?
Solved

Help wiht Shadow Defender registry keys I have to exclude IE8

Posted on 2010-11-29
2
Medium Priority
?
1,391 Views
Last Modified: 2012-05-10
Dear Experts

I need help with Shadow Defender V. 1.0.0.325 , I do not understand which registry keys I have to exclude with IE8, there is a topic at
http://www.shadowdefender.com/phpbb/viewtopic.php?f=3&t=154
But is for FIREFOX
The Registry Exclusion Suggestion at http://www.shadowdefender.com/phpbb/viewtopic.php?f=3&t=110
Is for FIREFOX also

Thanks in advance for any help you can provide me

Regards


Regards




0
Comment
Question by:rebelscum0000
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 30

Accepted Solution

by:
Sudeep Sharma earned 1000 total points
ID: 34236762
Internet Explorere Registry Keys:

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer
and
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer

I hope that would help

Sudeep
0
 
LVL 66

Assisted Solution

by:johnb6767
johnb6767 earned 1000 total points
ID: 34241712
Settings for IE are also stored in the following.....

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Veeam Backup & Replication has added a new integration – Veeam Backup for Microsoft Office 365.  In this blog, we will discuss how you can benefit from Office 365 email backup with the Veeam’s new product and try to shed some light on the needs and …
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
In this video tutorial I show you the main steps to install and configure  a VMware ESXi6.0 server. The video has my comments as text on the screen and you can pause anytime when needed. Hope this will be helpful. Verify that your hardware and BIO…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question