Solved

Remote Procedure Call - Turn back on !!!!

Posted on 2004-08-23
3
121 Views
Last Modified: 2010-04-14
I was trying to rid a PC of the "Home search assistant" hyjacker and I was following some instructions that had me in SAFE mode. It said turn off services; security, rpc etc befor running the remover BUT it did not say turn it back on before leaving safe mode. The only one that was running, and I turned off, was RPC.

Now when WIN2K boots and I go to services and click on RPC and PROPERTIES no window shows for changing it. It's there somewhere because when I try to exit Services it says "close all windows before exiting" (this happens in safe mode too)

I also get a resourse low warning from my Mcaffe Virus prog, and my network sys tray icon does not show and I have no network in "network places"

I'VE TRIED:
1. Going to safe mode and turning back on.
2. Waiting for a long time to see if the window was not showing because of low resources and needed extra time to load.
3. Exited all sys tray items to get resources back.

Is there a way to turn it on from DOS????? Or any other way???? Does WIN2K have a step by step boot so I can limit resources being used and are resourses the issue here??

0
Comment
Question by:ddrdan
3 Comments
 
LVL 86

Accepted Solution

by:
jkr earned 250 total points
Comment Utility
Open the registry editor and navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services. For each service in question, change the "Start" value from '4' (for 'disabled') to '2' (for 'automatic')
0
 
LVL 9

Expert Comment

by:jdeclue
Comment Utility
from a command prompt you may type

NET START "Remote Procedure Call (RPC)"

that will start the service from the command prompt.

J
0
 
LVL 8

Author Comment

by:ddrdan
Comment Utility
Thanks JKR !!! Worked like a charm!! Why is it you can never think of the answer to the problem untill someone tells you. I should have thought of the Registry entry from the start. I'm stupid today, maybe tomorrow I'll be smarter ...LOL.

JDECLUE, "Thanks" also, I found yours would work too but JKR answered really quick, and I had it done by the time you answered. I just got this unit to surf so I came here to give the points.

DDRDAN
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this step by step tutorial with screenshots, we will show you HOW TO: Enable SSH Remote Access on a VMware vSphere Hypervisor 6.5 (ESXi 6.5). This is important if you need to enable SSH remote access for additional troubleshooting of the ESXi hos…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now