Question about Operating Systems

1 Answer

I want to change the content of data reporter during execution time but i dont know how so i need your help

Posted by on

  • kazzu Mar 04, 2009

    Cannot open Lexulous game  - it says I need to change the TCP Ports 24000-24100


    I use a Mac OS X Version 10.4.11


    HELP?

×

1 Answer

  • Level 2:

    An expert who has achieved level 2 by getting 100 points

    MVP:

    An expert that got 5 achievements.

    Governor:

    An expert whose answer got voted for 20 times.

    Hot-Shot:

    An expert who has answered 20 questions.

  • Expert
  • 52 Answers

The content of the error reporting cannot be changed and it contains information related to the errors which occur.to report your error visit the microsoft official website and contact them through customer care.

Posted on Jan 03, 2009

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

IJUST WANT TO VIEW MY EMAILS AS THEY APPAER


Windows 7 Offline Privacy Statement for the Microsoft Error Reporting Service
For the most up-to-date privacy information, see the online Windows 7 Privacy Statement at:
http://go.microsoft.com/fwlink/?LinkId=104288
WHAT THIS FEATURE DOES
The Microsoft Error Reporting Service helps Microsoft and Microsoft partners diagnose problems in the software you use and provide solutions. Not all problems have solutions, but when solutions are available, they are offered as steps to solve a problem you've reported or as updates to install. To help prevent problems and make software more reliable, some solutions are also included in service packs and future versions of the software.
The Microsoft Error Reporting Service also provides Setup Repair, an error reporting service that may run during Windows setup if a problem occurs.
INFORMATION COLLECTED, PROCESSED, OR TRANSMITTED
Many Microsoft software programs, including Windows 7, are designed to work with the reporting service. If a problem occurs in one of these software programs, you might be asked if you want to report it. If you host virtual machines using a Windows operating system, reports generated by the Windows operating system for the Microsoft Error Reporting Service might include information about virtual machines.
The reporting service collects information that is useful for diagnosing and solving the problem that has occurred, such as:
* Where the problem happened in the software or hardware
* The type or severity of the problem
* Files that help describe the problem
* Basic software and hardware information
* Possible software performance and compatibility problems
These reports might unintentionally contain personal information. For example, a report that contains a snapshot of computer memory might include your name, part of a document you were working on, or data that you recently submitted to a website. If a report is likely to contain this type of information, Windows will ask if you want to send this information, even if you have enabled automatic reporting through the "Recommended settings" option in setup, or Control Panel. This gives you the opportunity to review the report before sending it to Microsoft. Reports including files and data might be stored on your computer until you have an opportunity to review and send them, or after they have been sent.
If an error report contains personal information, Microsoft does not use the information to identify you or contact you. In addition, if you enable automatic reporting through the "Recommended settings" option in setup, or in Control Panel, the reporting service will send basic information about where problems occur automatically, but these reports will not have the detail described above.
After you send a report, the reporting service might ask you for more information about the error you experienced. If you choose to provide your phone number or e-mail address in this information, your error report will be personally identifiable. Microsoft might contact you to request additional information to help solve the problem you reported.
