Solved

DVD Problems

Posted on 2002-07-04
6
399 Views
Last Modified: 2010-04-26
Hi whenever i try to run a DVD movie on my Pioneer DVD ROM i get error saying  Key Exchange for DVD copy protection failed. And it want play what can i do to fix this ? Thanks.
0
Comment
Question by:Marine
6 Comments
 
LVL 14

Expert Comment

by:tmj883
ID: 7130992
What DVD software are you using? More info about your system would be helpful?T
0
 
LVL 30

Expert Comment

by:weed
ID: 7131152
Sounds like the region codes for your player and your DVDs is different and your player doesnt want to switch. That was designed as a copy protection scheme so that pirated DVDs from china etc wouldnt be playable on most of the worlds players.
0
 
LVL 7

Expert Comment

by:WiZaRd
ID: 7131364
http://www.pc.ibm.com/qtechinfo/DSHY-46YQXZ.html

http://bizforums.itrc.hp.com/cm/QuestionAnswer/1,,0x5794abe92dabd5118ff10090279cd0f9,00.html

some of the above may apply to you if you are running Windows2000 ?

IBM site describes problems with shared dlls in PC Doctor & DVD software.

bizforums site mentions Windows Media Player 6.4 problems.
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 1

Expert Comment

by:fengtao2000
ID: 7273990
The problem perhaps caused by region hell. You can try a software "DVD Region-Free" at http://www.dvdidle.com/dvd-region-free.htm to solve the problem.
0
 
LVL 1

Expert Comment

by:Piri
ID: 9294413
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
PAQ and pts forfeited
Please leave any comments here within the next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

Piri
EE Cleanup Volunteer
0
 

Accepted Solution

by:
AnnieMod earned 0 total points
ID: 9354954
Per recommendation.

AnnieMod
Community Support Moderator
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now