Solved

Tablet PC Input Panel

Posted on 2013-11-14
3
290 Views
Last Modified: 2013-11-17
Hi Experts,

Over the last couple of days, I have noticed this program in my system tray. Once, it opened on my desktop, I have been unable to remove it.

Is this a virus, a system file or what? Is it a key logger? How do I get rid of it, and has it done anything to damage my computer?

Thanks.

Bert
0
Comment
Question by:Bert2005
  • 2
3 Comments
 
LVL 43

Accepted Solution

by:
Davis McCarn earned 500 total points
ID: 39651152
It is part of Windows...
Right click on open space of taskbar -> click Toolbars -> UN-check Tablet PC Input Panel
Or, to uninstall it, do Start -> Control Pane > classic view -> Programs and Features  -> left column, click Turn Windows Features On or Off -> acknowlege the uac prompt -> wait for loading -> scroll and locate Tablet PC Optional Components -> uncheck it -> OK
0
 
LVL 1

Author Comment

by:Bert2005
ID: 39651700
Hi Davis McCarn,

You are awesome. I am sure it was a simple thing for you, but it saved me at least a day. Your second method took it right off the desktop. I have no idea how it got on my desktop in the first place. And, it isn't like I haven't used the Control Panel Home before.

When I  Googled it, I get everything from part of the computer system to a virus to a key logger. There were free scans to look for damage to your computer and ways to get rid of it through various means including removing registry keys.

Anyway, thanks very much for your answer. If you have any idea why it went from being unchecked to checked, please fill me in.

Thank you.

Bert
0
 
LVL 1

Author Closing Comment

by:Bert2005
ID: 39655105
No wonder I can't fix things. I can't even remember to accept the solution. Sorry for the delay. Thanks again.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Read about achieving the basic levels of HRIS security in the workplace.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question