The Microsoft Error Reporting Service generates a globally unique identifier (GUID) that is stored on your computer and sent with error reports to uniquely identify your computer. The GUID is a randomly generated number; it does not contain any personal information and is not used to identify you. We use the GUID to distinguish how widespread the feedback we receive is and how to prioritize it. For example, the GUID allows Microsoft to distinguish between one customer experiencing a problem one hundred times and one hundred customers experiencing the same problem once.
USE OF INFORMATION
Microsoft uses information about errors and problems to improve Microsoft products and services as well as third-party software and hardware designed for use with these products and services. Microsoft employees, contractors, vendors, and partners might be provided access to information collected by the reporting services. However, they will use the information only to repair or improve Microsoft products and services and third-party software and hardware designed for use with Microsoft products and services.
Microsoft might share aggregate information about errors and problems. Microsoft uses aggregate information for statistical analysis. Aggregate information does not contain specific information from individual reports, nor does it include any personal or confidential information that might have been collected from a report.
Except as described in this statement, personal information you provide will not be transferred to third parties without your consent. We occasionally hire other companies to provide limited services on our behalf, such as performing statistical analysis. We will only provide those companies the personal information they need to deliver the service, and they are prohibited from using that information for any other purpose.
Microsoft may access or disclose information about you, including the content of your communications, in order to: (a) comply with the law or respond to lawful requests or legal process; (b) protect the rights or property of Microsoft or our customers, including the enforcement of our agreements or policies governing your use of the software; or (c) act on a good faith belief that such access or disclosure is necessary to protect the personal safety of Microsoft employees, customers, or the public.
Information collected by or sent to Microsoft by Windows 7 may be stored and processed in the United States or any other country in which Microsoft or its affiliates, subsidiaries, or service providers maintain facilities. Microsoft abides by the safe harbor framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of data from the European Union.
CHOICE AND CONTROL
If you choose the recommended settings during Windows 7 setup, basic information about errors will be sent automatically to Microsoft. If a more detailed error report is required, you will be prompted to review it before it is sent. You can change this setting at any time by going to Action Center in Control Panel.
SECURITY PRACTICES
Microsoft is committed to helping protect the security of your information. We use a variety of security technologies and procedures to help protect your information from unauthorized access, use, or disclosure. For example, we store the information you provide on computer systems with limited access, which are located in controlled facilities.
FOR MORE INFORMATION
If you have questions about this privacy statement, please contact us by submitting your questions online to Privacy Feedback at:
http://go.microsoft.com/?LinkID=9634754
Windows 7 Offline Privacy Statement for the Microsoft Error Reporting Service
c/o Microsoft Privacy Response Center
Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052 USA

