windows behaves a bit ridiculous and sometimes silently ignores files. I've seen this happen when people copy a folder of installation deep inside a fileshare: the installation program is a DVD or CD and a subscription contains 1000 directories, some are more than 260 tank when opened from the root. Then you get really weird behaviour: files ignored!

    As 260 characters was probably very well when the disks were<10GB but="" if="" you="" have="" 1="" tb="" drive,="" it's="" not="" too="" hard="" to="" end="" up="" with="" directories="" that="" are="" way="" deeper="" than="" 260="" characters.="" so="" i="" predict="" that="" there="" will="" be="" a="" time="" soon="" where="" ntfs="" needs="" to="" be="" adapted="" to="" be="" able="" to="" use="" large="" disks="" decently.="" this="" is="" also="" made="" worse="" because="" people="" create="" files="" with="" really="" bad="" names="" (e.g.="" a="" outlook="" msg="" files="" will="" be="" called="" the="" same="" as="" its="" subject="" line,="" fun="">

    Don't tell people don't do that, I see it in my everyday environment, and it breaks a lot of programs (and then the bad programmer is blamed for drawback of Windows: "you can't even open a file named a.txt")

    Question: How do you keep the users to create a file that is > 260 characters if we take into account the root of the drive, rather than a part under?

    Hi PM3.141592
     
    Your question of Windows is more complex than what is generally answered in the Microsoft Answers forums. It is better suited for the IT Pro TechNet public.
     

    Please ask your question in the Forums Pro Windows XP IT.

  • How do detect you if a person spying on your computer. How do you keep it

    I have 2 pc. You can detect if 2 pc spy remotely on pc1. If so how do you keep it

    Hi Traci,

    I can't provide technical and tactical spy, hacking methods, or how to use malware to infect a computer with programs or also in a forum dedicated to protection against such things - I don't know if it would be a violatiion of the forum (more likely) COC, but it would be a violation of my ethical principles.  There are countless methods.  I will go this far just to give you an idea (and this is more or less a "sanctioned" method used by employers and parents to monitor the activity of employees or children and not the most sophisticated hacking methods)- and I'm not recommending or suggesting this program (I almost never recommend paid software when I can usually find free options that work almost as well and I don't know anything about and) just a quick did search to find one to use as an example), but just use it as an example of what can be installed, see: http://spysoftware.com/spyagent.html which is even more powerful with a direct administrative access to your computer.

    If someone has administrative access to your computer, then it is extraordinarily difficult for anyone to detect it or prevent espionage (if done correctly).  I don't know yet I could do (detect-not necessarily in place - according to the way it was done - well well, I might be able to do it if I knew it was going on and worked on the problem until I found the culprit, but that could take days or more and some very sophisticated and software procedures may be special) , and I'm very concerned about security.  With direct access, it is just too easy to do it in a way that will be almost impossible to detect.  Depending on your operating system and how much effort you want to put into it, there are steps to take to minimize the problem.  If you are allowed to block the person who has access, it becomes even better.  If the question concerns only protect against certain types of espionage (as opposed to any type), then it becomes easier again - but even in this case, there are some guarantees if they have the same level of access (or access) and direct access to your computer.

    In some cases, using spyware on yourself (that you install to spy on your own computer) can detect other spyware activity or activities (I used successfully this particular thing before) - but there is no guarantee (as it can potentially be bypassed if anyone knows there or by using techniques that do not trigger to detect activity) - but it has sometimes proved effective (note it does not - it CAN help to) detect if things and knowing that and possibly how it is done you can take improved or maybe even effective preventive measures until the inability to spy is detected and then they would just adapt to overcome or escape from your preventive measures).

    The honest answer is that, to get the protection you want, you need to block to have this level of access to your computer (after a format and a clean install in order to eliminate what they've already done).  Once they are blocked, then the methods to use normally appear more ordinary procedures, if you knew what to look for.

    If you allow me, why you allow him to have access to your computer?  If you are trying to overcome parental control, then I will not help you and you should reconsider what you're trying to do (and even if it works, they will know that you have done and can eventually impose restrictions that greatly limit your activities and who are far worse than the spy was in the first place - that is how I would react as a parent).  If you try to overcome the employer monitoring, efforts to work around could have consequences job that you do not want to happen.  If it isn't, then why are you allowing this access and what are the rules for your ability to restrict this access somehow?   Also, is there a specific business type that you are specifically concerned about or is this activity?

    As Robert has said, it is better, if this is done in a separate thread, but if you want me to participate, at least after the link to this new thread here as an answer I cannot not otherwise it exists and it will almost certainly miss myself (although others can certainly help you as well).

    I hope this helps.

    Good luck!

