Question about PC Desktops

1 Answer

Windows host process(rundII32)has stopped working.

Every time I start my computer or if I try and access certain areas such as the security centre,change screen resolution or even change desktop icons the above message is displayed.A message appears saying windows is looking for a solution but it never appears! It does not appear to affect the general running of the computer,but I am a bit concerned I might have a serious gremlin in the system.I have tried a system restore and have done several full system scans with Norton and System Mechanic and they both report the system is working properly!Have you any ideas because I"m stumped!

Posted by on

1 Answer

  • Level 2:

    An expert who has achieved level 2 by getting 100 points

    Hot-Shot:

    An expert who has answered 20 questions.

    Corporal:

    An expert that hasĀ over 10 points.

    Mayor:

    An expert whose answer gotĀ voted for 2 times.

  • Expert
  • 70 Answers

If you have the origial os xp system disk try doing a repair instal rundel is a windows system file but be careful to follow the on screen instructions or you could lose yor stuff and end up with a brand new inserlation

Posted on Jul 22, 2008

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

2 Answers

How to Disable Internet Access?


Disabling Firewall Access for Windows Programs
  1. Go to the Control Panel. Click the "Windows" key or the "Start" icon, then click on "Control Panel". ...
  2. Open the Security Center.
  3. Open Windows Firewall settings. Open the "Exceptions" tab. ...
  4. Open the program and try to access the Internet.
http://electronicshelponline.blogspot.com/
http://schematicscom.blogspot.com/
http://electrotechnician.blogspot.com/

Oct 18, 2016 | PC Desktops

Tip

Services You Can Disable


There are quite a few services you can disable from starting automatically.
This would be to speed up your boot time and free resources.
They are only suggestions so I suggestion you read the description of each one when you run Services
and that you turn them off one at a time.

Some possibilities are:
  • Alerter - Sends alert messages to specified users that are connected to the server computer.
  • Application Management - Allows software to tap directly into the Add/Remove Programs feature via the Windows Installer technology.
  • Background Intelligent Transfer Service - The Background Intelligent Transfer service is used by programs (such as Windows AutoUpdate) to download files by using spare bandwidth.
  • Clipbook - ClipBook permits you to cut and paste text and graphics over the network.
  • Error Reporting Service - Allows applications to send error reports to Microsoft in the event of an application fault.
  • Fast User Switching - Windows XP allows users to switch quickly between accounts, without requiring them to log off.
  • Help and Support - Allows the XP Built-in Help and Support Center to run.
  • IMAPI CD-Burning COM Service - You don't need this if you have other software to create CDs.
  • Indexing Service - Indexes contents and properties of files on local and remote computers; provides rapid access to files through flexible querying language.
  • IP SEC - Manages IP security policy and starts the ISAKMP/Oakley (IKE) and the IP security driver. If you are not on a domain, you likely don't need this running.
  • Messenger - Transmits net send and Alerter service messages between clients and servers. This is how a lot of pop-up windows start appearing on your desktop.
  • Net Logon - Supports pass-through authentication of account logon events for computers in a domain. If you are not on a domain, you don't need this running
  • Network DDE - Provides network transport and security for Dynamic Data Exchange (DDE) for programs running on the same computer or on different computers.
  • NT LM Security Support Provider - Provides security to remote procedure call (RPC) programs that use transports other than named pipes.
  • Performance Logs and Alerts - Collects performance data from local or remote computers based on preconfigured schedule parameters, then writes the data to a log or triggers an alert. If you don't need to monitor your performance logs, then you don't need this service.
  • Portable Media Serial Number - Retrieves the serial number of any portable music player connected to your computer
  • QOS RSVP - Provides network signaling and local traffic control setup functionality for QoS-aware programs and control applets.
  • Remote Desktop Help Session Manager - Manages and controls Remote Assistance. If you are not using Remote Desktop you don't need this service.
  • Remote Registry - Enables remote users to modify registry settings on this computer.
  • Routing & Remote Access - Offers routing services to businesses in local area and wide area network environments. Allows dial-in access.
  • Secondary Login - Enables starting processes under alternate credentials. This is what allows you to run an application as another user.
  • Smart Card - Manages access to smart cards read by this computer.
  • Smart Card Helper - Enables support for legacy non-plug and play smart-card readers used by this computer.
  • SSDP Discovery Service - Enables discovery of UPnP devices on your home network.
  • TCP/IP NetBIOS Helper - Enables support for NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution. This should not be needed in today's network environment.
  • Telnet - Enables a remote user to log on to this computer and run programs, and supports various TCP/IP Telnet clients.
  • Uninterruptible Power Supply Service - Manages an uninterruptible power supply (UPS) connected to the computer.
  • Universal Plug and Play Device Host - Provides support to host Universal Plug and Play devices
  • Upload Manager - Manages synchronous and asynchronous file transfers between clients and servers on the network.
  • Volume Shadow Copy Service - Manages and implements Volume Shadow Copies used for backup and other purposes.
  • Web Client - Enables Windows-based programs to create, access, and modify non-local files across the Internet.
  • Wireless Zero Configuration - Provides automatic configuration for the 802.11 adapters
  • WMI Performance Adapter - Provides performance library information from WMI HiPerf providers.

