Solved

Tablet PC Input Panel

Posted on 2013-11-14
3
288 Views
Last Modified: 2013-11-17
Hi Experts,

Over the last couple of days, I have noticed this program in my system tray. Once, it opened on my desktop, I have been unable to remove it.

Is this a virus, a system file or what? Is it a key logger? How do I get rid of it, and has it done anything to damage my computer?

Thanks.

Bert
0
Comment
Question by:Bert2005
  • 2
3 Comments
 
LVL 43

Accepted Solution

by:
Davis McCarn earned 500 total points
ID: 39651152
It is part of Windows...
Right click on open space of taskbar -> click Toolbars -> UN-check Tablet PC Input Panel
Or, to uninstall it, do Start -> Control Pane > classic view -> Programs and Features  -> left column, click Turn Windows Features On or Off -> acknowlege the uac prompt -> wait for loading -> scroll and locate Tablet PC Optional Components -> uncheck it -> OK
0
 
LVL 1

Author Comment

by:Bert2005
ID: 39651700
Hi Davis McCarn,

You are awesome. I am sure it was a simple thing for you, but it saved me at least a day. Your second method took it right off the desktop. I have no idea how it got on my desktop in the first place. And, it isn't like I haven't used the Control Panel Home before.

When I  Googled it, I get everything from part of the computer system to a virus to a key logger. There were free scans to look for damage to your computer and ways to get rid of it through various means including removing registry keys.

Anyway, thanks very much for your answer. If you have any idea why it went from being unchecked to checked, please fill me in.

Thank you.

Bert
0
 
LVL 1

Author Closing Comment

by:Bert2005
ID: 39655105
No wonder I can't fix things. I can't even remember to accept the solution. Sorry for the delay. Thanks again.
0

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ransomware and redirected folders 9 95
Firewall -- detecting ex-owner activity ? 1 42
deny local logon 12 78
Allow X-Forwarded-For Headers to Site or No? 3 57
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now