Solved

winsock 2.2 reversal to winsock1.1....How?

Posted on 1998-05-20
4
163 Views
Last Modified: 2013-12-16
I submited this question once already and the directions given wont work cause I cant rename
even though I have nothing running and I changed the file from archive to read only. It wont let me delete the ws2_32.dll file either. Now what?
0
Comment
Question by:DocPirch
  • 2
4 Comments
 

Author Comment

by:DocPirch
ID: 1755966
I tried it as you said in Dos.......guess what?...I had to rename it back cause none of my web appts would run "cant find file Wsock32.dll, a required file"..seems I have to put up with this shaky version of Winsock or can I get the newest upgrade?..If so where?
0
 

Expert Comment

by:Jegrede
ID: 1755967
Please clarify:  the newest upgrade is 2.2, what exactly do you want?  Your previous question stated that you wished to downgrade to 1.1.  Do you wish to do this or stay with the newest version?
0
 
LVL 2

Accepted Solution

by:
aszure earned 50 total points
ID: 1755968
Well you dont want to make them read only because then you cant modify it. Then if you want to downgrade what you want to do next is to reinstall dial up networking. You can do this from the control panel--add remove programs-windows setup-communications. Then remove the check mark and reboot and then do the same thing and put the mark back in and reboot.
0
 

Author Comment

by:DocPirch
ID: 1755969
what I mean is if I cant reinstall the 1.1 is there a non beta winsock2.2 that isnt so shaky?

0

Featured Post

Too many email signature changes to deal with?

Are you constantly being asked to update your organization's email signatures? Do they take up too much of your time? Wouldn't you love to be able to manage all signatures from one central location, easily design them and deploy them quickly to users. Well, you can!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now