asking for authentication Results

Page 1 of 2.
Results 1...20 of 39

Sponsored Links:

A friend of mine has a problem using a Mac with Windows 2003 as an authenticating server.

The network consists of 3 Macs and a number of Windows 2003 servers ... the Mac's are 1 OS-X, 1 dual boot OS-X/OS-9 and one OS-9. Neither client PC's nor OS-X systems have issues authentication issues but the OS9 only system behaves as follows:
* On first logon it pops up a dialog box asking for authentication.
* If the user puts his Windows account details in box appears to accept it but the dialog then re-appears asking for the same info.
* If the user deliberately puts an incorrect details into the dialog authentication fails.

To my mind this proves that information is being transferred to (and that authentication is occurring on ) the domain controller.

If the users uses the "kill process key" the dialog box disappears (usually), the OS continues to load normally and access to Windows based resources are OK. The dual boot OS-9/OS-X system has no such issues (even under OS-9).

Neither I or my friend have any significant Mac experience but he was wondering if the "faulty" OS-9 box is possibly trying to logon to a different server with the same IP address as the old file server and if anyone knows if there is a configuration applet in OS-9 that would allow him to turn this initial authentication off?

Apologies for the long explanation but hopefully that is sufficient information.
Anyone operating a server on any scale should want a digital certificate to encrypt data between clients and services, whether for personal, office, or public use. Ars tells you how to obtain and install one, for free.
Anyone operating a server on any scale should want a digital certificate to encrypt data between clients and services, whether for personal, office, or public use. That's a broad statement, but it holds true no matter how you slice it.
With so many people accessing networks over WiFi or other untrusted networks for an increasing number of different kinds of services—calendars, contacts, Webmail, email, and so on—encryption is a must, whether via a VPN or by securing services one by one. While I recommend VPNs, they aren't always the practical, affordable, or correct solution. For remote email access, SSL/TLS is simpler and more straightforward, and you don't have to compromise on protection in the process.
There can be something technically imposing about getting and installing a digital certificate, even though it has a high utility value, so I'm here to make it easier by breaking it down into steps that someone without encryption and command-line knowledge should be able to work with.
I'll start with an explanation of how digital certificates create encrypted sessions. Then I'll describe how to get a free certificate from StartCom as a simple case, before giving a few examples of how to install your certificates.
Secret handshakes

A digital certificate comes in the form of server-side TLS certificate. TLS stands for transport layer security, and in common use it's a method of combining the advantages of public-key cryptography, external third-party (out-of-band) validation, and per-session encryption.
(TLS is the modern name for SSL, the preceding standard. This method is sometimes called SSL/TLS to signal to people who know the older name that it's the same thing; here, let's just call it TLS.)
Public-key cryptography lets one party send information to another, hidden by a public key that can be freely distributed. The receiving party has a private key which is kept strictly secret, and which is the only component which may extract the original message from the public-key-encrypted payload.
Public keys are unwieldy for encrypting long strings of text and for fast encryption of streams of data, such as files being transferred via email or website transactions. Philip Zimmermann created PGP in 1991 as a way around this. The public key transaction is used to exchange a strong session key that's symmetric: both parties use the same key to encrypt and decrypt data. The key is passed in perfect security via the public-key transaction, making the process impenetrable to sniffers and "man in the middle" attacks.
Certificates can be generated for domain names and other data by pretty much anyone; the party generating the certificate doesn't have to be the legitimate owner of the domain or data. So, just as with PGP and the open-source GPG alternative (and SSH and many other similar methods), you need an out-of-band method to validate that party issuing the certificate is really who they say they are.
That's where certificate authorities (CAs) come in. A CA is a group that provides some validation, from cursory to extensive (in the case of Extended Validation certificates), that the party that signed up for a certificate for a given domain name is approximately that entity.
When you connect via a browser to a secure website, for instance, the browser does some handshaking with the server, receives a certificate which contains a public key and some other fielded data, and then turns to a CA to confirm that the certificate is valid.
CAs are preinstalled in browsers, client software, and operating systems, so that the CA itself is validated by the software developer or OS maker. That's where the out-of-band trust comes for the CA!

Firefox alerts you when StartSSL asks for a personal certificate with which to authenticate yourself.

