Solved

shortcuts and programs won't run

Posted on 1998-04-09
4
196 Views
Last Modified: 2010-04-12
A friend with a p133, win95, 16 meg ram, running Communicator 4 downloaded Quicktime's 16 bit movie player. During installation he got a message saying "severe - internal compression library file error. Unable to enumerate files in compressed library." He bailed out -- actually turned the computer off! Now when he tries to run programs, either from shortcuts or the start menu, the install shield pops up, telling him "this will install quicktime and QT browser plug-in (16 bit). If he continues, he gets the compression error -- if he doesn't, he goes back to the desktop. He's able to run my computer and control panel, but isn't able to delete quicktime, even after shutting down everything but explorer, systray and rnaapp (real audio?) using crtl-alt-del. I don't know what else to suggest.
0
Comment
Question by:sherm
  • 2
4 Comments
 
LVL 7

Expert Comment

by:busuka
ID: 1019003
Try to clean \Windows\Temp directory (or whatever SET TMP or SET TEMP points to).
Check StartUp folder, in SYSTEM.INI run= and load= lines. Maybe you'll need to clean
registry by exporting it to text file and importing it back. It's possible from DOS. Do you
get errors when you boot into Safe Mode (F8 upon startup brings menu, where you can
select it) ?
0
 

Accepted Solution

by:
pleaj earned 120 total points
ID: 1019004
Try what busuka suggests, but it sounds like your friend downloaded a corrupted file.  Try downloading it again, if you can get your browser to work, or just download a copy to your computer and give it to your friend.  when he installs the real deal it should work fine.
0
 

Author Comment

by:sherm
ID: 1019005
Okay, I'll try that, but I need a little help with busuka's answer. How do you clean the temp directory? Should I empty it?
What do I do with the run= and load= lines? And how do I go about cleaning the registry?
0
 
LVL 7

Expert Comment

by:busuka
ID: 1019006
Yes, right after Windows bootup remove ALL files in it. It's absolutely safe. Now run=
line, check if it has something. If it contains some info after = try to remove it, so it'll
look like run=
Do the same with load= (backup file WIN.INI first). BTW, I mistyped, these lines are in
WIN.INI not in SYSTEM.INI file.
RNAAPP is some run-time module for dial-up. It doesn't connected with your problem at
all.
Now, can you run REGEDIT ? If you can, then just click on Registry in menu and select
Export registry file, then you'll be asked in which file you want export (usually .reg). Then
boot to DOS command prompt and run REGEDIT /C MyReg.reg
where MyReg.reg is file where you exported registry.
Note1!: first of all: backup your registry (SYSTEM.DAT and USER.DAT) into safe location,
open some directory, say RegBack, for this purpose.
Note2: in process of creation registry in DOS REGEDIT may hang, if it happened, boot to
SafeMode, run REGEDIT and click on Registry -> Import registry.

If you can't run REGEDIT from Windows, you can run it from DOS. Just run it with /? to
get list of options.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Docker for Windows 2016 5 74
SATA Data & Power - Are They Independent ? 8 76
How to size a UPS 2 31
Looking for a laptop computer  that match my needs 5 25
In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question