internet access on all user accounts but one Results

Page 2 of 3.
Results 21...40 of 48

Sponsored Links:


I am trying to fix a problem with a machine on a small office network. There are about five machines on this network, all set to DHCP and all are members of the workgroup WORKGROUP.

One machine (RECPETIONIST) has some shares on it for all other machines to access. All machines except one can access the shares and files as necessary. Some other details:

Actual error message is: Logon Failure: Unknown username or bad password.

All machines are running Win7 Pro with updates.RECEPTIONIST has accounts on it that match all users.RECEPTIONIST has password protected sharing turned off. (Note: I have gone back and forth with this during my testing with no success).INVESTIGATOR has Network Discovery turned ON and can see RECEPTIONIST.INVESTIGATOR cannot see the shares that are available on RECEPTIONIST.I occasionally see a message that it is looking for credentials and then gives me a UN/PWD prompt from which I cannot find any machinename/username/password combination that will allow me to get to that machine.I have done extensive searching of the internet with no success. Dates are not an issue as all sync to a time server.One suggestion was to use nbtstat -r. This does not show RECPETIONIST in the list.Another suggestion included netsh interface IPV4 reset but that did not help at all.I can map the drive by IP address, but given that I am using DHCP, this is not a viable solution.

Any suggestions or questions that can help me get this machine working properly on the network? I'm close to just wiping the disk and starting over again on this machine. I'm sure I have left out some critical details. Let me know what else to tell you.



I have just installed the BT Voyager 2100 package of base
station, PCI card and laptop adaptor and both laptop and
PC connect with internet ok. Have enabled file sharing
between both and enabled sharing of the printer attached
to my PC. I can access the laptop from the PC but not
the otherway round When selecting network places on the
PC, it shows me all its own shared areas plus the shared
areas of the laptop. When I do the same on the laptop,
all I see is the shared laptop folders. When viewing
workgroup computers on the laptop, both PC and Laptop
appear but on trying to access the PC from the laptop,
the following message pops up:

PC is not accessible. You might not have permission to
use the network resource. Contact the administrator of
this server to find out if you have access
permissions. Logon failu the user has not been
granted the requested logon type at this computer".

I am running Zone Alarm Security Suite on both machines
and followed tips about ports and enabling guest account
earlier on thread but no joy. Also tried with both
firewalls down.I am the only user on both machines and
have administrator rights. I am running XP Pro on the PC
and XP Home on the laptop. Please advise before totally

" Computer is not accessible. You might not have
permission to use this network resource. Contact the
administrator of this server to find out if you have
access permissions."

There it is. Same message every time I try to access two
home network computers: FYI: I am the ADMINISTRATOR and,
yes, I have given myself permission to access these

Computer A- Desktop with Windows XP Pro SP1
Computer B- Desktop (new) with Windows XP Home SP1
Computer C- Notebook with XP Home SP1 and Wireless Card

Router Linksys WRT54G (Wireless) with 4 port wired hub.

All computers have different names, all belong to the
same workgroup, all users have different names. All have
IP's assigned by router, all have same subnet. All can be
pinged from any direction.

None have firewalls enabled on LAN connections, network
does not share Internet connection. All computers use
separate Dial Up.

All TCP/IP connections also use NetBios. All TCP/IP
connections have file and printer sharing and client for
Microsoft Networks enabled. All computers have computer
browsers and servers running. All have guest accounts:
ON. All have shared network directories.

Computers A & B can see and access Computer C, that's it.
A can see but not access B
B can see but not access A
C can see but not access either A or B.

Other than the wholly unnecessary complexity of setting
up simple file and printer sharing in a home network
using Windows XP;

What's the problem?

And how do I reactivate file sharing ports in the event
they have been closed by some malicious spyware program?

Thank you for any assistance you can render. I have been
trying to resolve this problem for days. An exercise in
futility if ever there was one.

I have the following odd situation:

2 XP machines – 1 Dell desktop (name: "Dell") with XP Home, 1 Sony
notebook with XP Pro

Connecting to internet over D-Link wireless ADSL router using DHCP &
NAT firewall – seems pretty solid. 64-bit encryption at the moment.

Printers are on the Dell

From the Sony, if I use (from "run") Dell (or Dellmy documents
etc) I can see all the Dell shared resources, access files & folders,
print etc. There's a Guest account on the Dell.

I can browse to the Dell as well, but it's very tedious.

Can't see the Sony from the Dell & have never been able to but that's
a non-problem so never tried to resolve it. There's no Guest account
set up on the Sony because our sysadmin set it up and won't allow

All fine so far.

Complication: the Sony has a VPN connection to the office network,
using the built-in XP facility. Works fine over the wifi/router/ADSL
link, never fails.

However, recently I have not been able to connect properly to the Dell
desktop from the Sony if I have connected the VPN. The odd thing is,
I used to be able to with no problem. I can connect to the Dell if the
VPN isn't running – it's just when it is. Can't print to it, see files
or folders, nothing.

If I type the usual dell in "run" I get a message that says

"dell is not accessible. You might not have permission to use this
network resource. Contact the administrator of this server to find out
if you have access permissions.

The user name could not be found"

Printing fails with an error message if I try to print while connected
to the VPN.

Disconnecting the VPN & trying again gets me back my connection to the

Weird bit: if I then reconnect to the VPN, I can access the Dell for
up to 10 minutes before it refuses me again, including printing.

Another weird bit: if I use the IP address instead of "Dell" (it's
usually I can access files & folders on the Dell
regardless of whether the VPN is connected. However, there's no way I
can print, even then.

The Dell is called Dell and belongs to WORKGROUP, the Sony is called
myname.ourcompany.local and belongs to a domain "ourcompany.local".
I'm not allowed to change this.

Up to then I could work just as well with the VPN as without. However,
the other day 2 unrelated problems happened, one on each machine that
necessitated remedial action. Since then I've had the problem. I've
reinstalled the network adapted (Linksys USB) on the Dell, & the VPN &
wireless networking on the Sony. No good. I've rolled both machines
back (using System restore) to well before the problem occurred. No
good, again. I've searched Google & tried all the changes I could see,
but couldn't find anyone in exactly the same boat as me.

Given that accessing the Dell via the IP address works, my main need
is to get it printing again while I'm still on the VPN – closing down
Outlook, logging off the VPN, printing whatever it is & then logging
back on is very long-winded for juast a one-page email.

I think the wireless network is OK, because apart from the VPN problem
everything works fine, talks to everything else etc. I think there
isn't a basic compatibility problem between the Dell & the Sony as
without the VPN they are fine together, at least for what I need to
do. And I know that it is possible to have them happily sharing over
the VPN because until a couple of days ago they had been doing just
that perfectly happily.

I've trawled through all the settings on the Dell & the Sony
(authentication, DNS, WINS, Netbios etc), & while some things have
made it worse nothing has made it better.

Sorry to be so long-winded, but I know that solutions are easier if
people give a fairly full description.

If anyone has got this far, thanks, and I'd appreciate any help you
can give.



This post is very long. Please read only if you are patient enough to help a
newbie. These questions mostly pertain to XP networking, and this seems the
best forum for networking. Referrals and suggestions are very welcome. Even
if you can answer just one or two of my many questions here, that will help
a lot. Just quote the text you are replying to so I know which question you
are answering. I get confused rather easily.

Before beginning the networking questions, in Belarc Advisor under
"Installed Microsoft Hotfixes," SP2 (KB811113) does not have a green
checkmark next to it (lacks the data to allow verification). Is that normal?
All updates after SP2 show up as SP3, and all of them do have green
checkmarks and are verified. Here is a synopsis.

Unmarked hotfixes lack the data to allow verification.
(C) marks a hotfix that verifies correctly.
(X) marks a hotfix that fails verification (failing hotfixes need to be

Installed Microsoft Hotfixes
S867460 on 3/8/2005 (details...)
M886903 on 3/8/2005 (details...)
Q832483 on 3/6/2005 (details...)
KB870669 (details...)
Internet Explorer 6
(C) KB867282-IE6SP1-20050127.163319 on 3/6/2005 (details...)
Internet Explorer
SP2 (SP2)
Outlook Express 6
(C) KB887797-OE6SP1-20041112.131144 on 3/6/2005 (details...)
Windows Media Player
(C) WM817787 (details...)
(C) Q828026 (details...)
Windows Media Player (continued)
(C) Q828026 on 3/6/2005 (details...)
Windows XP
KB811113[SP] on 3/8/2005 (details...)
(C) KB867282 on 3/8/2005 (details...)
(C) KB873333 on 3/8/2005 (details...)
(C) KB873339 on 3/8/2005 (details...)
(C) KB885250 on 3/8/2005 (details...)
(C) KB885835 on 3/8/2005 (details...)
(C) KB885836 on 3/8/2005 (details...)
(C) KB886185 on 3/8/2005 (details...)
(C) KB887472 on 3/8/2005 (details...)
(C) KB887742 on 3/8/2005 (details...)
(C) KB887797 on 3/12/2005 (details...)
(C) KB888113 on 3/8/2005 (details...)
(C) KB888240 on 3/13/2005 (details...)
(C) KB888302 on 3/8/2005 (details...)
(C) KB890047 on 3/8/2005 (details...)
(C) KB890175 on 3/8/2005 (details...)
(C) KB891781 on 3/8/2005 (details...)

In another area of Belarc, Local System accounts show "HelpAssistant" and
"SUPPORT_388945a0" as disabled accounts. Is that because I disabled Remote
Assistance and Remote Desktop in Control Panel - System - Remote? Could it
also be because I disabled Messenger from starting up with Windows?

Is this a good place to get help with what I need, or is there an online
forum for newbies you might recommend, because this could take a while. I
basically need instructions that an idiot could understand.

I will also need help determining which of the numerous Services that start
up in WinXP I need and which I do not. The MSCONFIG in XP sucks. I can't
maximize it, and there is hardly any information in either MSCONFIG or the
Task Manager under Services. Program names and paths are not mentioned, just
names of processes. How do they expect me to find anything? I need a good
third-party Startup Manager/Task Manager in one program that is not very
expensive. WinTasks Pro is too expensive. One option is the Ultimate
Troubleshooter, which is $25. I haven't it tried yet, but I am open to other
options. Their site has a list of Processes (Services). SysInfo has a list
of Startups. Spybot helps me to some extent with Startups but not Processes
or Services.