If the browser is mathematically convinced that the certificate is from a valid party for that domain, a key is exchanged, and a session is encrypted.
You can sign your own digital certificates, essentially acting as your own certificate authority, but that's a problem. Because a client and/or OS doesn't know that GlennFleishmanCA is a real authority, the client or OS has to prompt a user to accept an untrusted relationship. Depending on the process, the user may be able to trust a session or not, or to accept a CA's authority permanently.
In an organization, a self-signed cert can work because you can either tell everyone to accept the signing certificate's authority, or you can preinstall the root authority for your own CA in each person's computer. (That can be as simple as dragging a file into a system-wide key manager, clicking import and importing it, or clicking through a couple of dialog boxes.)
But instead of all that tedium and management, especially as new employees or colleagues come and go, it makes more sense to get a fully CA-validated certificate. And you can get one for free.
Start with StartSSL

StartCom's StartSSL service offers a Class 1 certificate at no cost, with fees for higher levels of identity validation (see the site's chart for comparisons). A basic Class 1 certificate doesn't validate all your details; email to a known domain contact address is the only real check. A Class 2 or 3 certificate with your identity or your organization's identity is $40 for two years. An extended validation certificate, which uses an industry standard for checking a submitter's details, is $110 for two years, and will tell a browser to show a green bar on connection.
While StartSSL is free, it isn't a clear process to those that haven't created a certificate before. Let me tell you how to walk through the site.
StartSSL uses an S/MIME personal certificate to let you log in after sign-up. This is certainly more complicated than requiring a username and a password, but it's ostensibly much more reliable because you have to have this cert, which can't be intercepted over a network or captured through keystroke monitoring. Direct access to someone's computer, likely with additional passwords, would be required to access it. (After creating the S/MIME certificate, you can use it to sign emails in programs that support S/MIME.)
(Note: Safari 4 under Mac OS X doesn't correctly interact with StartSSL's site for certificate download, validation, or menu selection. Use Firefox in Mac OS X or Firefox or Internet Explorer under Windows instead.)

Firefox manages personal certificates in its Preferences window under Advanced > Encryption > Your Certificates

Start at the Authenticate or Sign-Up page.Click Sign-up.Fill out the Personal Enrollment details and click Continue. (StartTLS offers many imprecations against trying to falsify data here.)Check the email account for the address you provided in step 3, get the validation code, and enter it, clicking Continue to proceed.Next, StartSSL will generate the private key needed for the client certificate it provides to you for authentication. There's no good reason to choose anything but 2048 (High Grade) as the option. Click Continue.Click Install when the Install button appears. This should be an automatic background process. In Firefox, the certificate is installed into an internal database, from which it can be exported. (If you want to use these credentials with another browser, you can download them again from within the StartSSL website, or you can export the certificate from Firefox and drag into or import into another browser on the same or a different computer.)Click Finish, and you're taken to an authenticated control panel page.

again! As more than a few of you know, I have been updating my nephew's computer for sometime; I was sick for the last month or so which is why it is only getting FINISHED now. At the beginning of January, some of my lounge hero's guided me through a difficult problem with the OS, reformatting it and getting the OS back on.
I have spent a considerable amount of time reading the motherboard manual, going to the Crucial website to order additional memory and kept plenty of Print Screens from Googling what to do with memory problems which helped immensely.
I have Googled the information I am asking for help with now and can not come to a consensus. It seems as if there should be a simple choice with a simple explanation but I am unable to find it. I have come across numerous different answers so now I am turning to the PROS for help.
Now for the question: How should the following drives be set up inside the computer?
1. The original HD with the OS is a WD Caviar 80GB dated 12/2004 with 7200 rpm.
2. The new hard drive is a WD Caviar Blue 250 GB dated 12/2008 with 7200 rpm.
3. There is also a CD-R/RW/DVD ROM that was with the original build and is dated 11/04.
4. And I am adding a DVD R/RW & CD-R/RW that I just took out of my computer for an upgrade (dated 03/2006.)
I purchased two new UV ATA-133 IDE cables as the ribbon cables are crispy. And for my pure enjoyment, I purchased an assortment of computer screws. I know most of you could build an extra computer with the parts you have sitting around but I am not in that category (yet or for a while to come!) Need a laugh? I am doing this upgrade with one USB mouse that I switch from one computer to the other as needed and am driving myself nuts! Can't drive yet . . . should have ordered one from with the HD, 2GB of memory and the cables and screws but I forgot . . .