on Sep 20, 2010 | PC Desktops

Tip

Internet Security--The Hosts File--


The hosts file can play an important role in your internet security should you choose to use it. Many Windows users have no idea that this file exists, and wouldn't know what to do with it if they did know it exists.

Others have heard of it, and some may have even read an article like this one, explaining the crucial part it can play in securing your PC from accidentally browsing a malicious website, but have no idea how to do it themselves because it wasn't adequately explained to them.
i will attempt to do that now.

What is a host file?
The Hosts file contains addresses and web site names. This file starts when windows does, then Windows checks the Hosts file before it opens any web site, which enables it to stop any web site from loading, that is listed. This changes access back to the local (your) machine. Another feature of the HOSTS file is its ability to block other applications from connecting to the Internet, if they are added to the hosts file.

There is a Simple way to set up your hosts file to block the most well known, and some not so commonly known malicious websites.
The easiest method I know of, is to run SpyBot Search and Destroy.
Whether you want to keep it installed or not doesn't really matter, because once it changes the hosts file by adding the list of bad websites, your host file is pretty well up to date at that time. Though I would suggest updating it at least once a month.

You can also change or add to your hosts file by navigating to:

C:windowssystem32driversetc

You will see the hosts file with no extension there.
After all, the hosts file doesn't really need an extension since it is primarily a reference file. Editing the Hosts file is fairly easy since you only need notepad to open it. Remember to keep the lines you add just like the lines above it with the name of the website you want to block as the entry after the IP (internet protocol) address.

Example:

127.0.0.1 maliciouswebsite.org

This website is now officially redirected back to the address of 127.0.0.1, which is the address your computer considers Home, or your PC, rather than the IP associated with that websites name.

Now all you need to do is save and close.
If for some reason your file gets named hosts.txt, simply remove the .txt part by renaming it, and you're done.

Also remember that this file will not work unless it is located in the C:windowssystem32driversetc folder.

That's my tip for today!

Happy Cruising!

Please Vote for this Tip if you found it helpful.
Bob S.

on Mar 19, 2010 | PC Desktops

1 Answer

To Block the Access to certain links


yes. using a simple text editor like notepad simply add entries to the file:
c:\windows\system32\drivers\etc\hosts

the entries should look like this:
127.0.0.1 www.siteiwantblocked.com
that IP address is the "localhost" and will result in and error or if the computer is running a web server it will go to that site.

Nov 25, 2013 | MPC Computers PC Desktops

2 Answers

Hi! my comp is nfected with a trojan masquerading as a security tool. it keeps popping dlhost.exe is infected with virus DOS.Jeff.812 this worm is trying to send our credit card details using dlhost.exe...


First try this but be careful:
To remove Trojan, you must first stop any Trojan processes that are running in your computer's memory. To stop all Trojan processes, press CTRL+ALT+DELETE to open the Windows Task Manager. Click on the "Processes" tab, search for Trojan, then right-click it and select "End Process" key.

To delete Trojan registry keys, open the Windows Registry Editor by clicking on the Windows "Start" button and selecting "Run." Type "regedit" into the box and click "OK." Once the Registry Editor is open, search for the registry key "HKEY_LOCAL_MACHINE\Software\Trojan." Right-click this registry key and select "Delete."

Finally, to completely get rid of Trojan, you must manually remove other Trojan files. These Trojan files can be in the form of EXE, DLL, LSP, TOOLBAR, BROWSER HIJACK, and/or BROWSER PLUGIN. For example, Trojan might create a file like
%PROGRAM_FILES%\Trojan\Trojan.exe. Locate and remove these files.