Some of those XP background processes might be what is causing my LAN to cut
out from time to time. When that happens I lose both Internet access and
network access. One of the network icons disappears from my taskbar. Other
times it doesn't, and when I click on it to "repair" it it freezes. When I
try to bring up "Network Connections" it freezes. A reboot brings everything
back to normal. Firewall, antivirus and antispyware are all up-to-date, full
system malware scans are run regularly, including online scans. I really
don't think malware is the problem. I think it's background processes in XP,
but I just don't know enough about them to mess with any of them. XP has
only been installed for a few days on both PCs. Both of us are new to it.

Please assistant with Network Setup and with Binding/Unbinding TCP/IP from
File and Printer Sharing for better security. I am the "network
administrator" of this home network but new to XP and not a techie or
certified expert. Many web sites and Microsoft articles about networking are
geared toward more advanced users, and I do not understand all that is in
them. Need step-by-step advice. Forgive me if too much information is below.
Better to have too much than not enough.

At present, only two XP Pro SP2 computers are connected, this one and one
other desktop. I do not know how to connect the Win95a and Win98se laptops
or if it is even possible since they use 16-bit PCMCIA to connect to the
ethernet hub. The XP network setup wizard does not support Win95. The old
laptops connected fine to the network when this computer and the other
desktop both used Windows Me.

With XP, it is all user-level rather than share-level access, and I don't
know how to configure Win9x for user-level access. Let's do that later after
we get things configured properly for the two XP machines. Also, I need to
password protect the shared folders, the access to each computer, and each
network printer. Can't see how to do that with XP. With 9x, it was easy to
password-protect a shared printer or a shared drive.

SBC Yahoo! DSL Technical Support and 2Wire Technical Support state that the
2Wire Home Portal 1000HW is both a DSL Modem and a Router. I do not know if
it is a gateway, but I suspect it is for three reasons: (1) Windows uses the
word "gateway" in the name for the connection, (2) Windows preselects the
"residential gateway" option in the network setup wizard, and (3) the 2wire
people say that I cannot connect a separate "residential gateway" to the

10BaseT Ethernet Network
One Workgroup, No Domain
4 Computers (only 3 can connect at a time)
This computer is the Network Administrator
This computer is XP Pro SP2 (3 local users)
DSL modem/router uses DNS/DHCP/NAT (functions as a gateway?)
DSL modem/router has a hardware firewall
DSL modem/router is wired to this PC by USB 2.0 (10Mbps)
DSL modem/router is wired to a 10BaseT 4-port ethernet hub (10Mbps)
Other computers connect to this PC and the Internet by ethernet hub
This computer has no cable directly to the hub (or there would be conflicts)
PCs CONNECTED: (1) XP Pro SP2 PC (same 3 local users)
PCs DISCONNECTED: (1) Win95a PC and (1) Win98se PC
INTERNET cONNECTION SHARING: Disabled (incompatible with DHCP modem/router)
WINDOWS FIREWALL: Off (because ZoneAlarm firewall is On)
THIRD-PARTY FIREWALL: On (Zone Alarm Pro 5.5)
IP ADDRESSES: Obtained automatically by DHCP
BINDINGS: Default settings (insecure)

** Is my current network peer-to-peer or client/server? **

Internet Protocol (TCP/IP)..............Properties available
Aegis Protocol (IEEE 802.1x) v2.3.1.9...Properties grayed out
NWLink IPX/SPX/NetBIOS Compatible Transport Protocol...Properties available
NWLink NetBIOS..........................Properties grayed out

All protocols were automatically installed and configured by Windows except
for IPX/SPX, which I added after reading that that protocol (or NetBEUI) is
the key to separating File and Printer Sharing from TCP/IP. I just don't
know how to do it. On the options for each network connection in XP, I see
nothing about bindings. In Win9x, the bindings options are easier to find.

1394 Net Adapter
2Wire Gateway USB
MAC Bridge Miniport (Network Bridge)
Realtek RTL8139/810x Family Fast Ethernet NIC (Disabled)
HSP56 Micromodem (COM3) (56k Dial-up Fax Modem)

- Realtek is disabled, nothing is plugged into my ethernet port. A Z65n
network printer will go there later to replace my existing Z42 parallel port
printer. We don't have a cartridge for the Z65n. That's the only reason
we're not using it.

- The Network Bridge connects 1394 and Realtek, so that the new Z65n
printer, once installed, will be available to the existing network.

- The 1394 Net Adapter is used with my network and/or the Internet, but I am
not exactly how or what it does. Windows automatically configured it. The
1394 sounds like firewire, but I don't have any firewire devices installed.
Firewire is enabled on the mainboard, but I'm not using it. Or am I using it
through this adapter? Is this just an internal connection needed for Windows
to set up the Internet and the network? Windows needs at least two adapters
for that, according to the XP Help and Support.

** Which adapter is the one that connects to the Internet, 1394 or 2Wire? **

** Which adapter should be used for File & Printer Sharing? **

Client for Microsoft Networks.....Properties available
File and Printer Sharing for Microsoft Networks...Properties grayed out
QoS Packet Scheduler..............Properties grayed out

Network Bridge................Connected, 400Mbps
LAN (Realtek Ethernet)........Disabled, Bridged (nothing plugged in there
LAN (2Wire Gateway USB) DSL...Connected, 10Mbps
Dial-up Connection............Disabled (backup connection method)
1394 Connection...............Connected, 400Mbps, Bridged

- The Realtek Ethernet NIC is disabled at my choice because nothing is
plugged into that port. Since I'm already connected to the network via USB
(or 1394), I cannot also be connected to the hub or there would be

- I plan to connect an ethernet cable to my open ethernet port at some
point. The cable will go from my ethernet port directly to the ethernet port
of a Lexmark Z65n printer (when we get a print cartridge for it) without
going through the ethernet hub.

- When I re-enable that Realtek ethernet port for the Z65n printer, that
printer will automatically become part of the existing network through the
Network Bridge, theoretically.

- The dial-up connection is only used when the LAN is not available.

- When dialing in with the dial-up connection, TCP/IP completes the
connection successfully, but a connection to the remote computer cannot be
established with IPX/SPX (error 733). A dialog box asks me if I want to
"Accept" the connection as is and if I want to check the box "Do not
request the failed protocols next time". I click "Accept", but I'm afraid to
check the other box about failed protocols because I don't know how
difficult it will be to reverse that decision if things change.

- I wonder why the 2Wire Gateway USB connection is only 10Mbps (rather than
400Mbps) for USB 2.0, unless it's because the router connects to an ethernet
hub which can only support 10Mbps.

Option #1: "This computer connects directly to the Internet. The other
computers on the network connect through this computer."
(This is the option I thought was correct, but Windows did not preselect

Option #2: "This computer connects to the Internet through a residential
gateway or through another computer on the network"
(This option came up by default in the network setup wizard when Windows
searched for a shared connection. Maybe this one is correct. This is the
option I am presently using on this computer.)

Option #3: "Other"
(This option is not used, but it was set up this way originally. At that
time, there was no USB cable between the router and my computer. My computer
was connected directly to the ethernet hub. Then we heard that the USB
direct connection method would be more secure, so we switched the wiring to
the current configuration as recommended by the 2Wire people and my ISP.)

1. Which option for the network setup wizard (see 1, 2 or 3 above) is
correct for this computer?
2. Would option 2 be correct for all the other computers on the network?
That was used for the other XP machine.
3. Since the modem/router connects to my machine with USB, there is no power
to that USB connection when my computer is turned off, right?
4. So the other computers can't connect when my machine is turned off,
5. Does my machine need to be turned on all the time in order for the others
to connect to the Internet?
6. Is my current network peer-to-peer or client/server?
7. Which adapter is the one that connects to the Internet, 1394 or 2Wire?
8. Which adapter should be used for File & Printer Sharing, 1394 or 2Wire?
9. Network Bindings need to be reconfigured to isolate File & Printer
Sharing from the Internet without losing my ability to connect either to the
Internet or to the other computers (and the other computers to me). I need
step-by-step instructions, not too technical.
10. Password protection needs to be added to each network printer and each
shared drive/folder. I need step-by-step instructions, not too technical.
11. The network access and Internet connection through are sometimes lost
for no apparent reason. Any idea why? Sometimes the 2Wire Gateway USB icon
disappears from the taskbar when this happens. When it doesn't disappear, I
can't right-click on it because it freezes. Sometimes Start -- Network
Connections will not open. I suspect it may be some background process
running in XP. The only way to get the connection back is to reboot the PC.
12. Remote Desktop and Remote assistance are both disabled. Do they need to
be enabled?

After the two XP machines are configured, I will need assistance setting up
the two Win9x laptops. Looking forward to hearing from the experts.

When I run the analyzer, I have to manually pre-pend 'workgroup' in front of
the name of my computer to get it to resolve the system to scan (my home
system). That's not really a big deal. But then it tells me that it can't
access the xml data file. I just read the MS white paper on this tool and
the xml file is downloaded from ms each time the tool is run, and is how the
tool gets the information it needs about what updates are necessary and
Then it also tells me it can't tell what file system my HD is (its ntfs).
And, I don't know if this is related, but I can't open my security center
Most of the apps that it checks up on, I deliberately don't have installed
( to minimize the 'attack surface' ), so when it reports that it can't
access the xml file for that app, that's perhaps understandable, if a little
strange (if the app isn't installed why doesn't it just say so, or simply
skip that check altogether?). But why does it say that in relation to the
windows security updates?
It won't save the reports when its finished either, I had to cut and paste
the following straight off the report. If anyone can help me with this I
would really appreciate i because I'm going to great lengths to secure my
system --- I refuse to get hacked like last time.

Computer name: workgroupuser-d8c0etc
IP address: 24.86.**.***
Security report name: workgroup - user-d8c0.etc (12-28-2004 12-17 PM)
Scan date: 12/28/2004 12:17 PM
Scanned with MBSA version: 1.2.4013.0
Security update database version: Security updates scan not performed
Security assessment: Incomplete Scan (Could not complete one or more
requested checks.)