I have read that putting the two HD's on one cable slows them down to the lowest speed but if they are both 7200 does that make a difference. I have also read that pairing a HD with a CD or DVD drive can significantly slow the HD down. What is the optimal set up in this situation and almost as important - WHY? Always want to learn.

I also have a question regarding the CPU just for the record. It is a "unknown 1150Mhz" CPU (also found the following: x86 Family 6 Model 10, Stepping 0 Authentic AMD 1143 Mhz.) and I haven't had to remove a fan yet so I hesitate to cause any additional headaches at this point. The $$ for a motherboard upgrade is not and will not be a priority for sometime; should I have considered an upgrade to the processor? I know that only certain ones go on the motherboard and that it is an ASUS A7N8X-X. How much of a change would I have noticed? Would it have been a cost effective decision? I've already spent $150 on this gift and the DVD R/RW. Just wondering what your esteemed thoughts on this are!
As soon as this is straightened out, I can actually close the case and work on loading the software. Good thing I have until Sunday!

Thanks for your time, as always. I apologize for this being too wordy!


Main computer sharing printers/folders on the network runs Windows 7 Home/Premium 64-bit. Password protected sharing is turned off but machine keeps asking for username and password authentication. One computer on the network (running Windows XP Pro) is able to access shared files but all other computers are asked for a password.

Problems began when we unhooked the router and hub and moved computers around but everything is hooked up correctly - the Internet and the network work. Only problems have been with WINS - not all computers seem to be able to see each other on the Workgroup anymore. Have tried connecting to different ports but authentication on main computer continues to be an issue.

Hi. We have a domain (let's say, Domain1) and a NAS Server. This NAS Server uses Windows Active Directory to authenticate user access. Everybody using Windows 7 and MAC can access the NAS Server using their Windows password. We have another branch in another country (let's say, Domain2). That user is visiting our country and office, and needs access to the NAS Server. That user is already joined to Domain2. I tried connecting to our NAS Server using my credentials (and other user credentials from Domain1), but Windows 7 kept asking for the password. How do I connect the user from another domain to our NAS Server using Windows 7? Thanks.


There are problems transferring files between my laptop and my phone. The symptoms I encountered are strange and I hope for a comprehensive explanation and solution to the problem

Computer Windows 7 64 Bit
Phone Android 4.0.3
Drivers are all up to date, using Windows Device Manager.
Both devices successfully paired.
Bluetooth is on.

I will describe the steps of my experience in sending and receiving below.

Sending file from computer to phone

Method 1
Right clicked "Bluetooth Devices" icon in system tray > Clicked on "Show Bluetooth Devices" > Right clicked on Bluetooth Device (my only Bluetooth Device) > Clicked "Control" > Clicked "Send files to phone" > Clicked "Browse Files..." > Chose my file > Clicked "Send" > Sending Dialog popped up > On my phone, was asked to authenticate, clicked yes > Sending complete.

In the above steps, sending is SUCCESSFUL.

Method 2
Right clicked on the exact same file I successfully sent above > Click "Send to > Bluetooth" > Bluetooth Send Wizard pops up > Clicked "Next" > Selected Bluetooth Device > Clicked "OK" > Displayed Error Bluetooth device not found. Please verify that your Bluetooth device is properly connected and turned on.

In these steps. sending is NOT successful. Please help me identify why.

Next, I will move on to sending file from computer to phone.

Method 1
Using the exact same file on phone, tapped "Send via Bluetooth" > On the phone displayed Bluetooth share: Sent 1 failed. On the computer nothing happened, no notifications at all.

In these steps, sending is NOT successful.

Method 2
Clicked Start button > Typed "fsquirt" in Run > Bluetooth File Transfer dialog popped up > Clicked "Receive files" > Displayed "Waiting for connection" > On phone, tapped the same "Send via Bluetooth" > Bluetooth File Transfer on computer shows sending progress > Sending complete.

In the above steps. sending is SUCCESSFUL.

Can someone explain to me the discrepancies in my experience in sending and receiving between the computer and phone? The 2 devices are obviously connected and sending is possible, so why does 1 method work while another does not? What happened?

I shall refer to the above sending and receiving methods as Sending 1, Sending 2, Receiving 1 and Receiving 2.

When 'Control' dialog box with the "Send files to phone" option is opened,
Sending 2 becomes SUCCESSFUL
Receiving 2 becomes NOT successful.

Would it make any sense to install a copy of XP Professional (retail) in a virtual machine in order to test the Activation Key for authenticity?