OR

If you can pass to the Windows interface you can run a Trojan remover like this one Trojan Remover at cNET. If not do it manually, instructions HERE

If your OS is Windows go to this link by Microsoft Online Scanner
also this one is a good one from TenMicro HouseCall

Oct 03, 2010 | Intel PC Desktops

1 Answer

Computer Access Code


To create a new access code
  1. Go to the host PC whose access code you would like to change.
  2. Make sure that the GoToMyPC service is running (look for icon_white2.gif icon in the system tray).
  3. Right-click on the icon_white2.gif icon in the system tray and select Change Access Code.
  4. Click the Forgot it? link.
  5. Enter your email address and account Password.
  6. On the New Access Code dialog box, enter your new access code, confirm the new access code and click OK.
Note: You will need to be at the host PC to perform this function because you will not be able to log in to your host PC without knowing the Access Code for that PC.

Thats if you want to change the access code but if you are simply looking for your access code you need to get in touch with your group.
Code Access Security is a new concept brought in by the .NET framework. Code access security essentially involves granting permissions to an assembly. Code access security uses the location of assembly and other information about the identity of code as a primary factor in determining permissions to be granted to the assembly. This information about the identity of an assembly is called evidence.

Once loaded in runtime, the code starts executing in the restricted environment depending upon permissions granted to it. If the code is not trusted enough to run or runs but performs an action for which it has no permissions, then a security exception is thrown.
The code access security system means we can stop running of malicious code and also restrict the code to run in a restricted environment where we are sure that it won’t do any damage to the resources. Let us now see few cases where code access security becomes
crucial.

Suppose an organisation is working with some extremely important data, we would use a code access security system to state which code is allowed to access the database and which is not. Similarly if we run an application from a network drive and it tries to access the file on a local drive an exception must be thrown. This can be done using a code access security system.
It is important to know that code access security protects resources like local disk, network, user interface from malicious code. It is not a tool for protecting software from users.
Code access security works on the basis of Code Groups and Permissions.

Dec 05, 2008 | X2 Systemax NO OS AMD Desktop Computer -...

1 Answer

Windows Explorer sends continuously error messages


Turning off thumbnails will probably stop you getting that error

DO:
Open Control Panel > Folder Options > Always show Icons, Never Thumbnails

However, this isn't actually fixing the problem.

Do you have Nero installed by any chance?

If so try:
Open Computer > System Drive > Program files > Common Files > Ahead > DSfilter.
Rename "NeroVideoProc.ax" to "1NeroVideoProc.ax"
Also rename "NeVideo.ax" to "1NeVideo.ax"

And then reboot.

Nov 11, 2008 | PC Desktops

1 Answer

I have vista on my computer and when i try using windows movie maker i get a window which says windows host process(rundll32) has stoped working it then closes down movie maker. can you suggest a cure for...


Run.dll is father of all dlls which controls Control panel , Host application process and if it get corrupted better to reinstall or restore your system. If you know how to restore the dll you can do that way also but not sure the version of run.dll you are copying in to windows system32 files might match.

Secure all your wanted data before you try to do anything above I mean first you back your wanted files.

Thanks Hothawk

Jul 24, 2008 | PC Desktops

2 Answers

Windows host process(rundII32)has stopped working.Also I have lost my recycle bin and cannot retrieve it.I am running Vista Home Premium.


Greetings,

If you still can, go Control Panel & perform a System Restore.

Keep us posted and thank you for using our service.
FixYa for all your troubleshooting needs.

Jul 22, 2008 | PC Desktops

1 Answer

Windows host process rundll32 has stopped running in Vista System


OMG! there are tons of reasons NOT to use the geek squad. I get geek squad victims in my shop every week. This can probably be figured out remotely- but if it came from BB- I would just about BET it is norton, or spysweeper as the root of the problem, or perhaps an incompatable program on Vista. There might be a problem with the motherboard too- and checking on Dell's site to see if your unit is in warranty will yield a free tech support from thm if the service tag shows a valid warranty. If replacing Norton and spysweeper with a less problematic program like AVG FREE edition (which works a lot better and is FREE!) does not help- there are other cheaper local or nationwide helpers that can fix this remotely (like me)

Jun 21, 2008 | PC Desktops

Not finding what you are looking for?
PC Desktops Logo

Related Topics:

70 people viewed this question

Ask a Question

Usually answered in minutes!

Top PC Desktops Experts

joecoolvette
joecoolvette

Level 3 Expert

5660 Answers

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18299 Answers

Are you a PC Desktop Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...