Solved

What causes a dialog window as shown in the attached document to pop up when my client accesses his office computer via remote desktop and only when he has to log in on his office computer?

Posted on 2012-12-29
3
553 Views
Last Modified: 2012-12-29
What causes a dialog window as shown in the attached document to pop up when my client accesses his office computer via remote desktop and only when he has to log in on his office computer?

He is using Remote Desktop from Windows XP Service Pack 3 to connect to his office computer using Windows 7 Pro. When I do a search on his office computer for 175230Log.iniis lost, it shows that it is somhow connected with the Chrome application.
AsusSetup.doc
0
Comment
Question by:SIT-SR
  • 2
3 Comments
 
LVL 7

Accepted Solution

by:
avcontrol earned 500 total points
ID: 38729815
You can modify registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\ASUS\i-Setup180917]
"Id"="{4960FFCF-AAED-4C16-AE65-B0BE6C318F7E}"
"Index"=dword:00000002"
NT\CurrentVersion\Schedule\TaskCache\Tree\ASUS\i-Setup182418]
"Id"="{4960FFCF-AAED-4C16-AE65-B0BE6C318F7E}"
"Index"=dword:00000002"
NT\CurrentVersion\Schedule\TaskCache\Tree\ASUS\i-Setup130842]
"Id"="{4960FFCF-AAED-4C16-AE65-B0BE6C318F7E}"
"Index"=dword:00000002"

or

Instead of hacking at the registry, you can delete this app from Task Scheduler:

From the start menu search for "Task Scheduler" and open it
Under the Active Tasks section of Task Scheduler (Local), look for tasks that begin with "i-setup" and are triggered at log on of any user and delete them
0
 

Author Closing Comment

by:SIT-SR
ID: 38729940
Thank you! I deleted the application from the Task Scheduler as you suggested and that solved the problem. Cudo's to you.
0
 
LVL 7

Expert Comment

by:avcontrol
ID: 38729966
Thanks.
Glad it work.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Finding a job can be stressful - searches, resume tweaks, and networking events can be super boring. Luckily we're here to help you land your dream job!
Originally published Entrepreneur.com Booming numbers of freelancing professionals are changing the face of work. In the United States alone last year, the number of workers freelancing grew from 700,000 to 54 million, according to a Freelancers’…
The Bounty Board allows you to request an article or video on any technical topic, or fulfill a bounty request to earn points. Watch this video to learn how to use the Bounty Board to get the content you want, earn points, and browse submitted bount…
Articles on a wide range of technology and professional topics are available on Experts Exchange. These resources are written by members, for members, and can be written about any topic you feel passionate about. Learn how to best write an article t…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now