Security Update Scan Results

Score Issue Result
Windows Security Updates
Could not access the security update XML file.

Microsoft VM Security Updates
Could not access the security update XML file.

BizTalk Server Security Updates
Could not access the security update XML file.

Content Management Server Site Builder Security Updates
Could not access the security update XML file.

Content Management Server Security Updates
Could not access the security update XML file.

Content Management Server Site Stager Security Updates
Could not access the security update XML file.

Host Integration Server Security Updates
Could not access the security update XML file.

IIS Security Updates
Could not access the security update XML file.

Windows Media Player Security Updates
Could not access the security update XML file.

Exchange Server Security Updates
Could not access the security update XML file.

MDAC Security Updates
Could not access the security update XML file.

Commerce Server Security Updates
Could not access the security update XML file.

MSXML Security Updates
Could not access the security update XML file.

Office Security Updates
This scan can only be performed on a local machine.

Windows Scan Results


Score Issue Result
File System
Unable to determine the file system on fixed drives(3.2)
What was scanned

Windows Firewall
This check was skipped because it cannot be done remotely.

Local Account Password Test
No user accounts have simple passwords.
What was scanned Result details

Automatic Updates
Updates are automatically downloaded and installed on this computer.
What was scanned

Guest Account
The Guest account is disabled on this computer.
What was scanned

Restrict Anonymous
Computer is properly restricting anonymous access.
What was scanned

No more than 2 Administrators were found on this computer.
What was scanned Result details

Check is skipped on Windows XP Home Edition computers.
What was scanned

Password Expiration
Check is skipped on Windows XP Home Edition computers.
What was scanned

Additional System Information

Score Issue Result
Check is skipped on Windows XP Home Edition computers.
What was scanned How to correct this

No potentially unnecessary services were found.
What was scanned

No shares are present on your computer.
What was scanned

Windows Version
Computer is running Windows 2000 or greater.
What was scanned

Internet Information Services (IIS) Scan Results

Score Issue Result
IIS Status
IIS is not running on this computer.

SQL Server Scan Results

Score Issue Result
SQL Server/MSDE Status
SQL Server and/or MSDE is not installed on this computer.

Desktop Application Scan Results


Score Issue Result
IE Zones
Internet Explorer zones have secure settings for all users.
What was scanned

Macro Security
No Microsoft Office products are installed

I am a newbie to both access and pls. keep this in mind when responding as I am venturing out into new horizons that are SIGNIFICANTLY beyond my current skill set. I would like to automate a process to generate and send an e-mail from access. I have found the VBA code on the internet to generate the e-mail message in access, but I can't figure out how to past the access information into the BODY of the e-mail [i.e., I don't want an attachment]. All of the internet examples assume that data is posted as an attachment or at least the ones I have identified. After the end user selects the row from the query screen, I would like to send this information in the BODY of the automated e-mail [i.e., end user would need to activate the macro after selecting the row on the query screen]. I also need suggestions on how the end user can easily activate the VBA macro code after selection the row on the query screen.

I have validated that if I manually select the query row, press the copy button icon, then open a blank e-mail in Outlook XP and hit the paste icon the process will work [i.e., the row with four columns of data is pasted into the body of the e-mail] can this be done in VBA once the end user has selected the row? The query has only four columns of data [account number, name, address and file location]. I hope I haven't been too vague or boring with too much detail. THANKS.

Hello All,

I'm in the process of completing an all new program for use with Microsoft Outlook 2002 and Outlook 2000 called WOPR Junk Mail Remover. As it's name implies, the program is an enhanced junk mail filtering program that is specifically for use with Microsoft Outlook 2002/2000.

The program uses Bayesian statistics incorporated into some fairly simple algorithms to generate what is called a "Bayesian" or "Content-Based" e-mail filter. As new e-mail arrives in your Inbox, it is broken down into tokens (i.e. all of its individual words), including any HTML tags, RTF tags, embedded Java Script, and Internet Headers, and then all of those tokens/words are compared statistically against a corpus/dictionary of known "good" (i.e. "Non-Spam") words and known "bad" (i.e. "Spam") words. The combined probability of the most interesting "good" and "bad" words in the e-mail message is then used to determine if the newly arrived e-mail is junk mail or not. The filtering process works so well that it's almost scary!

Since the Bayesian Filter is customized to each user's individual e-mail habits, it must be trained (or taught) to know what e-mails are Non-Spam and which are Spam on each user's system. Thus, when you first install the program the Bayesian Filter will need to be trained by selecting a "Mark Message as Junk Mail" or "Mark Message as Non-Junk Mail" toolbar button when new e-mail arrives. After you get about five or six messages trained/marked, the program will start to take off and it will begin filtering your newly arrived mail. However, the more you train the filter, the smarter it gets. I suggest a minimum of 50 Spam and Non-Spam trainings to start with, but even more than that would be even better (I currently have around 300 of each trained and sitting in my corpus/dictionary).

To backup the Bayesian Filter, there is a complete set of secondary filters that can be used to filter an incoming e-mail message based on all of the normal items (actually the program was originally written around these filters and I only recently added in the Bayesian filter. However, since the Bayesian Filter worked so well it quickly became the focal point of the program). For example, you can define custom filters (using the included "Create New Filter Wizard" tool) to filter incoming message's based on the sender's user name, the sender's domain name, the message's subject content, the message's text/body content, the message's Internet Header fields, the message's country of origin, etc. All of the standard (i.e. "built-in") and "user-defined" filters are managed via the programs Options dialog box (which is accessed via a button on the program's main toolbar).

The program also allows you to define a white list or a "Friends" list where anyone on that list automatically bypasses all of the filters so you are assured of getting their e-mail without it getting trapped by one of the filters (this also has the advantage of speeding up the program since mail from friends doesn't have to be filtered). The program alerts you when new e-mail arrives and keeps a running total of the numbers of mails that have arrived (i.e. accepted e-mail, e-mail from friends, possible junk mail, and confirmed junk mail). The e-mail is flagged in Outlook (using standard red and white Outlook flags) with the reason why it was filtered and it's mail status icon is changed accordingly so that you can easily identify filtered mail. Confirmed junk mail is automatically moved into a "Junk Mail" folder and the folder can be setup to automatically purge its contents after a set number of days have past since the message was first received/filtered (and the Junk Mail folder's location can be changed as well).

There's event a neat little "Message Details" tool that lets you view the plain text content of the message along with all of its Internet Headers. The tool even has an option for showing you a "Word Analysis" of the message where the individual tokens/words in the message are colorized based on their probability of being Spam or not. That way you can get a bird's eye view of how the Bayesian filter sees the message. I personally hate opening Spam because 99% of it is written in HTML format and Outlook always tries to access the Internet in order to download the graphics for the HTML messages. This little tool stops that from happening as all you see is the plain text of the message with all of the HTML stripped out (which is great for looking at those messages that you don't really know if they are Spam or not).

The program has another useful little tool that sends an "Unknown User" error message back to the originator of the junk mail message informing the Spammer that the e-mail address they have sent their Spam to is invalid (even though it really isn't). That way, the Spammer will think that your e-mail address is invalid and will hopefully remove you from their list. A standard error message is provided, but it can be fully customized, and the default action of any filter can be setup to automatically send the error message to the sender or you can do it manually form the program's main toolbar at any time.

If all of this sounds like a lot, it is... The program is quite a piece of work in my opinion and I wouldn't want to be without it. It's very addicting...

Anyway, as I've already mentioned, the program will run under Windows 98 and Outlook 2000, but it really shines when you install it on a system running Windows Me, Windows 2000, or Windows XP (Home Edition or Pro) and Outlook 2002. The reason for this is that the program does some pretty fancy API work to display information messages via the Windows System Tray and that feature only works on systems with version 5.0 or greater of the Windows Shell Library (i.e. any of Microsoft's O.S.'s greater than Windows 98 and NT 4.0). It also looks a lot better if you are running more than 256 colors for your screen display (although it has been tested and will run just fine on 16 color displays and Shell versions less than 5.0. In those cases, the info messages are displayed via the Office Assistant instead.).

The program includes an Installer and an Uninstall so installation should be a total breeze (just follow the on-screen prompts). After you've installed the program, and you run Outlook for the first time, the program will build it's backend database and then prompt you to create an account (since there's no programmatic way of getting the account info from Outlook itself). The account info is simply used by the program to determine your e-mail addresses (for filtering purposes) and to send the "Unknown User" error messages that I told you about above. The "Unknown User" Error Message feature requires that you have a POP3 or IMAP account in order to deliver the error message anonymously (again, since Outlook itself doesn't allow such things). Once you've set up your accounts, the program will prompt you to import your address books into your "Friends" list. After that, you are ready to begin training the program (which is done by selecting one or more messages and clicking on the "Mark Message as Junk Mail" or "Mark Message as Non-Junk Mail" buttons on the programs main toolbar.) Once you've trained it enough, just sit back and watch it filter all of that junk mail. It's absolutely amazing!

I've tried real hard to keep the filtering process as fast as possible, but as you might expect, filtering a large number of messages can take some time (since each incoming message must be broken down into its individual words and then compared against the "good" and "bad" word dictionaries, etc.). Thus, it works best if you let Outlook continually grab your mail every so often.

Anyway, after many months of hard work I think that I'm finally at a stage where I could use some other folks looking at the new "WOPR Junk Mail Remover" program for me. While it still has some minor flaws and still needs a few more loose ends tied up, all in all, I feel that it is working quite spectacularly. In the last week alone, it has removed over 1,000 pieces of junk mail from my Inbox with less than 1% false positives (and the only reason I think I'm getting the false positives is because I don't receive enough "good" e-mail to train the filter as well as I can with all of the "bad" e-mail I get. Once I can get an even balance of "good" and "bad" e-mail trained, I think it will be near flawless in its filtering).

Thus, I'm looking for a very limited number of beta testers who would be interested in helping me test out the new program and get it ready for final release. I'm only looking for around 10 or so serious testers who would have the time available to test the program over the next two weeks and would be willing to provide me with some useful feedback (I'm not only interested in finding bugs, but I'd like to know how you feel about the user interface, if there is anything I can do to make the program easier to use/understand, etc.). If you are interested in testing the program, please drop me a line at letting me know your current operating system (including any installed service packs), your current version of Office/Outlook (including any installed service releases), and what mode you are running Outlook in if you are running Outlook 2000 (i.e. Internet Mail Only (IMO) mode or Corporate or Workgroup (C/W) mode). Please remember that I can't except everyone as the available testing slots are very limited.

