Solved

Help wiht Shadow Defender registry keys I have to exclude IE8

Posted on 2010-11-29
2
1,377 Views
Last Modified: 2012-05-10
Dear Experts

I need help with Shadow Defender V. 1.0.0.325 , I do not understand which registry keys I have to exclude with IE8, there is a topic at
http://www.shadowdefender.com/phpbb/viewtopic.php?f=3&t=154
But is for FIREFOX
The Registry Exclusion Suggestion at http://www.shadowdefender.com/phpbb/viewtopic.php?f=3&t=110
Is for FIREFOX also

Thanks in advance for any help you can provide me

Regards


Regards




0
Comment
Question by:rebelscum0000
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 30

Accepted Solution

by:
Sudeep Sharma earned 250 total points
ID: 34236762
Internet Explorere Registry Keys:

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer
and
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer

I hope that would help

Sudeep
0
 
LVL 66

Assisted Solution

by:johnb6767
johnb6767 earned 250 total points
ID: 34241712
Settings for IE are also stored in the following.....

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
vmware templates 5 54
Dell Wyse 5030 zero client and dell monitors 5 64
Site replication storage recommendations. 8 75
Setup in new iPhone 7 Virtual PC 11 82
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…
In this video tutorial I show you the main steps to install and configure  a VMware ESXi6.0 server. The video has my comments as text on the screen and you can pause anytime when needed. Hope this will be helpful. Verify that your hardware and BIO…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question