Solved

3Com/Win Protection Error

Posted on 1998-02-20
3
141 Views
Last Modified: 2013-12-16
System setup:
P150/32
S3 Video
ATAPI IDE CDROM
Cable Modem Road Runner
3-Com Etherlink XL TPO 10Mb

It's funny cuz I get "Windows Protection Error" on bootup
when I install new software that requires a re-boot.  Well the only way I found to resolve this problem is to Safe Boot
and remove the Network Adapter, reboot, and reinstall
the drivers again.

Has anyone encountered this kind of problem?
Thanks for the input.
0
Comment
Question by:dpeng
  • 2
3 Comments
 
LVL 25

Accepted Solution

by:
dew_associates earned 100 total points
ID: 1754540
DPeng, most, if not all, Windows Protection Errors occur because a Real Mode driver has been loaded and when windows switches to it's dynamic or Protected Mode interface, it tries to load a protected mode driver and that's when the protection error occurs. First, using Wordpad open and check your system.ini and win.ini for any Load= or Run= statements and if they exist put a semi-colon in front of the line like this:  ;Load= and save the file. Next, as a test, rename your config.sys to config.xxx and you autoexec.bat to autoexec.xxx and then reboot the system and see if that helps!

Let me know!
Dennis
0
 

Author Comment

by:dpeng
ID: 1754541
Well, I found a way to resolve it.  I changed the resource
address and it stop giving me the protection error.  God, plug
and play is just not full proof.
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 1754542
Isn't that the truth. Check the real mode/protected mode issue anyway though just to be safe! BTW: Why give me a "D" grade, you could have rejected the answer!
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
outlook and exchange information 3 33
Batch file to convert a xlsx file to csv 5 97
Runas admin but use local user profile 3 35
virus question? 6 71
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question