?
Solved

Missing McRtl32.dll

Posted on 2005-03-04
3
Medium Priority
?
1,202 Views
Last Modified: 2013-12-04
I upgraded to McAfee Internet Security 7 from Virus Scan 8 but later fully removed this software as it failed to work correctly. I followed the removal advise provided by McAfee in this respect. I have subsequently reinstalled Virus Scan 8 without issue but I'm getting the following error message popping up with alarming frequency whenever I open a new program, e.g. Outlook, Internet Explorer, etc. : ' This application has failed to start becuase McRtl32.dll was not found'. I have removed & reinstalled Virus Scan 8 several times without effect. McAfee techncial support don't appear to be able to offer any further solutions. Help!
0
Comment
Question by:Steparsons
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 15

Expert Comment

by:greyknight17
ID: 13465726
Not sure if you tried this yet, but go to Start->Run and type in the following:

regsvr32 McRtl32.dll

and hit ok.

Searched online and this dll file can't be found - at least I can't find it.

Try the above suggestion and see if it works.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 2000 total points
ID: 13466687
Try the  old winsockfix.exe -
http://www.tacktech.com/display.cfm?ttid=257
If the file isn't present on the OS, see if you can locate it on the CD or the install media.
-rich
0
 
LVL 7

Expert Comment

by:sweatbeast
ID: 13467325
do a search in the registry for McRTL32.dll - might gives us an idea why this file is being referenced
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question