The Microsoft Works 6-9 converter allows Microsoft Word users to open, save, edit Microsoft Works (.wps) files. Previously, when you installed the converter on Windows 7 and tried to open the file in Word, it would say that the converter needs upgraded and wouldn’t work. If you “upgraded” the same thing would happen, in a loop. Well it seems that Microsoft finally fixed the Converter so that it opens .wps file in Word without giving the error.
More information: http://www.microsoft.com/en-us/download/details.aspx?id=12
Direct download link: http://www.microsoft.com/en-us/download/confirmation.aspx?id=12
There are two scheduled maintenance tasks that run to remove both broken and unused shortcuts on the desktop when there are more than 4 detected. This unfortunately deletes shortcuts where they are not broken, just temporarily unavailable, such as on Remote Sites. The default run time is weekly at 1:00AM.
Go to http://support.microsoft.com/kb/2642357
and run the “FixIt myself” sections until MS fixes the FixIts. The FixIt’s on the page don’t work due to this: “Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the “Applies to” section.”
This is how to perform the fixes manually:
You need to run REGEDIT as an admin.
1. Locate and then click the following registry subkey:
2. On the Edit menu, point to New, and then click DWORD Value.
3. Type IsBrokenShortcutsTSEnabled, and then press ENTER.
4. Right-click IsBrokenShortcutsTSEnabled, and then click Modify.
5. In the Value data box, type 0, and then click OK.
6. Locate and then click the following registry subkey:
7. On the Edit menu, point to New, and then click DWORD Value.
8. Type IsUnusedDesktopIconsTSEnabled, and then press ENTER.
9. Right-click IsUnusedDesktopIconsTSEnabled, and then click Modify.
10. In the Value data box, type 0, and then click OK.
11. Exit Registry Editor.
It will not delete the shortcuts any more!
It seems that the majority of the corporate and personal computer issues these days are coming from fake Antivirus programs that pose as legitimate programs, even faking the Windows Security Center. These programs seem to load even if antimalware programs are installed. Fortunately, our computers have user accounts in user account mode, therefore limiting the virus’s destructive potential.
For the most part, running an updated antimalware scanner such as MalwareBytes AntiMalware, ESET’s online scanner or VIPRE’s rescue scanner can find most if not all of the virus and destroy it. If you can log in as another user (an admin), browse to the user’s application data folder, usually “C:\Documents and Settings\[username]\Local Settings\Application Data” in Windows XP and prior and “C:\Users\[username]\AppData” (check all 3 folders inside) for Vista and Windows 7. The virus usually installs to this root location and may make some copies of itself in this location. Just delete any strange EXE files you find in here, they will probably all have the same recent date/time. The above scanners may also be able to handle this.
When you eradicate many of the fake Antivirus programs they often remove the EXE file association (because they had taken it over to launch the virus every time you tried to launch an application). This can be remedied by downloading the EXE fix from this website: http://www.dougknox.com/xp/file_assoc.htm
You can usually at least launch Internet Explorer when the EXE’s are not assigned to any program. If not, follow the instructions below or on the site to open RegEdit and then import the file downloaded from the site.
“If your EXE file associations are corrupted, it can be difficult to open REGEDIT, or to even import REG files. To work around this, press CTRL-ALT-DEL and open Task Manager. Once there, click File, then hold down the CTRL key and click New Task (Run). This will open a Command Prompt window. Enter REGEDIT.EXE and press Enter.
Thanks to Nigel Andrews for this tip.”
There are also multiple Microsoft FixIt sites or others with similar EXE registry edits and fixing solutions like this: http://support.microsoft.com/kb/837334 .
Hopefully this will help you with your infection. I have found that prevention is the best medicine and having users browse with Mozilla Firefox and Adblock Plus add-in completely resolves these fake antivirus issues.
“Folder In Use. The action can’t be completed because the folder or a file in it is open in another program”. Temporary impossibility to copy – move – rename, etc. *media files* in Windows 7.
This error seems to occur when quickly editing a file and then trying to use it again. There are numerous programs (including Windows) that index files constantly on your PC and this may be causing the lock. There is a program called Unlocker that will unlock files similar to the solution below. It just seems that this problem occurs mainly with Windows 7, especially when browsing across the network.