Jul 30, 2013 | Operating Systems

Tip

How to Reduce Spreading of Virus on the Hard Drive


<b><u>An insight in VIRUS INFECTION and VIRUS SPREADING</u></b><br /> <br /> In today's computing spreading of virus is fast and very common.<br /> Even with an up to dated antivirus software the spreading of the virus infection is fast.<br /> This is because, we are not aware of how the virus spreads in our system.<br /> Once we know how the virus infects and spreads in our system then we will definitely reduce the risk, time and money spent.<br /> <br /> <b><u>Here is a short insight about viruses:</u></b><br /> <br /> 1) Virus is a small program code enabling it to to mingle or merge with other program codes.<br /> <br /> 2) The Virus Program Code is written such that it deletes data, corrupts data, steals data send it to the maker of the code, etc.<br /> <br /> 3) The virus cannot run on its own. It has to be executed just like other exe program files. That is why the autorun.inf file is required.<br /> <br /> <b><u>Now for an insight how we get infected:</u></b><br /> <br /> 1) Thorugh the internet: Usually when we browse any web site files are downloaded from the web server to our temporary internet folder(in windows) Then our Browser software reads the files and executes them in the browser window for us to view the web site.( If you are a website Designer you would understand this for others get an insight how internet browsers work), So when we are in the internet Virus files attach themself to the downloading files and enter our system in the temporary folder, From here they are executed by our browser software or when any program accesses the temporary folder.<br /> <br /> 2) Another one is we download a lot of data from the internet, we should be careful on what we are downloading because if the data downloaded is infected with virus then we are downloading the virus to our system along with the data, Don't download the data unless you are sure you could trust the maker of the data, program,etc.<br /> <br /> 3) From other medias like Flash Drive, CD's, DVD,s,etc.:<br /> We copy a lot of data to our computer from our friends and relatives, so if the data is already infected with virus we copy the virus to our system also, when we run os use the data the virus is executed along with it.<br /> <br /> <b><u>Now for an insight how Virus Spreads:</u></b><br /> <b></b> <br /> Just like any other program code the virus code has to be executed.<br /> That is why the virus merges with other exe's which are executable and not with the data file.<br /> <br /> For eg: a file with .avi, .dat, .3gp, etc. all these files are data files they dont execute, but they are used by exe files like wmplayer.exe, winamp.exe, vlplayer.exe, etc. The .avi .dat .3gp files are data files, the wmplayer.exe, winamp.exe vlplayer.exe are program files. Thus mostly exe program file get infected with virus.<br /> <br /> Usually when our system gets infected and any antivirus program cleans our system you can notice that the windows media player or winamp player or vlc media player does'nt work because it is removed or deleted by the antivirus for virus infection but the songs or video you saved is unharmed in the harddisk.<br /> <br /> That is why the virus code hangs or merges or infects mostly exe program files, So that it is executed along with the program file.<br /> <br /> So when you run an infected windows media player to play a song the virus code is also run along with the windows media player. Thus the virus is run again and again.<br /> <br /> There are hundreds of program files in the os for doing various tasks.<br /> we are going to look into just one program which the virus uses to spread itself in our system.<br /> <br /> The Program is non other than explorer.exe in windows. This program is needed to view or browse the data files stored in the hard disk.<br /> When we double click the My Computer Icon on the desktop the explorer.exe is executed which show you a window on your screen with the hard disk drives and cd dvd drives in the windows Now you can imagine how frequently you use the explorer.exe. You use it to view any data on the computer, even our desktop uses explorer.exe. This program is executed right when windows logs us on.<br /> <br /> When this program file is infected, it keeps on executing the virus each time we use the program. by this method the virus spreads fast to every parts of the hard disk.<br /> <br /> Likely there is a method to avoid executing the virus along with the explorer.exe each time we use it.<br /> <br /> When we double click any icon or object on our windows screen we execute the default command in the right click menu. Usually it is the Run Command. for eg: when you double click word the word.exe runs, similarly when we double click the my computer icon the default right menu option is <b>Open</b> which run the explorer.exe program.<br /> <br /> Instead of using this method to view files and data in our system we could use an alternate method which is using the explorer menu option when we right click my computer or right click the windows start button or in fact the explorer option is there whenever you right click any object on the screen.<br /> <br /> By using this explorer option in the right click you get a window with two panes one to the left and one to the right. In the left pane you have the directory structure showing all the directories and folders in our hard disk and in the right pane the content of the directory or folder selected in the left pane.<br /> <br /> Thus in this process we dont execute any code or program command when viewing the data in our hard disk. because we do not execute the explorer.exe more than once.<br /> <br /> So, Imagine how we reduce the spreading of virus by using this method.<br /> <br /> Say you have a file saved in your hard disk in this location<br /> <br /> <b>C:\data\monday\20-11-2010\office\media\todaysjob.doc</b><br /> <br /> If you want to open the file with word we will double click my computer, then double click C Drive, then Double Click data folder,then double click monday folder, then double click 20-11-2010 folder, then double click till you come to the media folder then you double click the todaysjob.doc which will execute the word.exe program which reads the data in the todaysjob.doc file and displays the content as required. In this process see how many time you will execute the virus, You will run the virus Seven Times.<br /> <br /> In our Alternate method You will run the Explorer.exe only once, Then on you just navigate to the media folder then double click the todaysjob.doc file in the right panel. So you execute the virus only once. <br /> <br /> Hence you reduce the spreading of VIRUS to a great extend.<br /> <br /> Good Luck, If there are any mistake please bare with me, I am not a good writer. If you have any Question Keep Me Posted.

on Oct 21, 2010 | Microsoft Windows XP Professional

1 Answer

How to reactivate or reinstall the disk defragmenter?


