Solved

NOTON ANTI VIRUS UPDATE

Posted on 2002-03-13
2
476 Views
Last Modified: 2008-02-26
I UPDATED MY NORTON ANTI VIRUS SOFTWARE BY DOWNLOADING FROM THE NET.  NOW I AM UNABLE TO OPEN MY EXCELL...WHEN I TRY TO OPEN IT I GET THE MESSAGE THAT IT HAS PREFORMED AN ILLEGAL OPPERATION AND WILL BE SHUT DOWN...CONSEQUENTLY I AM UNABLE TO USE MY EXCELL...DOES ANYONE HAVE ANY IDEA WHAT I CAN DO TO FIX THE PROBLEM...I HAVE ALREADY TRIED TO PUT HE EXCELL DISK BACK IN AND LOAD IT AGAIN...

I AM UPDATING MY INFORMATION...I DOWNLOADED THE UPDATE FROM NORTON BECAUSE I GOT A NOTICE THAT I NEEDED TO UPDATE MY SOFTWARE..
0
Comment
Question by:sallymessner
2 Comments
 
LVL 1

Accepted Solution

by:
JconleyMCSE earned 50 total points
ID: 6861772
When you say that you updated the software, did you update the software itself or just the virus signatures? Either way, I would temporarily remove Norton Anti-virus and then try to run Excel. Assuming that is successful, I would then reinstall Norton and see if that fixes your issue.

You could also REMOVE Excel and then reistall it. That may fix it as well.

Hope this helps!

J
0
 

Author Comment

by:sallymessner
ID: 6862406
THANKS SO MUCH FOR YOUR HELP!  I WILL GIVE IT A TRY AND NEVER UPDATE MY NORTON VIA THE WEB AGAIN...YES I JUST UPDATED THE VIRUS SIGNATURES ....I HOPE THIS WORKS...IT HAS HAPPENED ON MY CEO'S COMPUTER AND WE CANNOT ACCESS OUR FINANCIALS...WE ARE NOT VERY HAPPY
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question