I'm looking for one or two of the following testers:

1. Someone running Outlook 2002/2000 on Microsoft Exchange Server (under any O.S.).

2. Someone running Outlook 2000 in Corporate or Workgroup mode (under any O.S.).

3. Someone running Outlook 2000/2002 under Windows 98.

4. Someone running Outlook 2000/2002 under Windows 98 SE.

5. Someone running Outlook 2000/2002 under Windows XP Home Edition

6. Someone running Outlook 2000/2002 under Windows XP Home Edition SP1

7. Someone running Outlook 2000/2002 under Windows XP Pro

8. Someone running Outlook 2000/2002 under Windows XP Pro SP1

9. Someone running Outlook 2002 SP2 (under any O.S.).

10. Someone running Outlook 2000 with WordMail enabled (under any O.S.).

11. Someone running Outlook 2002/2000 with a dial-up connection (under any O.S.)

12. I'm also looking for feedback on how the program looks at a variety of screen colors and screen resolutions, so if you don't mind flipping your system between 16, 256, high color, and true color, or between 640x480, 800x600, and/or 1024x768 or higher screen resolutions, then you'd make a good testing candidate as well.

Thanks for your interest in the new program and I look forward to hearing your comments...

I have a Windows 2000 Server that contains a few folders that are updated regularly. The contents are needed by a dozen remote users. What is the best / easiest way to share a few folders on the internet? I would prefer the interaction be both ways, so they can also upload, download, and modify the contents.

1. I have logmein (free) installed which I use for remote administration but I don't want to provide this to the folks as they will have access to the entire server.
2. I have temporarily created a dropbox account and shared this with the users, but the interface is not easy to navigate for less savvy users.
3. My router does not have a usb port to share a drive.
4. I have looked into creating a VPN but it seems like a lot of work plus the server is more than a 100 ft. from the router, so I will have to run another ethernet cable after installing a second NIC card in the server. I have also read that the built in VPN in Server 2000 is very basic, not sure how true that is. (I guess I could do this wirelessly instead of running cable).
5. I tried UltraVNC and the problem is again one user takes over the server, not something I want.
6. I also looked at pogoplug, seems to be a simple and inexpensive way to share on the net, cost is less than $80.

I could try FTP but first I wanted input from the experts on this forum.

Thanks, I appreciate all ideas and suggestions.

I am a professor of business at a medium sized state university where I am also the Chairman of the Business Department. Being both a professor and an administrator means that I get a very large number of emails from students and I need to respond to each one. Often, the correspondence will stretch across several email exchanges so I will often need to refer to prior messages before drafting a response.

Since I am also the chair, I get a similarly large number of emails from the faculty in the department and other administrators at the university and these too sometimes require that I refer to prior messages before responding.

All of this means that I need to systemically organize and save all of the email coming into my account and going out of my account. I have a system for doing that but it is groaning under a huge number of messages so my concern is to find a better way of archiving messages.

The university where I work is on the semester system. Historically, most message threads end at the end of the semester. The classes are over and as soon as everyone sees their grade, and perhaps complains about it, the students gear up for the next semester. Similarly, most faculty and administrative functions wrap up at the end of the semester.

Currently, I use Eudora for my email. I use Eudora simply because it is the campus standard that IT installs on all the computers.

My message archiving system started when I was using CompuServe for email prior to much of anyone using the Internet. Once each semester winds down, I convert all of my email to ASCII files, one file per message, with the subdirectory structure of the ASCII files matching the folder structure for my Eudora mailboxes. I keep each semester set separate from the other semesters. Using this structure and a combination of knowing the mailbox structure and the Windows FIND command, I can almost always locate a specific message.

Being somewhat of a packrat, I have not gone in and cleaned out really old messages. In fact, I still have those old CompuServe messages. Students have one semester to appeal grades so I have to keep at least one semester of messages but electronic communication takes up so little space that I have always just kept it all. Therein begins my problem. You see, I now have over 100,000 text messages. I cannot even zip them to save them since a zip file is limited to about 65,000 files. Even writing this many small files to a CD is difficult. My CD authoring program chokes before it can finish; although, I have figured out that if I create an image first and then use that image to create the CD, it works just fine. I guess writing an image takes the same work no matter the contents of the image.

For a number of years, this process worked just fine but, as the number of email messages I was receiving increased, it became a large burden to convert them individually to ASCII files. I was spending several nights each semester in front of the TV, mindlessly converting files while vegging out on too much TV.

Fortunately, I happened on a tiny program that made the process much easier. The program is Mailbox-to-TEXT/HTML Conversion Utility Version 2.32 from T. Gitlin. The program is copyright 1996. It reads in a single Eudora mailbox (it works with other programs as well) and converts all the messages to individual ASCII files automatically.

The program works still and saves me a ton of time but it has two drawbacks, one minor and one not-so-minor. The minor drawback is that you have to process the mailboxes one-at-a-time if you wish to maintain your directory structure. Still, automatic conversion is much faster than manual. The not-so-minor drawback is the program has a bug that causes it to miss the subject from any message created using software like that used for a newsgroup. These all get converted to files like "No Subject 99.txt" since the subject is used to create the file name. I tried to contact the author but both email and snail mail were returned. So, I use it to convert some of the mailboxes and manually convert others. The process takes four to six hours each semester.

About two years ago, I first begin to notice the problems with zip files and writing CD's and I started casting about for another solution. I figured out a solution that I thought would handle everything until I realized a flaw in my plan. I had already created a special folder for my Eudora mailboxes and I realized I could just copy that folder and then empty the original copy. If I needed to search old messages, I could point Eudora back to the copy and all the messages would be there with their mailbox structure intact.

That approach would give me a limited number of files, would maintain all the subjects, and would maintain all the formatting that was getting deleted with the conversion to ASCII. I would have just started doing that each semester since it would take less than 30 minutes to change over only the university started having some discussions about switching to Outlook. While the university ultimately decided not to switch, I realized that my approach would only allow me to access old messages as long as I continued to use Eudora since the Eudora mailbox structure is not any sort of standard format.

I like the handy way of accessing old messages so I currently maintain a parallel archive, a copy of the Eudora mailboxes and the converted ASCII files. What I want is an approach that is as quick and handy as just copying the Eudora mailboxes over with which does not depend on my continuing to use Eudora.

I know that big companies have to have addressed this concern. They cannot be paying people to convert messages to ASCII and they surely are not depending on individual users to archive messages yet they have to be able to respond to legal discovery with a list of all email messages on a particular topic or using other criteria. While I do not need the same heavy-duty software they likely use, there has to be something targeted at individual users.

I am hoping someone has a suggestion.


Other than the Windows Update issue that seems widespread, my Win 8 upgrade is working OK, but the Homegroup needs your help (I've searched and read the other threads here but no answers that fit).My Win 8 Pro (retail) upgrade over Win 7 HP (both 64bit) preserved my existing Workgroup. The desktop is ethernet to the router (D-Link DIR-655) and the laptop is wireless.As Woody says in his Win 8 book, a Homegroup coexists nicely within a Workgroup, and once set up initially by one PC, all are "equals" within the Homegroup without one being the "boss" over the other.At present on each machine, Network and Sharing Center show "joined" to a Homegroup as well as being in the Workgroup. The Win 7 network map sees the desktop. Win 8 has no such map, but does see the laptop's shared workgroup folders. Access to these is denied due to a permissions problem (see second theory below)Also, both machines show all the libraries I selected for the Homegroup as being shared.However, clicking on the navigation panel's Homegroup on the desktop's File Explorer and the laptop's Computer shortcuts produces a "No other homegroup PC's are available right now".The Homegroup troubleshooter finds no problems to solve on either PC.Each PC can ping the other's IP address.The above conditions remain the same even after I went into my Advanced Sharing and gave full control to Homegroup users on every folder. When that did not work, I decided to delete all such shared folders under my workgroup, to see if they were interfering with the Homegroup sharing. That left the workgroup functioning essentially for internet access and wireless printer sharing, nothing else.

I have two theories. The first is that Win 7's Homegroup Listener service will not start (another widespread Win 7 issue). The second is User name and password conflicts. For the first time in years since NT4, I'm logging on with a different user name and password to my desktop than what I use on the laptop, due to use of a Microsoft Account logon choice I made when installing Win 8. I've tried to go into my laptop's Control Panel|System to copy my Win 7 profile over to a new one with the same name as my desktop, but of course that "copy to" button remains grayed out as it has been for years.

If I create a new Win 8 local user separate from the Microsoft Account, with the same user name and password as my laptop, will I have to reinstall all my apps again? Other ideas?

I know this thread is supposed to be closed, but I am struggling with a related problem. I have tried all the suggestions in this thread, as well as from elsewhere, with limited success. I will try to make a complicated situation as clear as I can:

My family of 3 currently has 5 computers networked together in our office using standard cat5 cable using a Linksys wireless router and a Linksys print server which also contains a switch. It is a peer-to-peer network with a single workgroup name. Each of the 3 of us has an active Administrator account on all 5 computers using the same username and password on each of the 5 computers. All of the computers can see each other, including shared folders, on the network using My Netwok Places->View Workgroup Computers. All are running Norton Internet Security 2008 configured the same way. The oldest 4 computers can open shared folders on all 4 computers. The 5th, newest, computer can open shared folders on the other 4. But none of the original 4 can open shared folders on the new 5th computer, even though the folders can be seen. In fact, when the 5th computer accesses itself through My Network Places->View Workgroup Computers, it can't open shared folders on itself! It doesn't matter which username/password is used on the original 4 computers. In all cases of denied access the same message is given:

"Computer5 is not accessible. You might not have permission to use this network resource. Contact the administrator of this server to find out if you have access permissions. Logon failure: the user has not been granted the requested logon type at this computer."