Windows 7 Offline Privacy Statement for the Microsoft Error Reporting Service
For the most up-to-date privacy information, see the online Windows 7 Privacy Statement at:
http://go.microsoft.com/fwlink/?LinkId=104288
WHAT THIS FEATURE DOES
The Microsoft Error Reporting Service helps Microsoft and Microsoft partners diagnose problems in the software you use and provide solutions. Not all problems have solutions, but when solutions are available, they are offered as steps to solve a problem you've reported or as updates to install. To help prevent problems and make software more reliable, some solutions are also included in service packs and future versions of the software.
The Microsoft Error Reporting Service also provides Setup Repair, an error reporting service that may run during Windows setup if a problem occurs.
INFORMATION COLLECTED, PROCESSED, OR TRANSMITTED
Many Microsoft software programs, including Windows 7, are designed to work with the reporting service. If a problem occurs in one of these software programs, you might be asked if you want to report it. If you host virtual machines using a Windows operating system, reports generated by the Windows operating system for the Microsoft Error Reporting Service might include information about virtual machines.
The reporting service collects information that is useful for diagnosing and solving the problem that has occurred, such as:
* Where the problem happened in the software or hardware
* The type or severity of the problem
* Files that help describe the problem
* Basic software and hardware information
* Possible software performance and compatibility problems
These reports might unintentionally contain personal information. For example, a report that contains a snapshot of computer memory might include your name, part of a document you were working on, or data that you recently submitted to a website. If a report is likely to contain this type of information, Windows will ask if you want to send this information, even if you have enabled automatic reporting through the "Recommended settings" option in setup, or Control Panel. This gives you the opportunity to review the report before sending it to Microsoft. Reports including files and data might be stored on your computer until you have an opportunity to review and send them, or after they have been sent.
If an error report contains personal information, Microsoft does not use the information to identify you or contact you. In addition, if you enable automatic reporting through the "Recommended settings" option in setup, or in Control Panel, the reporting service will send basic information about where problems occur automatically, but these reports will not have the detail described above.
After you send a report, the reporting service might ask you for more information about the error you experienced. If you choose to provide your phone number or e-mail address in this information, your error report will be personally identifiable. Microsoft might contact you to request additional information to help solve the problem you reported.
The Microsoft Error Reporting Service generates a globally unique identifier (GUID) that is stored on your computer and sent with error reports to uniquely identify your computer. The GUID is a randomly generated number; it does not contain any personal information and is not used to identify you. We use the GUID to distinguish how widespread the feedback we receive is and how to prioritize it. For example, the GUID allows Microsoft to distinguish between one customer experiencing a problem one hundred times and one hundred customers experiencing the same problem once.
USE OF INFORMATION
Microsoft uses information about errors and problems to improve Microsoft products and services as well as third-party software and hardware designed for use with these products and services. Microsoft employees, contractors, vendors, and partners might be provided access to information collected by the reporting services. However, they will use the information only to repair or improve Microsoft products and services and third-party software and hardware designed for use with Microsoft products and services.
Microsoft might share aggregate information about errors and problems. Microsoft uses aggregate information for statistical analysis. Aggregate information does not contain specific information from individual reports, nor does it include any personal or confidential information that might have been collected from a report.
Except as described in this statement, personal information you provide will not be transferred to third parties without your consent. We occasionally hire other companies to provide limited services on our behalf, such as performing statistical analysis. We will only provide those companies the personal information they need to deliver the service, and they are prohibited from using that information for any other purpose.
Microsoft may access or disclose information about you, including the content of your communications, in order to: (a) comply with the law or respond to lawful requests or legal process; (b) protect the rights or property of Microsoft or our customers, including the enforcement of our agreements or policies governing your use of the software; or (c) act on a good faith belief that such access or disclosure is necessary to protect the personal safety of Microsoft employees, customers, or the public.
Information collected by or sent to Microsoft by Windows 7 may be stored and processed in the United States or any other country in which Microsoft or its affiliates, subsidiaries, or service providers maintain facilities. Microsoft abides by the safe harbor framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of data from the European Union.
CHOICE AND CONTROL
If you choose the recommended settings during Windows 7 setup, basic information about errors will be sent automatically to Microsoft. If a more detailed error report is required, you will be prompted to review it before it is sent. You can change this setting at any time by going to Action Center in Control Panel.
SECURITY PRACTICES
Microsoft is committed to helping protect the security of your information. We use a variety of security technologies and procedures to help protect your information from unauthorized access, use, or disclosure. For example, we store the information you provide on computer systems with limited access, which are located in controlled facilities.
FOR MORE INFORMATION
If you have questions about this privacy statement, please contact us by submitting your questions online to Privacy Feedback at:
http://go.microsoft.com/?LinkID=9634754
Windows 7 Offline Privacy Statement for the Microsoft Error Reporting Service
c/o Microsoft Privacy Response Center
Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052 USA

