[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

disabled control & extensions files

Posted on 1998-10-19
1
Medium Priority
?
257 Views
Last Modified: 2010-08-05
How to I make my control and extensions panels undisabled?
0
Comment
Question by:ShelleyK
1 Comment
 

Accepted Solution

by:
Aurelius earned 150 total points
ID: 1536783
Hi Shelly.  What control panel/extensions are you referring to?  How do you know they are not enabled?

A disabled control panel / extension is generally inside the "Control Panels (disabled)" or "Extensions (disabled)" folder inside your system folder.  You can literally go into these folders and enable any disabled items by moving them to the "Control Panels" folder or "Extensions" folder, and vice-versa.  If you are using a recent enough System you may be able to do this through a Control Panel called "Extensions Manager".
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

iCloud Drive was introduced after iOS 8 was launched last year. This drive is Apple’s online storage device that lets users sync their files and access them from all their Apple devices.   There is a lot of data that is not automatically backed up…
Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question