Mostly this problem would be an annyoyance, but I am gearing up to install Windows Home Server on one of the older systems and want to make sure that WHS can see all the computers. I have the feeling there is one small confuguration change I need to make to solve this problem, but have not been able to figure it out or find anything on line that has worked. Any help would be appreciated. Thanks.

My wife's XP Home machine has two user accounts - hers and mine - both set up without passwords. Thursday, the last time the system was used, I downloaded a few updates for Symantec Norton Anti-Virus and for Ad-Aware, after which I performed a check with the latter, (finding nothing significant). My wife finished what she had to do and tells me the system closed down as normal.

Friday, when she tried to start the machine up again and log in, it presented her with a password prompt. As explained, none has been set but, what ever we do, whether there's text in the password box or not, we get the message "The System could not log you on. The server authenticating you reported an error (0xc00000BB) " and goes on to suggest I might get more information by looking at the system log (if only...!). When I set the machine up, I gave the administrator accound my default administrator password, (which I've used successfully before on this box), but this failed with the same error message.

Googling on the error suggests it's a problem related to logging on using a smart card system, which we don't do, (and, frankly, I wouldn't know how to sety up without research). All of the suggested solutions revolve around logging on conventionally and doind some fiddling with the User accounts.

The machine connects to the main machine in the house, (along with printers, the internet connection etc. etc.) via a Belkin wireless network card, which has functioned faultlessly in the nine months or so since it was installed. It's one machine in a basic, no-frills, peer-to-peer network and the other two machines are fine, (one XP Pro, one Windows 2000). Thinking that the PC may be trying to authenticate somehow to my machine (XP-Pro, which is almost always on), or, (worse) some Internet-based resource, I powered off the wireless router and tried a reboot. This time the error was "The system could not log you on due to the following error: Invalid access to memory location". When the router was powered up again, the first message returned. If I turn off the cable modem and leave the router on, the first message is shown.

I'm not sure whether that tells me something or not, although it sounds like the machine is depending on something it reaches through the network, (but not the cable modem) to log in. I'm about to try booting from the XP Home installation CD and running a repair install but I thought I'd try my luck here before I take this final step.

Has anyone heard of a similar error and (fingers crossed!) a solution?

Thanks for reading this far.

A novice user with a new Sony laptop running Vista home and having a wireless connection to a router connected to cable internet access is having a problem. Being a friend, I agreed to stop by to verify that the problem exists, but had little time for much else. Her ISP has so far been unable to help. I find the symptoms curious.

At Home : Everything worked fine (alledgely, I have no way to verify)

At Home : Limited number of web sites will connect including her ISP's so she is unable to get her e-mail, which she does using Windows Mail.

Away from Home : At another location having wireless access everything works fine.

Using Internet Explorer at home, her IE home page (Yahoo) will not connect, her ISP's web page (Comcast) will not connect and most others will not as well. It sits there trying to connect and times out. One web site connects immediately, Google. I did two searches at Google and got results as usual, but clicking on some of the resulting links links I found only about 1 out of ten would connect.

I am looking for suggestions as to what setting or conditions may have changed to account for all of the above behavior. I do not use IE7 or Vista on my Systems.

Problem description:
Two Vista machines. Sometimes the network sharing does work, and sometimes it does not. Using Process Explorer I can see no activity that might indicate a problem. The connection seems to come and go without a pattern, other than it is gone more that it is go. Shares will work, and suddenly be unavailable.

But the Internet is always available. On the new pc Norton 360 was provided as a freebie, but I have not completed the installation. Instead, I removed the register keys that cause the program to start up. Once I get this network problem solved I will worry about installing Norton. What I really need are ideas of where to look for possible causes. In case the texts are not perfect, I have done a rough translation from Dutch.
Thanks to all who contribute, I am at my wits end.


Error message:
CHANVISTA is not accessible. You may possible not have the correct authorizations for this network source. Contact the administrator of the server if you want to know which access privileges you have.

The Server-service has not been started.

But if I look at the Services, the server service is shown as running.

In the network center, I have the following on both pc's:
Network detection: enabled
Share files: enabled
Share public folders: enables
Share printers: enabled
Password enabled sharing: disabled
Share media: disabled

The initial picture in the network center on both machines shows this computer connected to the network TEKST connected to the Internet.

If I then show the complete network, both pc's are shown. Coming from each pc is a horizontal double-line, connecting these two is a single vertical line, and it looks like a single line to the switch from where they join. Further then are double lines from the switch to the gateway to the Internet.

Physical Connectivity:

Please describe your physical network configuration (what routers, switches, broadband connectivity etc.)
A Sitecom router which is connected further up the line to the modem for ADSL.

Do all PCs have ethernet cables connecting them to a common switch or router?

Can you see green and orange lights on the network cards and switch, where the ethernet cables plug in? What state are these lights in?
All lights are green as they should be, and one pc has a blinking yellow light to indicate date transfer. The other pc shows 2 green lights.

If you have a hardware firewall then check that it allows the PCs to talk to each other
There is no hardware firewall.

If you have software firewalls on the PCs then check that they allow the PCs to talk to each other
Windows firewall has been turned off on both systems. One system has Norton 360 installed. On this system I have disabled the Symantec Network Security Intermediate Filter Driver. Interestingly Norton always says that I am not connected to a network.

Make sure you don't have more than one software firewall on any of the PCs. If you use a third party software firewall then the built-in Windows firewall should be turned off.
It is turned off.

If you have ever had any other software firewalls installed then check that they have been completely removed
The Norton firewall has been turned off and as mentioned above the filter driver has been disabled. On the other machine I have disabled the startup of Norton.

Temporarily turn off all firewalls (disconnect from the internet first if you can)

IP addresses:

Type IPCONFIG from a command prompt on each PC, what is the IP Address? What is the default gateway address? and 0.4, with 0.1 as gateway

Can each PC access the internet?
Yes, no problem

Type PING a.b.c.d from a command prompt on each PC, where a.b.c.d is the gateway address from above. What output do you get?
4x reply within 1 ms

Type PING e.f.g.h from a command prompt on each PC, where e.f.g.h is the IP Address of the other PC. What output do you get?
4x reply within 1 ms

Please note, that when the network decides not to work, I also get 4x timeout which makes would normally indicate some kind of firewall blocking traffic to everything except the gateway. But the firewalls are either off or disabled.

Type PING computername from a command prompt on each PC, where computername is the Name of the other PC. What output do you get?
ping to chanvista: 4x reply within 1 ms
ping to vista1: 4x reply within 1 ms

User accounts:

Make sure that you are using the same username and password on all PCs
Chan and Marcella on both pc's, no passwords in use

Make sure the guest account is enabled by typing
net user guest /active:yes
to a command prompt on each PC
Done, the accounts are set active anyway via the user administration.

Create a new (temporary) username on each PC, for example Testnet, with the same password, and log in to this account on each PC
Not done

Other Diagnostics:

Start > Run > NETSH DIAG GUI, Wait for the window, Click Scan your system. Which tests pass? Which tests fail?
Cannot run this as Vista does not recognize the DIAG parameter

At a command prompt on each PC:


NET USE computernameIPC$ /user:username (where computername is the name of the other computer and username is the temporary username).

What exact error do you get?
The requested network name is no longer available.

NET VIEW computername (where computername is the name of the other computer). What exact error do you get?
The requested network name is no longer available.

NET VIEW computername (where computername is the name of the computer you are typing on). What exact error do you get?
No error, but a list of the shared folders.

Right click My Computer > Manage > Open Shared Folders

Look in Sessions, Does it show a connection from the other computer?

Look in Shares. Does it show the shared folders that you expect it to?

I am just recovering my main PC from an attack of the virus "Smart HDD". It rendered my computer 99 percent unusable displaying continual fatal error messages telling me that me C: drive has failed and deleting everything from the Windows desktop, taskbar and start menu. It also seriously affected Windows Explorer, it told me everything on every partition of my multiple hard disks system had been deleted.

So where does this leave me? I tried to find out more about the Smart HDD virus. It appears to be a new one and I could find only a few references, one of which was offering a free executable named iExplorer that was supposed to help. I was not keen to try this out, as far as I was concerned this was an untrusted site and it could have been phase 2 of the same virus attack.

I have a C: drive disk image backup a month old to resort to. Fortunately this worked and all I have to do now is spend a day or so checking and recovering odds and ends. All my data is backed up on separate media, so there's no actual loss of any of my own data.

The source of the infection appears to have been a link on a web site that I have been unable to pinpoint exactly. My real concern is that I cannot be certain how I can prevent another attack. I have a fully up to date integrated Internet Security application installed . It has firewall, anti-virus, malware, browser and email protection built in yet failed in its purpose to protect me. And it's not as though I am using a free version of this application - I am fully paid up for the next 18 months and have been for the last 5 years too. After emailing a request for assistance to the company concerned they have so far failed to respond. Windows Defender is in the background somewhere too. But it rarely indicates anything untoward.

What more can I do to protect myself from another attack? I am currently ensuring my Windows patches are fully up to date, also that my browser is fully updated. Maybe I should confine Internet access to a non Admin Windows user account. I currently browse in an Admin account.

Does anyone have any good suggestions or experiences with this virus to share?


I have a MSI wind Notebook 100U (Realtek wireless card) that connects perfectly in my WEP home network. It also connects nice with others WEP networks and with most cabled network. I had installed Windows 7 three month ago. When it ran Windows XP I had no problems to connect with WPA and WPA2. But in my job, the Wireless network runs WPA or WPA2 with TKIP encryption and now I can't connect anymore. I found a lot of similar problems, but none of them brings me the solution. I follow the administrator instructions:

WAP2 - Enterprise; TKIP
Unchecked the Server certificate box under configurations.
Authentication methods: EAP-MSCHAP v2 and unchecked Windows username and password at the properties.

This configurations were reviewed by the administrators and are OK. He also tried the WPA - Enterprise and It didn't work too.

The message I received when I try to connect is "Unidentified Network" and I am not able to switch "local network" or access point among home, corporative and public networks. I have no access to the internet and no IP (just APIPA on "ipconfig /all").

The administrator of the network is not dealing properly with this problems and a lot of Windows 7 users and some Windows vista users are facing the same problem than mine. Interesting is that some Windows 7 and vista users are connecting without problems. The XP computers and Iphone are working fine.