Jul 30, 2013 | Microsoft Windows 7 Home Premium 64BIT...

1 Answer

My screen appear you are a victim of software counterfeiting how to erase this or resolve it thank u


Hi,
Start Windows Registry editor and delete the folder "WGALOGON" located in the following location:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\WinlogonNotify. Delete all references in your registry to WgaTray.exe

Another alternative suggest that three files are installed Windows XP System Folder:

\WINDOWS\system32\WgaLogon.dll
\WINDOWS\system32\WgaTray.exe
\WINDOWS\system32\LegitCheckControl.dl...

The wgatray.exe process makes the check for genuine windows software. You can disable WGA by removing the execute bit on WgaLogon.dll. That way, winlogon can't call it as a notification package at boot, and since WgaLogon is responsible for running and maintaining WgaTray.exe, no more tray popups either.

To change the execute bit of WgaLogon.dll, first turn off Simple File Sharing. Now right click the file in Windows Explorer and open the Security Tab. Hit the Advanced button, uncheck the Inherit box at the bottom, hit the Copy button, then hit OK. Go through each listed user/group and remove the "Read & Execute" permission for that file, leaving the "Read" permission as-is.

Hit OK to apply the permission changes and close the file properties dialog. Restart the machine. You can now turn "Use simple file sharing" back on, if you want.

A third alternative posted on the internet suggest that users clear the content of file data.dat located in the following directory:
C:\Documents and Settings\All Users\Application Data\Windows Genuine Advantage\data

Save the data.dat empty file and change the attributes to "Read Only" - Restart you computer. Or start your PC in Safe Mode and delete the following files from Windows system32 folder - wgalogon.dll spmgs.dll wgatray.exe The WGA setup file is in C:\WINDOWS\SoftwareDistribution\ Download\6c4788c9549d437e76e1773a7639582...

If you don't use "Fast User Switching", you can disable the Windows XP Welcome Screen if you are logged in as an Administrator. This will remove the initial WGA Warning Screen:

1. Click on Start -> Control Panel ->User Accounts
2. Click on "Change the way users log on or off"
3. Uncheck "Use the Welcome Screen" - Choose Apply
4. Close the User Accounts window and the Control Panel
5. The next time you reboot your computer, the classic login prompt will be used

To enable Fast User Switching, you must also enable the Use the Welcome screen option. Also, Fast User Switching cannot be used when Offline Files are enabled.

Disable wgatray.exe - Some users are claiming that removing the WGATray.exe (or killing the WGATray.exe process) are working for them. Here's how to search for WGATray.exe file - Screenshot

None of these methods are guaranteed to work and people are just experimenting. Meanwhile Microsoft is not willing to relent to crackers this time and are planning to release an update of WGADiag2.exe utility in the next few days.

WGADiag2 will also fix the problem with registry key permissions may cause the installation of Windows Genuine Advantage Notifications KB905474 to fail from Windows Update:

Here's a manual fix provided by Microsoft. These permissions can be repaired using Registry Editor as follows:

1. Click Start, and then click Run
2. In the Open box, type regedit, and then click OK
3. Expand HKEY_CLASSES_ROOT
4. Locate the subkey HKEY_CLASSES_ROOT\LegitCheckControl.Legi...
5. Right-click the subkey and select Permissions....
6. Ensure that Administrators allowed Full Control permission
7. Repeat steps 3-6 for the subkey
HKEY_CLASSES_ROOT\LegitCheckControl.Le...

