Outlook 2007, Outlook 2003, Outlook 2002 and Outlook 2000 SP3 (but not Outlook 98 or earlier Outlook 2000 versions) allow the user to use a registry key to open up access to blocked attachments. (Always make a backup before editing the registry.) To use this key:
Run Regedit, and go to this key: HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Outlook\Security (change 10.0 to 9.0 for Outlook 2000 SP3 or to 11.0 for Outlook 2003, 12.0 for Outlook 2007 )
Under that key, add a new string value named Level1Remove.
For the value for Level1Remove, enter a semicolon-delimited list of file extensions. For example, entering this: .mdb;.urlwould unblock Microsoft Access files and Internet shortcuts. Note that the use of a leading dot was not previously required, however, new security patches may require it. If you are using "mdb;url" format and extensions are blocked, add a dot to each extension. Note also that there is not a space between extensions.
Tuesday, December 2, 2008
Friday, August 1, 2008
Installing Pre Vista windows after installing Vista
1. To install a previous version of Windows onto a computer running Windows Vista (Post-Beta 2)
With Windows Vista Beta 2 as well as in Windows Vista Build 5456, the only command one needs to run is:
bootsect /NT60 ALL
(Copy bootsect.exe from the boot folder of your Windows Vista DVD and paste it into your Windows XP Windows\system32 folder)
This pulls all Windows operating systems into the Windows Vista boot menu.
With Windows Vista Beta 2 as well as in Windows Vista Build 5456, the only command one needs to run is:
bootsect /NT60 ALL
(Copy bootsect.exe from the boot folder of your Windows Vista DVD and paste it into your Windows XP Windows\system32 folder)
This pulls all Windows operating systems into the Windows Vista boot menu.
Monday, July 7, 2008
Login Logoff looping while starting windows XP
http://support.microsoft.com/kb/555648
Edit these values and type the correct path of shell : Shell = explorer.exe Userinit=X:\windows\system32\userinit.exe NOTE: These files may also be deleted by spywares. You may need to extract them using Windows CD. Steps for rectifying this problem:
•
Log on to a networked computer.
•
Run Regedit.exe
•
Point your cursor to HKEY_LOCAL_MACHINE
•
Select File > Connect Remote Registry
•
Type computer name (infected computer)
•
Navigate to the following location in registry of destination or infected computer HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
•
Edit these two values in right pane: Shell Userinit
•
Change these two values to Shell=explorer.exe Userinit = x:\windows\system32\userinit.exe
•
Exit from Registry
•
Restart Infected computer.
•
You should be able to log on to computer.
Edit these values and type the correct path of shell : Shell = explorer.exe Userinit=X:\windows\system32\userinit.exe NOTE: These files may also be deleted by spywares. You may need to extract them using Windows CD. Steps for rectifying this problem:
•
Log on to a networked computer.
•
Run Regedit.exe
•
Point your cursor to HKEY_LOCAL_MACHINE
•
Select File > Connect Remote Registry
•
Type computer name (infected computer)
•
Navigate to the following location in registry of destination or infected computer HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
•
Edit these two values in right pane: Shell Userinit
•
Change these two values to Shell=explorer.exe Userinit = x:\windows\system32\userinit.exe
•
Exit from Registry
•
Restart Infected computer.
•
You should be able to log on to computer.
Subscribe to:
Posts (Atom)