    PS Instead of creating another post for your other question, see the following for an explanation of the features of keylogger: http://en.wikipedia.org/wiki/Hardware_keylogger (NOTE: it's hardware, not software since you said "peripheral").  Keylogging can be done using software as well.  For more information about keylogging devices and make sure that not all of these sites are safe (as with any general research), see the general Bing following research: http://www.bing.com/search?q=keylogger+device&PC=BB07&QS=n&first=11&FORM=PERE.

  • I have a pdf form that has 4 columns, with each column having 28 check boxes and text between. I did so he goes by column, but when I do anything for a checkbox it takes it out of line. How can I keep that from happening?

    I have a pdf form that has 4 columns, with each column having 28 check boxes and text between. I did so he goes by column, but when I do anything for a checkbox it takes it out of line. How can I keep that from happening?

    You talk about the tab order? If Yes, go to Edit - Preferences - forms and make sure the box "Automatically adjust tab order when changing fields" is NOT checked.

  • How do you keep the references to lose their links in PDF files that results when they are moved?

    How do you keep references (made in InDesign) lose their links in their PDF documents resulting when PDF files are moved (i.e., posted on the web)?

    I guess that you are referring to cross-references to other documents or external files, because everything within the document will always work. You can't prevent it. It's like a link to a file or a folder on your drive HARD or on a network.

    As soon as the file or folder is changed (moved, renamed), the link is broken and useless.

  • How do you keep the projection browser title?

    How do you keep the projection browser title in the output? I did once but may not know how!

    Thanks in advance,
    Rosie

    Will do, thanks!

  • How do you keep a message from Inbox disappear on your laptop after you read that on the desk?

    Original title: messages received

    How do you keep a message miscare disappear at the top of a tower, after you read the desktop

    You must leave a copy of messages on the server on both machines so that both can access the messages.  Generally, a machine will delete messages after they are downloaded.  You can prevent this, but we need to know what e-mail program, you use to be able to tell you were the parameters is.  In OE and WinMail in Vista, you define which under Tools | Accounts | Mail | Properties | Advanced, but it will be in a different place for different programs.

    Steve

  • How do you keep icons on the desktop to move?

    Original title: the desktop icons

    How do you keep icons on the desktop to move?

    Hello

    Right-click on an empty area of the desktop

    Select display

    Select the icons snap to grid

    It should align them to the left

  • Using Muse how do you keep the title of the first page on the Web site to appear before the name of the company?

    Using Muse how do you keep the title of the first page on the web to appear before the name of the company in Google?

    Hello

    If you want your company name appear first, make sure that you rename your page like - last | The title of the page.

  • How do you keep the organizer of a mixture of the order of the photos when loading off the memory card?

    @How do you keep the organizer of a mixture of the order of the photos when loading off the memory card?

    It sounds like you are using Photoshop Elements, and Photoshop Elements forum would be better answered that.

    Photoshop Elements

    Gene

  • How do you keep the indicator changing hacker to debug in the URL to expose all YES?

    Hello
    How do you keep an indicator changing hacker to debug in the URL to expose YES everyone?
    I have installation of State Protection and it protects the elements on the Page.

    Published by: heavy on August 6, 2010 12:12

    Hello

    You can change the attributes of the application
    http://download.Oracle.com/docs/CD/E14373_01/AppDev.32/e11838/BLDR.htm#sthref323

    BR, Jari

  • Whenever I have start tabbed FF websites visited before automatically propagate. How can I keep this from happening?

    Whenever I have start FF, tabs in Web sites visited previously spread automatically. How can I keep this from happening?

    Open the Options dialog box (menu, select Tools > Options).
    Go to the general Panel and in the start-up section change the option for "Firefox start"

  • need to take my computer back in the day that I first started it on7/21/2011 my restore point back up to now how can you start over from scratch with no disc?

    need to take my computer back in the day that I first started it on7/21/2011 my restore point back up to now how can you start over from scratch with no disc?

    Most OEM computers have a partition on the hard drive, that allows to give it bought as provided.  Usually, you activate this feature by pressing a key or combination of keys when the first splash screen appears at startup.  Look quickly at the first screen that appears, and you could see the key that you press.  Otherwise, go to your computer manufacturer's website and download the manual for your computer.  Instructions must be there.

    HTH,
    JW

  • When I Zoom in on a photo, the quality decreases. How can I keep that from happening?

    When I Zoom in on a photo, the quality decreases. How can I keep that from happening?

    [Moved General forums, all-Adobe, unsupported forum lounge to a more specific product - MOD support forum]

    Working with larger images.  More pixels = more information.

    Nancy O.

  • How can you transfer photos from creative cloud to Lightroom?

    How can you transfer photos from the creative cloud to a new computer that is configured with Lightroom?

    Hello

    Please see import existing images | Adobe Photoshop Lightroom CC tutorials

    I hope this helps!

    Kind regards

    Sheena

Maybe you are looking for