Microsoft has also published a kB article if the Windows Genuine Advantage (WGA) validation check process does not validate successfully on a Microsoft Windows XP-based computer, and you receive one or both of the following error messages:

Product Key Inaccessible 0x80080212

This problem occurs when you do not have the appropriate permissions for the Windows Genuine Advantage\Data folder. In the Permissions for Users section, make sure that Read & Execute, List Folder Contents and Read permissions are given. If the previous steps fail, start the computer in Safe Mode and rename the %allusersprofile%\Application Data\Windows Genuine Advantage directory.

May 20, 2011 | Operating Systems

1 Answer

The application failed to initialize properly (0xc0000005). click on ok to terminate the application


"An application error has occurred and an application error log is being generated. Exception: access violation (0xC0000005), Address"

The error 0xC0000005 is generated by an illegal "memory access violation". This can be caused by anything from faulty RAM, an incorrect/corrupt device driver, poorly written/updated software and more commonly under Windows XP Service pack 2, malware/adware installations.

Usually you get this error message when performing a specific task, and if that happens you need to check the corresponding 3rd party's website/support department to see if they are aware of the problem

..a while back Symantec Antivirus caused the 0xC0000005 error with an additional message about a file called SAVRT.SYS . A simple software update to the Symantec Antivirus cured the problem.

So what can you do...? well below are a couple of suggestions:



0xC0000005 - Resolution Suggestion One:

In many cases this error has been generated by faulty RAM memory. So if you have just upgraded your computer with some new memory and you started getting this error then I would remove them and see if the error goes away. If it does then send the memory back and get a refund!


0xC0000005 - Resolution Suggestion Two:

In Windows XP Service Pack 2 Microsoft introduced Data execution prevention (DEP), a set of hardware and software technologies that perform additional checks on memory to help protect against malicious code exploits. In Windows XP SP2, DEP is enforced by both hardware and software.

Some software/application behaviours are incompatible with DEP - data execution prevention. Applications which perform dynamic code generation (such as Just-In-Time code generation) and that do not explicitly mark generated code with Execute permission might have compatibility issues with data execution prevention. Applications which are not built with SafeSEH must have their exception handlers located in executable memory regions.

Applications that attempt to violate DEP will receive an exception with status code STATUS_ACCESS_VIOLATION (0xC0000005).

If an application requires executable memory, it must explicitly set this attribute on the appropriate memory by specifying PAGE_EXECUTE, PAGE_EXECUTE_READ, PAGE_EXECUTE_READWRITE or PAGE_EXECUTE_WRITECOPY in the memory protection argument of the Virtual* memory allocation functions.

If you are having issues with 0xC0000005 errors in DEP and a particular piece of software is causing the offence, contact the vendor for a resolution...

Note: It is possible to "Turn Off" DEP in the boot.ini file but this really would be a last step!

/NOEXECUTE

This option is only available on 32-bit versions of Windows when running on processors supporting no-execute protection. It enables no-execute protection (also known as Data Execution Protection - DEP), which results in the Memory Manager marking pages containing data as no-execute so that they cannot be executed as code. This can be useful for preventing malicious code from exploiting buffer overflow bugs with unexpected program input in order to execute arbitrary code. No-execute protection is always enabled on 64-bit versions of Windows on processors that support no-execute protection.

There are several options you can specify with this switch:

/NOEXECUTE=OPTIN Enables DEP for core system images and those specified in the DEP configuration dialog.

/NOEXECUTE=OPTOUT Enables DEP for all images except those specified in the DEP configuration dialog.

/NOEXECUTE=ALWAYSON Enables DEP on all images.