The reason I ask is that I purchased a used copy of XP Pro retail version for the key that I need to migrate my existing installation to the new pc I intend to build. However I am not ready to build it at this point but I still want to confirm that I have a genuine and available key. If you all think its a good idea, what would be involved in doing so, and what would I need to do to uninstall it when I am ready to reuse the key on the new machine.

If you think it's a bad idea, what would you suggest I do to validate the key?

Thanks in advance!

Every time I want to do certain things a pop up appears that ask me for authentication How do I disable this feature it is more irritating than the Windows UAC

I am trying to disable the ability of users to save
passwords in IE. I know that I can shut off the 'Prompt to
remember passwords' section in autocomplete in policy
editor, but I am trying to disable the saving of passwords
in instances where a website wil pop up a box asking for a
uasername and password (usually for
windows/router/firewall authentication). Does anyone know
how to do this?

In MS Access I would like to use the NT login ID in a parameter I am sending to SQL Server via ODBC Direct to execute a stored procedure. I know I can ask the user to enter it again but if I can use the authenticated user ID from NT, security obviously goes up several notches.

My goal is be able to check for it when a submit button is clicked on the form, which then asks for the stored procedure to execute and return a record set to Access. The ODBC thing is working now I need the NT ID to go with it as a parameter.

I belive I am going to have to call a win api to get this done which will all be new to me, so any and all help as to how this would be done would be greatly appreciated.


A friend had run out of space in his 2 GB HD so I added a 8GB HD and unistalled Office 2000 Pro then re-installed to the new HD. Then installed SP1 with no problems. But when I tried to install SP3 the update window showed updatinng Microsoft Office Professional SP1 Disk 2 and at the authentication step asked for a file called "data2.msi" . Of course the normal authentication request is for "data1.msi" - and the original CD does not include any file "data2.msi" . Soo the upgrade was rejected.

Please would someone tell me what has happened and how to install the Office 2000 SP3.


I would like to use the NT login ID in a parameter I am sending to SQL Server via ODBC Direct to execute a stored procedure. I know I can ask the user to enter it again but if I can use the authenticated user ID from NT, security obviously goes up several notches.

My goal is be able to check for it when a submit button is cliked on the form which asks for the stored procedure to execute and return a record set to Access.

I belive I am going to have to call a win api to get this done and which will all be new to me so any and all help as to how this would be done would be greatly appreciated.

As usual I arrive at this page very confused about what to do next.

I run a website for a group I belong to, so I guess that makes me the administrator(?) however today when I have tried to access the page it says that I am not authorized to view this page and asks me to put in a user name and password. I've tried on both Firefox and IE. The page should be freely available to be viewed by anyone and a password is not needed to view the site. I've searched for the page via Google, and have the same problem. Tried on a different computer and still its asking for a user name and password.

I've put the error code, 401 in the Microsoft Help and Support site and it tells me to ...

To resolve this problem, enable at least one authentication method. To do this, follow these steps:

1. From the Start menu, point to Programs, point to Administrative Tools, and then click Internet Services Manager.
2. Under the Tree pane, browse to the desired Web site.
3. Right-click the Web site, and then click Properties.
4. On the Directory Security tab, under Anonymous access and authentication control, click Edit.
5. Select (and implement) at least one type of authentication method.

The only place I can find Admin Tools is in the control panel, and I'm reluctant to start messing about if this is not the problem and wary of putting my administrators user name and password in case it is something more suspicious if you see what I mean ..... just wondered what you guys thought


I recently set up a wireless network for my new Sitecom WL-585 modem router with WPA-2 security and all went according to plan. I have a Win 7 laptop, Vista laptop, XP laptop, Nokia N95 and Soundbridge all connected. After initially setting up the Win 7 laptop, in the case of the others I was asked for the security code and the connection was duly established.

I am now trying to connect a friend's laptop, it is an ageing Toshiba Satellite M70-215 and from what I have been able to gather it is running Service Pack 2 and has only 512 MB RAM. First of all I tried to connect using the built-in wireless, even after updating the driver, no network is found. I then tried installing the supplied Sitecom N adapter, after some problems the network appears but I can't connect, I am told "Windows was unable to find a certificate to log you onto the network" I read several threads that led me to uncheck "Enable IEEE 802.1x authentication for this network" and I actually managed to enter the WPA2 code but this just leads to the message "This connection has limited or no connectivity" and "validating identity". In any event I am finding that after rebooting the WPA2 code is no longer there and it has reverted back to Open WEP.