Choose any other media file and press “copy”. No need to paste anywhere. The file which was initially locked is now unlocked and can be copied, moved, renamed, etc.
In Windows 7, the notification area networking icon will show an error indicator if there is no internet access , and the error icon goes away once there is a successful connection to the internet . Sometimes, if the WiFi connection requires an in-browser authentication step, like on many guest networks in hotels or universities, then the following pop-up bubble appears, saying as much:
How does Windows know whether or not it has a successful internet connection?
Presumably it is checking some online Microsoft service to see whether it has a successful connection, gets redirected to some other page, or doesn’t get any response at all, but I haven’t seen anywhere that this process or the services used are documented. Can anybody explain how this works? I would prefer answers that refer to facts, rather than just guessing, but if you have a really good guess, then go for it.
After some digging (the sheer number of network and Internet related services in Windows is astonishing), I think I found it: Windows Vista and 7 have a variety of Network Awareness features, one of which is the Network Connectivity Status Indicator that performs connectivity tests that in turn are used by the network systray icon. The test for internet connectivity is simple: NCSI tries to load a specific page via HTTP (more precisely: a text document) and tests whether it can be retrieved. If that is not successful, Windows detects “No Internet access”. The mechanism also checks whether the domain the document is hosted on resolves to the correct (i.e. expected) IP address, so it might also assume proper internet access if this test is successful, but the document can’t be retrieved.
The reason it reports “No Internet Access” when you haven’t authenticated on a Hotspot yet lies in the way a Hotspot works: It blocks all ports besides 80 and 443 (for HTTP and HTTPS, respectively), which get redirected to the Hotspot’s authentication server and might mess with DNS requests in one way or another. Thus, NCSI can neither resolve the domain its test file is hosted on and even if it could, it wouldn’t reach the actual file because HTTP traffic is redirected to the Authentication server.
The following list describes how NCSI might communicate with a Web site to determine whether a network has Internet connectivity:
- A request for DNS name resolution of
- A HTTP request for
http://www.msftncsi.com/ncsi.txt returning 200 OK and the text
This can be disabled with a registry setting. If you set
0, Windows will no longer probe for internet connectivity.
Apple does something very similar in iOS to detect internet connectivity and possible hotel “login” wifi pages, etc.
SARTA IT: Using your own server for verification is also possible if you don’t like pinging Microsoft everytime you start your PC.
We purchased a Dell laptop from the Dell outlet store online (a great place for deals) and it came with a very bare system image. No Dell applications were pre-installed and the Windows Updates were unable to connect because it said Windows Updates were Managed by your System Administrator. This is what is says when you use a WSUS server on a domain and this was a laptop not connected to a domain so something at the factory was messed up with the image. This is the solution to put it back to normal:
Original post on this blog:
The other day, I encountered a bizarre issue when performing a routine setup on a refurbished (read: practically brand new) Dell Studio laptop. The problem manifested itself when Windows Update was run; rather than successfully connect to the Windows Update server and download updates information, the client would return an error:
|Error Code 0x80072EE2
You receive updates: Managed by your system administrator
This sort of behavior is expected if your PC is set to receive Windows Updates via the WSUS service; in other words, not from the standard Windows Updates servers. But this computer was all-new (a new Windows install) and had never had a group policy set related to this (at least, it wasn’t supposed to have had it set)!
None of the usual Windows Update repair tools corrected the problem. Luckily, however, after a bit of research and experimentation, I devised a solution. Please note that this solution should not be performed if your computer uses a Group Policy for Windows Update:
- Open RegEdit and navigate to HKLM\Software\Policies\Microsoft\ Windows\WindowsUpdate
- Remove any and all values within this key. Most likely, the culprit is a faulty Windows Update source server. Sometimes this is the result of a latent or previous infection.
- Finally, download and run Microsoft FixIt 50202. Try the Default settings first, and if that does not work, try Aggressive.
- Reboot the computer and check to see that Windows Update is working properly.
An annoying issue to be sure, but at least this solution works! Please let me know if this solution has helped you.
Born a technician, though always willing to learn and improve. 🙂
Managing Editor, DigitalChumps.com
Owner/Sole Proprieter, Triple-S Computers in Louisville, KY