I have tried:

Updated my wireless card drivers.
Disabled the IPv6.
TCP/IP IPv4 is enabled.
Network discovery is turned on.
Printer and files sharing is enabled.
Turned of all firewals (including the Windows one) and antivirus and antispywares.
The Windows solution to vista problem I have tried on 7: DhcpConnEnableBcastFlagToggle on regedit (Windows Vista cannot obtain an IP address from certain routers or from certain non-Microsoft DHCP servers)
On"services.msc", the DHCP client is started (but the logon is running on "this account" not in "local system account" because when I tried to put in this option my home network crushed).
I didn't find Bonjour service in my computer. I didn’t install Itunes or other MAC programs.
I also tested an USB Wireless card, without success. Therefore I think this is a Windows 7 bug.

Some of the solutions will suggest to manually configure the DNS, IP number... But it is impossible to me argue with the wireless administrator in doing that. He explained to me a lot of reasons (that I didn't understand) why I cannot put an IP number manually.

It is not my intent to be abrupt or discourteous. I apologize you for my English because I'm not an English expert. I hope you found the solutions. Thanks.

This freebie was originally posted about on November 5, 2009. However, the same freebie is being offered from various sources again this year so I wanted to remind everyone that EVEREST Ultimate Edition (v4.6) is still available for free. Instead of creating a whole new post, I have brought this old post to the front.
EVEREST Ultimate Edition is an excellent and very handy PC diagnostic/benchmark utility. Usually it would cost you $39.95 but today learn how you can grab v4.6 for free (the latest is v5.02).

Update: Just to clarify, v4.6 is two years old - it may not properly identify newer hardware/software.
These are the "key features" of EVEREST Ultimate Edition as per the developer:
Generic features:
· Low-level hardware information: 44 pages
· Software and operating system information: 44 pages
· Security related information: 6 pages
· DirectX information including Direct3D acceleration features
· Diagnostics module that simplifies troubleshooting
· Tweaking features
Benchmarking features:
· 10 benchmark modules to measure CPU, FPU and memory performance
· Benchmark reference results to compare measured performance to other systems
· Cache & Memory Benchmark Suite
· Hard disk, optical drive and flash drive benchmarking with RAID array support
Unique features:
· UpTime and DownTime statistics with critical errors counter
· Monitor Diagnostics to check the capabilities of CRT and LCD displays
· System Stability Test with thermal monitoring to stress CPU, FPU, memory and disks
· Hardware Monitoring to monitor system temperatures and voltages on the System Tray, OSD, Vista Sidebar or Logitech keyboard LCD
· Temperature, voltage and fan RPM data logging to HTML and CSV log files
· Smart Battery information
· Web links: IT portals, software and driver download
· Manufacturer links: product information, driver and BIOS download
· Hardware information database for over 52000 devices
· Overclock information
· Fully localized user interface: 35 languages
· No installation or setup procedure requiredThese are the things EVEREST Ultimate Edition can provide you information about as per the developer:
Hardware Information
Motherboard & CPU
Accurate low-level information about motherboard, CPU and BIOS, including chipset details, DMI enumeration, AGP configuration information, SPD memory modules list, DRAM timing information and CPU instruction set support.
Video adapter & monitor
Detailed information about the video adapter, video drivers and monitor, including DDC information, monitor serial number and supported video modes detection, low-level GPU details, OpenGL and Direct3D features list.
Storage devices
Information about all hard disk and optical disk drives, including IDE autodetection, S.M.A.R.T. disk health monitoring, ASPI SCSI devices list and partitions information.
Network adapters, multimedia, input devices
Exhaustive information about network adapters, sound cards, keyboard, mouse and game controllers, including NIC MAC address detection, IP and DNS list, network traffic monitoring, DirectSound, DirectMusic and DirectInput information.
Misc hardware
Information about PCI, PnP, PCMCIA and USB devices, communication ports, power management information, device resources list, printers information.
Software Information
Operating system
Detailed Windows information, including operating system installation date and product key, system services and system drivers list, process information, environment variables list, system folders list, system files and Event Logs content, AX and DLL files list, UpTime information.
Server and display
Information about network shares, users and groups list, logged on users list, account security settings, opened files list, fonts list and Windows desktop configuration details.
Large amount of information about networking status, remote access and mailing accounts, network resources and Internet settings. List of network routes, Internet Explorer cookies and history of visited web pages.
Installed software
Detailed information about installed programs, scheduled tasks and startup programs.
Windows Security
Operating system security information including DEP (Data Execution Prevention) status, list of installed security patches and system restore status.
Security applications
Firewall, anti-spyware and anti-trojan software list. Anti-virus software information including virus database details.
EVEREST CPUID panel to provide a compact overview on CPU, motherboard, RAM and chipset. Invaluable information on overclocked systems, dynamic refresh to support Enhanced Intel SpeedStep and AMD Cool'n'Quiet technologies.
Hardware monitoring
Sensor information including system, CPU and GPU temperature, fan status, CPU, GPU, AGP and DRAM voltage monitoring, S.M.A.R.T. disk health status. Support for Corsair Xpert memory modules.
Sensor icons
Sensor icons feature to display actual system temperature and voltage values on the System Tray.
CPU and FPU benchmarks
State of the art multi-threaded benchmark methods to measure performance of both old and brand new processors. References list to compare actual performance with other systems.
Memory benchmarking
Memory read and write speed, memory latency measurement to stress the memory and cache subsystem, including references list to compare actual performance with other systems.
Disk Benchmark module
Disk Benchmark module to measure performance of hard disk drives, optical disk drives (CD/DVD/Blu-Ray) and USB flash drives. Graphical overview of disk performance measured on different areas of the disk surface.
Tips & suggestions
Detection of possible hardware and software misconfiguration and compatibility issues.
Report Wizard
Easy-to-use method to produce report files of the system, by either using pre-configured report profiles or custom selection of information.
Report formats
Three different report file formats: plain text, customizable HTML and the unique MHTML format. MHTML reports including icons are ideal for printing purposes.
Report e-mailing and printing
Built-in e-mail transfer client using SMTP, also support for MAPI and Outlook protocols. Instant report display and one-click printing capabilities using IE4 technology.After reading all that if you still want EVEREST Ultimate Edition (v4.6), just following these simple directions:
***EVEREST Ultimate Edition v4.6 works on 32-bit and 64-bit Windows 95/98/ME/NT/2000/XP/Vista/2008/Win7
Note: Unless specifically stated otherwise in this article, EVEREST Ultimate Edition has not been tested or reviewed by dotTech (aside from ensuring that this giveaway is valid). All the information about the program in this post is based off the information provided on the developer's website. Please do not take this post as an endorsement/rejection or review of the program. This article is simply to inform about the availability of this program as a freebie; nothing more, nothing less.Visit's promotion page and register:I don't know if spams or not so feel free to make use of Mailinator or Trashmail. Please do not use 10MinuteMail because it takes a while to get your registration key.

After you hit "Senden" you should see a confirmation page:
After you see that confirmation page, go check your e-mail. You should have an e-mail from " ;" with the subject of "Aktion com! Everest Ultimate Edition". In the e-mail there will be a link you must click on to confirm your registration:Click on the link and you should see a confirmation page again:Now you must wait for the registration key to arrive in your inbox. Officially you should get the key within the hour. It took me 45 minutes.While you wait, go download EVEREST Ultimate Edition v4.6.Keep checking your inbox for an e-mail from " " with the subject of "Lizenschlüssel für Everest UE". The e-mail will contain your registration code:Copy the registration code once you get the e-mail.Install EVEREST Ultimate Edition v4.6 and run it. You should be prompted to enter a registration code. Paste in your code.

Enjoy your new and free EVEREST Ultimate Edition v4.6:


When you have a Ferrari you might want to test drive it on a circuit, where there are none of the limitations of a town street. Well, when you have Internet Explorer 9 Beta you need a “circuit” on which to test it, something more than just your average Internet websites, applications and services.

Somewhere where you could really go “pedal to the metal” on IE9. Where the browser will show just what it is capable of.

Fortunately enough, a wide range of such sites designed for Internet Explorer 9 already exist, with a plethora of Microsoft partners introducing new IE9-related web projects with the launch of the Beta on September 15th, 2010.

The Beauty of the Web launch event for IE9 Beta earlier this week was a real show of force from Microsoft partners.

At the bottom of the screen I included a range of photos from the partner section of the event. Below you will also be able to find a list of links with some amazing IE9 websites from the software giant’s Beauty of the Web event.

“Richer Web experiences can blend into the consumer's desktop experience comfortably and consistently. So, today we have an A to Z, literally, of Web sites, partners, live with Web experiences that take advantage of IE9, even more than the A to Z of the Web,” revealed Dean Hachamovitch, Corporate Vice President, Internet Explorer, Microsoft earlier this week.

Users will be able to easily notice that IE9 can enhance the experiences associated with social networks such as Facebook, Twitter, and Netlog.

But there is additional bleeding edge content from various web design firms, and new perspectives on entertainment and news from BBC, CNN, Hulu, Vimeo, and Daily Motion.

Over 50 projects were on display in total, many of them built in very short time, just a matter of weeks, in preparation for the event.

But all of them extremely impressive, and all of them already live on the web, and available to testers around the world.

It’s important to underline that although the Redmond company catalyzed the creation of the projects, it made sure to have them work not only across Internet Explorer 9, but also across rival browsers.

Superb projects such as Endless Mural will function in IE9, as well as any other browser that supports HTML5.

All the websites featured at the Beauty of the web event in fact, are set up to take advantage of modern web standards, such as HTML5, CSS3, SVG, etc.

And usage is in no way restricted to IE9, which is a brilliant move from Microsoft, showing its commitment to users, developers and partners alike, and a strong focus on driving the web forward by making the same markup vision a reality.

“Today partners around the Internet join us in releasing new experiences for the Web. Over 70 top sites and brands that reach over two-thirds of active Internet users. Together that's over 800 million visitors whose Web experience just got better on Windows with IE9,” Hachamovitch added on September 15th.

Here is the list of IE9 websites, with short descriptions from Microsoft:

“1. Amazon -, Inc. seeks to be Earth's most customer-centric company.