I also tried the option:
Network And Internet --> Network And Sharing Center --> Add a wireless device to the network

but again nothing is found

I downloaded this:

and nothing seems to have changed.

I tried to connect to the LAN using Ethernet (again after updating the driver), although I am apparently connected I can't reach the Internet and can't see what settings might need tweaking.

I am fast running out of ideas and wonder whether the laptop's wireless capabilities simply aren't up to it? Thanks for any advice


I have a database that is totally restricted with all users accessing as the Admin user member of the Admins group which has been completely set up to have read only permission for all actions. I do not want to have all my users added into a workgroup as this will be too time consuming and difficult. So everone can log on but can do nothing damaging only view the data.

I want to allow certain users Supervisor and Administrator members of the Supervisors and Administrators groups to be able to put a password on Admin, and then sign in using their ID and PW. These guys will be added to a workgroup.

This is to be controlled by a password form, I will ask for their ID and PW check they are OK and bring up the change PW form, to set an admin PW. I can't seem to find any code that will allow me to authenticate the password.

Any ideas or suggestions of a better way to do this?

I have problem networking Win7sp1 with Win2000sp4. Please assume I have to keep Win2k and Win98. I use USB devices and DVDRW as a stop gap solution for now.
I'm tired after a day's un-work. Might as well ask for help.
The problem:
Networking is OK between Win7 and XP PCs, but not between Win7 and Win2k PCs. (Forget Win98 for now.)

I'm referring to hard wired local nets (LAN).
All PCs are with fixed IP addresses between
Also want to network Win98se but it is in back burner for now.

Win7 can see XP PCs and their public, shared folders/files and hard drives.
Win7 can ping Win2000 but Win2k PC does not appear under 'Network' in Win7 folder explorer (Windows Explorer).
Likewise, Win2k can ping Win7 but cannot see Win7 in Windows Explorer under 'Network' folder.
Win2k can see all the XP PCs no problem.
(Besides TCP/IP protocol, I have Netbeui on XP and Win2k also. Note that Win7 has no NetBeui. But XP and Win7 see each other OK, so it is not NetBeui problem.)

Data points:
Win7sp1 is 64-bit Home Premium. The rest Windows are 32 bit systems.
On Win7 and XP, network properties, TCPIPv6 protocol is installed, together with TCPIPv4. TCPIPcv6 was on/off in the tests but has no effect. Dido on QoS on/off.
All PCs have same network group name, such as MYNET, for example.
In all PCs, all software firewalls=off.
For safety, router to outside world is disconnected during tests.
All virus software=off on all PCs. In fact, I uninstalled them as a last ditch!
All PCs are connected via hard wire Cat5e cable to a single switch. No, the switch is not the router. The switch is a standalone 8-port switch.
Yes, had tried another switch, 100Mb/s, 1Gb/s, 10Mb/s oldie even.
Had tried connecting only 2 PCs, Win7 and Win2k, to a single switch.
Had also changed Cat5e cables just be sure.
All PCs can access Internet via the router if the router is connected to the network.
NetBeui on XP and Win2k, installed or uninstalled, has no effect.
All PCs have fixed IP addresses (hence, not relying on DHCP).
Yes, I set Win7 network encryption from 128-bit to 56 bit.
File sharing is on in Win7. No password required.
Yes, some folders in all PCs are set to publicly shared. Access policy on these folders/sub folders is 'Everyone' and 'Full control'.
I also edited Win7 Network Security Policy to enable lower authentication methods. (Had tried both default and the edited policy.)
Anonymous access is off. (Is this THE problem? But then would be a security problem.)

I peruse the Internet for solution also, including MS on networking Win7 and old versions of Windows. (MS never mentions old as Win2k and Win98.) I've read Windows Secrets and forums re networking, including recent Fred Langa articles on networking Win7 and XP.
A light bulb goes up while typing. Will computer name longer than 10 characters affect networking? I know XP and Win7 do not. But DOS type old OSes may impose 8-10 characters limit.
Wait, the Win2K computer name is FamRm, Win7 name is short too, less than 8 characters. So much for a light bulb lighting up. It must be the old incandescent type!

Out of frustration I ask another question:
What is hiding behind the network names in Win7: 'Home Group', "Work' networking, and 'Public' networking?
I read about the explanational description alright. I want to know what they do behind the name, such as security policies, network binding, firewall settings, etc.