/NOEXECUTE=ALWAYSOFF Disables DEP. (This setting doesn't provide any DEP coverage for any part of the system, regardless of hardware DEP support. The processor doesn't run in Physical Address Extension (PAE) mode unless the /PAE option is present in the boot.ini file.)

You can read more about DEP at:

http://www.updatexp.com/data-execution-prevention.html



0xC0000005 - Resolution Suggestion Three:

I have also seen this error in the gaming community when folks have updated drivers for their graphics card. If this happens just roll back your drivers and then "Google" to see if their are any other folks reporting this issue. Also keep an eye on the vendors website to see if they have an update/patch available or coming soon.



0xC0000005 - Resolution Suggestion Four:

Microsoft Internet Explorer 6.0 stops responding when you try to open an HTML document or a Web page. Additionally, you receive the following error message:
Access Violation (0xC0000005 exception)

CAUSE:

This problem may occur when you use Internet Explorer 6.0 to open an HTML document or a Web page that contains SPAN tags. If a SPAN tag is not closed correctly by using the tag, an access violation may occur.

Mar 03, 2011 | Operating Systems

1 Answer

WHAT IS REENTRANT KERNEL?


A reentrant kernel enables processes to give away the CPU while in kernel mode, not hindering other processes from entering kernel modes.

If the kernel is not reentrant, a process can only be suspended while it is in user mode(to be more precise, it could also suspend the process in kernel mode, but would block kernel mode execution on all other processes).
The reason for this is that all kernel threads share the same memory and corruption would occur if execution would jump between them arbitrarily.

That is, if the kernel is reentrant, several processes may be executed in the kernel mode at the same time when the process is suspended.

A typical use case is I/O wait.
The process wants to read a file.
>>When the kernel is not reentrant :
It calls a kernel function for this to stop the inside the kernel function. Disk controller is asked for the data. Getting the data will take some time and the function will block during that time.

With reentrant kernel,the scheduler will assign the CPU another process until the interrupt from the disk controller indicates that the data is available and our thread can be resumed.

Hence with this concept, throughput of the system increases rapidly.

A kernel that is not entrant needs to use a lock to makee sure that no two processes are executing in kernel mode at the same time.

:))

Oct 14, 2010 | Operating Systems

1 Answer

When i install,bluetooth setup in my desktop that time a information came like cyclic redundancy check problem.


Cyclic Redundancy Error comes when the source device like a computer calculates data and add the size of the information and sends it to the destination device. The destination device sees the size of the information and recalculate the size of the information and compare the two if they do not match the cyclic redundancy problem is reported because the information data has gone corrupt during the transit from the source to destination device. It can be a wrong configuration or packet collision. If it is due to packet collision the error can be over come by resending data multiple times.

Sep 11, 2010 | Operating Systems

1 Answer

Hi, I want to install the system on my pc from an image of a dvd because my pc don't have a dvd-rom, but I don't know how to explore the image. Thank you.


you can use a software called power iso which enables you to explore images contents use the tool to mount image as cd or extract the contents and giv a new installation of xp or upgrade(repair xp)
>>note do not mount and install os because at boot time mount wont be available so extract contents and execute it

Apr 10, 2010 | Microsoft Windows XP Home Edition

2 Answers

Dont send error


Hii

You can follow the steps inorder to hide this error from popping up every time :-

RIght click on MY COMPUTER icon > PROPERTIES > ADVANCED tab > ERROR REPORTING (on lower right of the properties window) > Select DISABLE ERROR REPORTING.

Regards and hope it helps u.

CHEERS

Sep 07, 2009 | Microsoft Windows XP Professional

Not finding what you are looking for?
Operating Systems Logo

Related Topics:

57 people viewed this question

Ask a Question

Usually answered in minutes!

Top Operating Systems Experts

Les Dickinson
Les Dickinson

Level 3 Expert

18299 Answers

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

Prashant  Sharma
Prashant Sharma

Level 3 Expert

1127 Answers

Are you an Operating System Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...