By integrating the pinning and Jump List features enabled by Internet Explorer 9, Amazon continues to enhance the on-line shopping experience for customers by giving them easy access to favorites such as Gold Box Deals and Best Sellers as well as enabling customers to manage their accounts and check the status of orders quickly and effortlessly.

2. Agent 008 Ball by Pixel Lab - Agent 008 Ball is an addictive game that combines billiards with the high stakes world of international espionage. Cutting edge HTML5 features (like Audio and Canvas) supported by Internet Explorer 9, combined with stunning graphics draw you in as you attempt to beat a timer and avoid the nefarious tricks of the terrorist organization CHALK.

3. Always Beautiful by Big Spaceship - Using the new features included in Internet Explorer 9, Big Spaceship created Always Beautiful, an interactive visualization set to music.

Users manipulate colors and objects that adapt to the song's rhythm and structure. At the end of the song, the user is shown the high-resolution artwork they've created using the powerful SVG capabilities and improved JavaScript performance of Internet Explorer 9.

4. AP News Reader by Vectorform - The AP News Lab "Timeline Reader" is a collaboration between Vectorform and The Associated Press (AP) exploring new ways of visualizing and reading online news.

We sought out to create a fully featured online reader application that showcases the beautiful high-res imagery from the AP side-by-side with a full article reading experience.

Users can browse through all of their favorite news categories simultaneously in a timeline visualization that frames the day’s events in a complete chronological sequence. The site is also a showcase of the latest advances in HTML5 and CSS3 supported in modern web browsers.

Some of the new technologies utilized were the HTML5 canvas tag to create a fast loading and snappy intro animation/splash screen, HTML5 local storage to keep track of read articles and a reading queue, and CSS3 support for embedding web fonts.

5. AMD Space Command - AMD Space Command is a fun game that shows the graphics acceleration of Direct2D technology in the Internet Explorer 9 browser.

Shoot as many space attackers possible, and use the “GPU capacitor” to adjust the intensity of the game. AMD Space Command is built in HTML5, leveraging the GPU in your PC to improve graphics.

You can see this first hand by keeping track of the Frames Per Second (FPS) as you adjust your GPU capacitor!

6. BeatKeep by Archetype - Community and creativity are the driving forces behind Archetype’s BeatKeep application.

BeatKeep allows drummers, musicians, and music enthusiasts to discover, create, and share beats of any genre. Through intuitive interactions and the power of HTML5 on Internet Explorer 9, BeatKeep allows users to create unique audio tracks and share them on social networks like Facebook.

7. Beautiful Explorer by Soleil Noir - Web is beautiful, spontaneous, ephemeral and so creative. The beauty of the web is the creative contents produced by everyday people. This website is a design trends daily overview. We hope you'll enjoy it.

8. BMW Vision by EMC - EMC Consulting and BMW have a created the BMW Car Configurator, a ground-breaking tool that shows off the extraordinary BMW Vision EfficientDynamics concept car.

The experience relies on the high performance of Internet Explorer 9, bringing together the awesome power of Chakra, its new JavaScript engine, and GPU acceleration to enable car enthusiasts to manipulate both the car and its environment with a fluid three-dimensional feel.

9. Brain Power by R2Integrated and Scientific America - R2integrated developed Brain Power, a website and interactive learning tool to introduce users to the many parts of the human brain and its functionality.

Brain Power uses HTML5, SVG, CSS3, and JavaScript. An animation layer produces real-time interactions with elements drawn within the HTML5 canvas.

The HTML5/CSS3 engine within Internet Explorer 9 makes full rich interactive applications practical for all new websites. In short, HTML5 and Internet Explorer 9 introduce end users to new levels of flexibility, capability, and expression.

10. Chinese Shadow Play by RedSAFI - Chinese Shadow Play is a traditional form of Chinese art. This demo lets users choose an iconic Chinese shadow puppets, play with puppets individually and organize the puppets in formations.

This demo shows off the power of the Internet Explorer 9 Canvas by featuring a physics engine and a bones system, as well as beautiful bitmap art to create an engaging viewing experience.

11. Also by RedSAFI: Chinese Kite Experiment - In this demo, a user can select a kite and choose a flight pattern.

The user can also add fans to the stage and add collision detection to alter the kite’s flight. This demo shows off Internet Explorer 9 Canvas performance by featuring a physics engine to create the flying environment.

12. Comicx Parallax by Steaw Design - As web technologies continue to evolve, we prepare to enter the age of HTML5. Created for Beauty of The Web in honor of the Internet Explorer 9 launch, “Never Mind the Bullets” offers the traditional comic strip experience enriched by parallax.

With a simple movement of the mouse, the strip is animated and the story comes to life. It unfolds at LongHorn Gush, a quiet town troubled by a band of outlaws, The Red Bandanas.

However, with the arrival of the famous Bill “One Shot” Collins, things are about to change.

13. by Demand Media - Pinning to your task bar allows you easier access to one of the fastest growing humor sites in the world.

Now all of Cracked’s award-winning content is only one click away – no matter where you are online!

14. DailyMotion - Dailymotion is pleased to announce the release of its new HTML5 Player Beta and Demo.

This development takes advantage of the latest web standards, and permits streaming video playback without the need for plugins," said Olivier Poitrey, CTO and Co-Founder.

"We are excited to partner with Microsoft for this announcement as the new Internet Explorer 9 shows commitment to both web standards and innovation. Internet Explorer 9 sets itself apart by supporting hardware accelerated graphics and offering users a more app-like experience with their new Site Mode.

15. Digital News Archive (DNA) by Nave - The web site provides Korean newspapers from various publishers dates starting from 1960's to 1990's.

Users can easily browse through the newspapers using simple UI. To maximize the user experience, the Canvas element was heavily utilized. With the Canvas, we could make zoom, page navigation and other transitions smooth and enjoyable for the users.

16. Discovery - As the world’s number one nonfiction media company, Discovery Communications is always looking for new ways to engage with our passionate fans.

By building new Internet Explorer 9 functionality into, and, we are able to give audiences even more ways to interact with and learn from their favorite TV shows and personalities.

17. EBay

18. eHow by Demand Media - eHow offers more than 2 million articles and videos, providing visitors with trusted solutions for completing life’s daily tasks or larger projects.

With Internet Explorer 9, users enjoy an optimized and more dynamic eHow, a faster loading and immersive video experience - without the need for 3rd party software - plus new tools to bring relevant eHow content straight to our user’s fingertips.

19. Facebook - More than 500 million people actively engage with their friends on Facebook each month.

With IE9, Facebook users will be able to more quickly access and manage their social activities through the browser and get back to their friends via a seamless and rich experience.

20. Flixster - Flixster is the largest online movie community and the leading movie application for mobile devices.

Flixster is using Internet Explorer 9’s new features to give users quick and easy access to great movie content right from the desktop.

21. Floweroscope by LA Surprise - Floweroscope provides users with a kaleidoscope-like online artistic experience that explores the new capacities of Internet Explorer 9 to create a unique animation experience.

Floweroscope provides symmetrical effects and randomly generated shapes, and the user controls the shape colors and sizes.

An HTML5-supported volume effect and the new Chakra JavaScript engine immerse the user into the experience. The Internet Explorer 9 Canvas element provides an innovative way to draw hardware-accelerated animations without plugins.

22. Gorillaz - has been optimised for Internet Explorer 9 to take advantage of some great new integration features with Windows 7.

Fans can now drag the Gorillaz favicon to their taskbar and access it like an app. Right-clicking on the Gorillaz icon in the taskbar provides access to site features like News or the G Player.

Gorillaz fans can even personalise this list by clicking the star to save any page. Powered by HTML5, Murdoc’s Reading Room is turned into an interactive space.

He'll talk you through it as you zoom up to the gallery wall and listen to tracks, bring up the Story So Far book off his coffee table with stunning pictures, html5 video and audio, and have a nosey look through the contents of his laptop. Click on the video to play an HTML5 video!

23. Hulu - Hulu on Internet Explorer 9 and Windows 7 will allow users to customize their Jump List menu with the most popular destinations on the site.

To customize, users simply select the menu items in their profile page and they become accessible whenever/wherever you are on

The site will also enable contextual menus on Show Pages and Watch Pages allowing users to Subscribe to shows or control their video watching experience during content playback.

24. IMDb - More than 100 million unique visitors per month turn to IMDb to discover which movies are coming out and decide what to watch.

IMDb’s new HD Trailer Gallery utilizes HTML5 and Internet Explorer 9 hardware acceleration to dramatically enhance the trailer viewing and movie discovery experience on IMDb.

25. Jack & the Beanstalk, an Animated, Interactive Storybook by Clarity Consulting - The site blends fantasy and realism in custom illustrations animated by physics-based JavaScript.

The GPU acceleration in Internet Explorer 9 allows for smooth rendering of animations, even when leveraging heavy physics libraries. Coupled with SVG graphics and embedded audio most are surprised to hear the entire site has been created using HTML5, CSS, and JavaScript.

The newly supported features of Internet Explorer 9 allows for rich interactivity without the overhead of the traditional plug-in based model.

26. JitterBug by Cynergy - JitterBug is a fast, fun game built exclusively in HTML5. Showing off the rich media and rendering power of Internet Explorer 9, the game challenges the player to draw lassos around fast moving bugs to unlock the Band and start the show before the time runs out.

Relying heavily on Internet Explorer 9’s impressive Canvas abilities, this rich playing experience redefines what’s possible in HTML based game play.

27. Kaboodle - Kaboodle is the Internet’s largest social website for passionate shoppers. Kaboodle’s shopping tools allow users to add products from anywhere online to their Kaboodle lists and to share those products with others.

The site’s integration with Internet Explorer 9 will provide Kaboodle community members with easy access to their personalized shopping content via a custom Jump List, ensuring that it is always just one click away.

28. LinkedIn - LinkedIn is an Internet platform company focused on connecting the world's professionals.

The company is privately held and has a diversified business model with revenues driven from user subscriptions, advertising sales and enterprise software licensing.

The LinkedIn Web site launched in 2003 and is the largest professional networking site in the world with more than 75 million members, representing 200 countries and executives from every Fortune 500 company.