Another question:
I now long for the simple NetBeui protocol. (Great for 50 or less PCs.)
If all else fail, can there be a way to install Netbeui on Win7?

NetBeui is much more secure. In Win95, Win2000 days, I bind file sharing to only NetBeui, and not to TCPIP. This single step prevents www access to the local net completely. Yeah, NetBeui is 'noisy'. So what? There are only NetBeui and TCPIP traffics on the wire in home use.
And our ears cannot hear the noise! ... OooK, it's a joke.

A friend reformatted his hard drive and was reloading his programs but when he tried to install Home Essentials 98, it asked for a product code and he can not find his authenticity certificate. Is there anywhere that we can find his product code. He is not trying to do anything illegal - the disks came with his computer. He just needs the code to reinstall the program.

Nearly 2 weeks ago my home PC came down with a severe case of malware. I went to GeeksToGo and enlisted the aid of one of their experts, and aside from the necessary time delays between posts, applied fixes and reports back, it has been going ok. The only problem I have left at this point, though - as far as I can tell - is that I can't log into websites. For example, I am posting this from my work laptop because I can't log into WOPR from my home PC - I'm told I have to enable cookies. Trouble is, I DO have cookies enabled.
I first noticed this problem in GeeksToGo, when I would log in to post an update. I could log in, but when I went to page 2 of my thread, I would get logged off. And when I tried to actually post to the thread, I got a message I was not authorized to post to that thread, even though I had just entered my ID and password.
So far I've noticed similar problems on eBay and Amazon; eBay simply does not recognize my password. When I go there it shows my userid, but when I type in my password it comes right back and asks for it again. No message to say that I typed it in wrong... it's more like I never typed it in in the first place. When I type in the WRONG password there I DO get a message saying so, so it clearly isn't that.
I've gone to Internet Options/Security/Custom level/User Authentication, and it was set to Automatic logon with current username and password . I changed it to Automatic logon only in Intranet zone , which is the setting on my work laptop. That didn't help. Neither did changing it to Prompt for username and password . And Anonymous logon - I just didn't think that was a very good idea.
I know the guy on GeeksToGo is doing his best and that he has a life, and is probably working on other problems there besides mine. So I'm not complaining about him at all. But two weeks of this is enough to drive anyone batty. Any ideas as to what else I can check?

I have a Inspiron laptop with an Intel Pro a/b/g wireless card in it. The Device Manager shows that the card is working. My router is a/b/g/n with an SSID broadcasting, open authentication, and WEP encryption. 5 of my other computer connect with no problem. My Vista laptop has a problem, though. When I go through the normal wifi connection dialogue, it sees the SSID of my router. When I select connect, it spins a while and then comes back and asks for the key and also a Domain Name. I have not configured any domains, and have no idea what to try to tell it. Leaving this field blank doesn't work.

From the laptop's Command prompt, ping of the router IP fails. When I type the ipconfig command, the assigned address is

Appreciate any help.


PS- I am wondering: under what conditions does Vista try to get a Domain Name for its wireless connect dialogue?

Changing the HOST file on a PC has been covered but I had to hunt a bit to find the information I needed to be able to work with HOSTS on my iMAC O/S 10.4.11. John's post 718,421 reminded me that I had entered this information on my iMAC way back when and I needed to remove the IP information for wopr.

The way I accomplished the task to work with my HOSTS file follows:

Download a free text editor - Smultron 3.5
Download a free utility for viewing hidden files and folders - TinkerTool 3.9
And install them of course!

After using TinkerTool to make hidden files/folders visible, I open the Finder, click on Macintosh HD , click on etc folder. There are items in this folder that use the same name and have extensions, but the file you need to work with is HOSTS without the file extension. Right click on the file and choose "open with" and use Smultron. Now you can add to, delete, etc. from your HOSTS file.

Before saving your file, check your Preference for Sumatron and choose the item under "When Saving" Assign document to Smultron and use "Line endings: Leave unchanged".

I have always made a habit of using "Save As" instead of just "Save" so I am certain where I'm saving my file to, but I see there is also a choice in Preferences to "Save As: Use folder of current document" so I do have that choice selected as well.

When you do save, you may be asked to "authenticate" before being allowed, so use your admin name and password to do it.

When I am done, I use TinkerTool to reset my files and folders to hidden

Page 1 of 2.
Results 1...20 of 39