Solved

Windows Explorer Plus Sign on Bottom Level Folder

Posted on 2001-07-17
7
178 Views
Last Modified: 2010-04-13
I'm running Windows 2000 Professional on a Compaq PII-450, I upgraded this machine from Windows 95 OSR2 a few months ago. I'm running Internet Explorer 5.5, in case that makes a difference.

I've noticed that in Windows Explorer, folders with no subfolders under them have "[+]" plus signs next to them, as if they could be expanded. Clicking on the plus sign doesn't remove it like I remember happening in Windows 95, nor does double-clicking the folder.

This behavior happens in all Windows Explorer windows, whether on networked drives or directly on my C drive.

If this is the way Windows 2000 is supposed to act, I'll award 50 points to whoever gives the most thoughtful response telling me so.

If someone can come up with a registry fix or something to make this behavior go away, I'll award 100 points.
0
Comment
Question by:Eufracia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 10

Expert Comment

by:tonnybrandt
ID: 6291726
I can confirm that it is not standard behavior. It is supposed to act just like windows 95.
Try this:
Click Tools | Folder options, and click the button "Restore Defaults"

Not sure it will solve anything, but it's worth a try.
0
 
LVL 1

Author Comment

by:Eufracia
ID: 6291739
Nope, no luck there. Other suggestions, anyone?

Nice try, Tony.
0
 
LVL 10

Accepted Solution

by:
tonnybrandt earned 50 total points
ID: 6291770
Try saving the following export from my win 2000 registry as folder.reg, rightclick it and choose merge:
------copy from the next line and down------------
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\Folder]
@="Folder"
"EditFlags"=hex:d2,03,00,00

[HKEY_CLASSES_ROOT\Folder\DefaultIcon]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
  00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,00,68,00,\
  65,00,6c,00,6c,00,33,00,32,00,2e,00,64,00,6c,00,6c,00,2c,00,33,00,00,00

[HKEY_CLASSES_ROOT\Folder\shell]

[HKEY_CLASSES_ROOT\Folder\shell\explore]

[HKEY_CLASSES_ROOT\Folder\shell\explore\command]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
  00,5c,00,45,00,78,00,70,00,6c,00,6f,00,72,00,65,00,72,00,2e,00,65,00,78,00,\
  65,00,20,00,2f,00,65,00,2c,00,2f,00,69,00,64,00,6c,00,69,00,73,00,74,00,2c,\
  00,25,00,49,00,2c,00,25,00,4c,00,00,00

[HKEY_CLASSES_ROOT\Folder\shell\explore\ddeexec]
@="[ExploreFolder(\"%l\", %I, %S)]"
"NoActivateHandler"=""

[HKEY_CLASSES_ROOT\Folder\shell\explore\ddeexec\application]
@="Folders"

[HKEY_CLASSES_ROOT\Folder\shell\explore\ddeexec\ifexec]
@="[]"

[HKEY_CLASSES_ROOT\Folder\shell\explore\ddeexec\topic]
@="AppProperties"

[HKEY_CLASSES_ROOT\Folder\shell\open]

[HKEY_CLASSES_ROOT\Folder\shell\open\command]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
  00,5c,00,45,00,78,00,70,00,6c,00,6f,00,72,00,65,00,72,00,2e,00,65,00,78,00,\
  65,00,20,00,2f,00,69,00,64,00,6c,00,69,00,73,00,74,00,2c,00,25,00,49,00,2c,\
  00,25,00,4c,00,00,00

[HKEY_CLASSES_ROOT\Folder\shell\open\ddeexec]
@="[ViewFolder(\"%l\", %I, %S)]"
"NoActivateHandler"=""

[HKEY_CLASSES_ROOT\Folder\shell\open\ddeexec\application]
@="Folders"

[HKEY_CLASSES_ROOT\Folder\shell\open\ddeexec\ifexec]
@="[]"

[HKEY_CLASSES_ROOT\Folder\shell\open\ddeexec\topic]
@="AppProperties"

[HKEY_CLASSES_ROOT\Folder\shellex]

[HKEY_CLASSES_ROOT\Folder\shellex\ColumnHandlers]

[HKEY_CLASSES_ROOT\Folder\shellex\ColumnHandlers\{0D2E74C4-3C34-11d2-A27E-00C04FC30871}]
@=""

[HKEY_CLASSES_ROOT\Folder\shellex\ColumnHandlers\{24F14F01-7B1C-11d1-838f-0000F80461CF}]
@=""

[HKEY_CLASSES_ROOT\Folder\shellex\ColumnHandlers\{24F14F02-7B1C-11d1-838f-0000F80461CF}]
@=""

[HKEY_CLASSES_ROOT\Folder\shellex\ColumnHandlers\{66742402-F9B9-11D1-A202-0000F81FEDEE}]
@="Version Column Provider"

[HKEY_CLASSES_ROOT\Folder\shellex\ColumnHandlers\{7f9609be-af9a-11d1-83e0-00c04fb6e984}]
@="Fax Tiff Data Column Provider"

[HKEY_CLASSES_ROOT\Folder\shellex\ColumnHandlers\{884EA37B-37C0-11d2-BE3F-00A0C9A83DA1}]

[HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers]

[HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers\NavNT]
@="{067DF822-EAB6-11cf-B56E-00A0244D5087}"

[HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers\WinZip]
@="{E0D79304-84BE-11CE-9641-444553540000}"

[HKEY_CLASSES_ROOT\Folder\shellex\DragDropHandlers]

[HKEY_CLASSES_ROOT\Folder\shellex\DragDropHandlers\WinZip]
@="{E0D79305-84BE-11CE-9641-444553540000}"

[HKEY_CLASSES_ROOT\Folder\shellex\ExtShellFolderViews]

[HKEY_CLASSES_ROOT\Folder\shellex\ExtShellFolderViews\{5984FFE0-28D4-11CF-AE66-08002B2E1262}]
"PersistMoniker"="file://%webdir%\\default.htt"

[HKEY_CLASSES_ROOT\Folder\shellex\PropertySheetHandlers]

0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 
LVL 1

Author Comment

by:Eufracia
ID: 6309299
Tonnybrandt,

Sorry, no luck with the .reg file, even after rebooting I still have the same behavior. I appreciate your effort though.

--Eufracia
0
 
LVL 1

Author Comment

by:Eufracia
ID: 6488183
Tonnybrandt,

You know what? The problem went away, seemingly by itself. I don't know, maybe it was due to importing the registry keys that you suggested, maybe not, but it only seems fair to give you the benefit of the doubt and award you the points.

Eufracia
0
 
LVL 10

Expert Comment

by:tonnybrandt
ID: 6488229
Thank you. It is appriciated.

Regards
Tonny
0
 
LVL 1

Author Comment

by:Eufracia
ID: 6878247
Turns out this was due to my having the IE6 beta installed. Once I upgraded to the full version, the problem went away, though I didn't realize it until later.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
In a recent question (https://www.experts-exchange.com/questions/29004105/Run-AutoHotkey-script-directly-from-Notepad.html) here at Experts Exchange, a member asked how to run an AutoHotkey script (.AHK) directly from Notepad++ (aka NPP). This video…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question