LinkedIn’s integration with Internet Explorer 9 will provide its members with one-click access to their professional network and business insights via a custom Jump List.

29. Live Strong by Demand Media - LIVESTRONG.COM inspires and empowers people to achieve their daily goals around living healthy.

With Internet Explorer 9, users enjoy a more dynamic experience including an expanded HD video browsing and improved recipe discovery.

A newly optimized experience of the popular MyPlate food and fitness tracking application keeps users engaged in real-time.

30. Lost World’s Fairs by Friends of Mighty - To celebrate Internet Explorer 9’s support for the Web Open Font Format (WOFF) Jason Santa Maria, Frank Chimero, Naz Hamid, and Trent Walton have teamed up to create a series of web broadsheets for World’s Fairs that never were.

Each piece uses fully live text (with some HTML5 and CSS3) to showcase what’s typographically possible on the web.

31. MONA (Museum Of Neverending Art) by groupeReflect - At the MONA, users work together to create the biggest online artwork ever.

Everyone can create, draw, write, upload pictures, and add and alter things on the canvas. It’s a user-generated piece of art, which is constantly in motion.

Using Internet Explorer 9 technologies such as HTML5 / CSS3, WebFonts, Canvas and the new Internet Explorer 9 JavaScript Engine, MONA makes you rediscover the beauty of the web, as well as recreate it.

32. MySpace - MySpace Video offers music videos, full episodes of TV shows, and user generated content and creates a social environment for users to view, create and share videos with friends.

In Internet Explorer 9, MySpace Video serves over 200,000 videos and UGC video clips in state of the art high-def H.264 in full compliance with HTML5. Jump Lists in Internet Explorer 9 offer quick content discovery and easy navigation.

33. National Museum Gallery China by NX - One of the most famous museums in China, National Museum of China (NMC) now allows visitors to explore the galleries on their feet or on the web.

Internet Explorer 9’s HTML5 support is just right for this scenario: easy to develop with great flexibility, smooth video and audio playback and a fast experience with the new JavaScript engine.

34. Netlog - Netlog is an online platform where users can keep in touch with and extend their social network and is currently available in 37 languages and has more than 69 million members throughout Europe, and this number increases every day.

Netlog is taking advantage of pinning site to the taskbar and thereby making sure users get to the activities within Netlog they care about via the Jump List.

35. One Day in Beijing by Toujie - One Day in Beijing provides a virtual tour of famous Beijing sites, including the Great Wall, Temple of Heaven, Beihai Park, Tian An Men, and National Stadium China (Bird Nest).

These are the must-go places for anyone touring Beijing. By harnessing the power of Internet Explorer 9 and HTML5 along with the Internet Explorer 9 Canvas 2D API, we created a multitude of interactive scenarios.

Users can experience flying clouds and mouse sensitive navigation, as well as other HTML 5 demos like flying kites, and piyingxi.

36. Photobucket - Photobucket is the premier destination for saving, sharing, searching, and creating images and video on the Web.

With Internet Explorer 9, Photobucket is using Jump List, which will allow users to access both their own content and content from topical “Find Stuff” categories directly from their desktop.

37. Quiksilver

38. Red Bull by Archetype - Archetype has created a next generation global media and social experience for Red Bull.

This interactive application allows users to browse Red Bull’s rich set of photos and video, dynamically surfacing content based on its popularity in social networking sites and on users' interests.

It takes advantage of HTML 5, SVG, CSS3, Jump Lists, Scaling, Audio/Video tags and custom font features and functionality offered by Internet Explorer 9 to raise the bar for interactivity and design in standards based websites.

39. Rough Guides by Metia - Members of this interactive community use an animated compass to navigate a map of the world; view geo-located photographs pulled from the Flickr database; and explore 200 travel experiences selected by Rough Guides.

Members can also submit their own images to the community, and share favourite experiences from their online travels using Facebook, Twitter and email.

40. RTL - RTL Group is a house of excellent content and powerful brands, which is able to deliver its content to all media platforms worldwide and to repeat its broadcasting success story in every country while fulfilling its obligation to society.

By combining pinning, Jump List and previews into the RTL experience, Internet Explorer 9 users get convenient access to the most popular RTL content.

41. Sohu NBA by Digital Hall - Sohu Sports is one of the most popular interactive sports information network among sport enthusiasts.

Being the NBA-licensed live video broadcast site for NBA events in China, NBA fans can access team schedules, game videos and team/player data, photos, chat rooms, voting and other interactive features. Internet Explorer 9 plus HTML 5 gives an unparalleled high performance hardware accelerated graphics and video experience.

42. - This showcase is a sneak peek at the future of

Core features are new picture and video galleries, a 360 degree view of consumer products and a fun and challenging online game, all completely realized in HTML 5.

This, as well as the implementation of the Internet Explorer’s Jump List feature, offers the user a glimpse of what a modern news website could be like when fully implementing the power and simplicity of HTML 5 in combination with the Internet Explorer’s unique way to surf the web.

43. The Doll Parade by Freetouch - The Doll Parade allows its users to assemble a wide variety of dolls by customizing their arms, legs, faces and apparel.

Once the doll is assembled the users doll along with other creations march smoothly via an HTML5 Canvas. The experiences takes advantage of HTML 5 (Canvas), SVG and CSS3.

44. The Killers by SparKart - The Killers' website chronicles the band's career, and offers users a seamless browsing experience of the band’s music and video content.

The website takes advantage of HTML5, Canvas & SVG across the site's panoramic landscape & internal sections, leveling the playing field in displaying content to users across multiple platforms & devices.

45. The Shodo by Business Architects - The Kanji Calligraphy website takes advantage of powerful new Internet Explorer 9 features to introduce users to the beautiful Japanese calligraphy known as Shodo.

Even better, Kanji Calligraphy allows users to create their own calligraphy-based art work and share it on Twitter and Facebook.

This site is based on several of the features supported by Internet Explorer 9 HTML5 (canvas, video element, audio element), SVG, and WOFF.

46. The Wall Street Journal - offers breaking news coverage, real time quotes, and in-depth analysis and commentary to the business elite.

Its high-end magazine, WSJ., emphasizes luxury and discerning lifestyle content. To make it easier for users to find and enjoy the content, WSJ is implementing favicons, pinning and the Jump List functionality of Internet Explorer 9 and employing HTML5 features for the visually enriched magazine.

Users can more quickly and easily access Journal content on their faster Internet Explorer 9 browsers.

47. by BBC - is the award-winning website of the world famous motoring entertainment brand, Top Gear.

Top Gear presenters, producers, magazine team, and contributors regularly post on The Cool Wall leverages the HTML5 and hardware accelerated graphics support in Internet Explorer 9 to provide amazingly smooth transitions, Deep Zoom functionality and slick video playback.

48. Twitter - Twitter lets you share and discover what's happening in your world. The Twitter pinned app in Internet Explorer 9 makes it easy to jump into your Twitter timeline, read and send direct messages, and more, so it's never more than a click away.

49. USA Today - As a part of the fifth anniversary of Hurricane Katrina, USA TODAY built a multimedia project examining where things now stand in New Orleans and the Gulf Coast.

To build the site, we used a variety of web standards, including HTML5 video tag and several CSS3 features, that take advantage of the capabilities of cutting-edge web technologies in Internet Explorer 9.

50. Vodpod - Vodpod makes it easy to build your own video channel with your favorite videos from the Web, and to tune in to channels by other members who share your tastes and interests.

By pinning Vodpod to the taskbar in Internet Explorer 9, users will be able to jump right to their real-time Vodpod feed, to their video collection, or to their favorite channels.

51. WebVizBench by Stimulant and KEXP - WebVizBench lets fans of Seattle’s non-profit radio station KEXP explore historical airplay data, while putting HTML 5's new features to the test. Sift and sort through 6+ years of music, or use the benchmark mode to see how your browser, CPU and GPU stack up against a thorough battery of DOM, canvas, typographic, SVG and video rendering tests.

52. XING - XING is a social network for business professionals with more than 9.6 million members worldwide.

Using Internet Explorer 9 technology such as Jump Lists, XING members can perform tasks like sending messages faster than ever and also receive real-time updates about their network. This supports our XING Anywhere strategy and our efforts to provide our members with great usability.

53. Yahoo! Japan - Through Jump Lists in Internet Explorer 9, users of Yahoo! can enjoy the ‘People’, 'TV', 'Game/Animation', and 'Sports' categories of search ranking, and further enjoy it by switching to Yahoo! Auction, and Yahoo! Answer to see what is actively traded or discussed related to popular queries.

54. ZKM - “Exhibition and Archive” presents a historic online exhibition and a new experience of archival survey.

The side is driven by HTML5, CANVAS, CSS3, SVG and Jump List, which allow graphically rich, standard conform applications and avoids plugins. The pure implementation supports the modern claim of “form follows function” and adds sustainability.”

54 Amazing IE9 Websites You Have to Try - Softpedia

One of the thorns in the sides of all Internet users is the plethora of accounts they need to keep track of for the various websites they use throughout the day. Most of the folks running these sites don’t particularly want to create an account management system, but they need to just so they can provide their users with a personalized experience.*On the other end of the spectrum, there are enterprise developers who need to constantly keep up with new protocols and credential types for securing their applications. Windows Identity Foundation might just be a solution to both of these problems, removing the need for applications to host their own authentication system, as well as reducing the number of logins a user needs to remember.

In this episode of The Knowledge Chamber, I meet with Vittorio Bertocci (who just finished a new book, Programming Windows Identity Foundation)*to learn more about the basic features and capabilities of Windows Identity Foundation and see how easy it is for websites and applications to get out of the credential management game and “outsource” their authentication to another provider.

When used in conjunction with services such as the Windows Azure AppFabric Access Control Service, Windows Identity Foundation makes it possible to log in via LiveID, Yahoo, Google, and existing Active Directory instances equipped with ADFS2, as well as by using a variety of other providers, while maintaining the exact same codebase.

If you’d like to order a copy of Vittorio’s book, you can find it here:

To find out more about Windows Identity Foundation, you should start here:

You can find Vittorio’s blog here:

And you can find more videos on Channel 9 about Windows Identity Foundation here:


Page 2 of 3.
Results 21...40 of 48