SEO Tuning

Assistive Technology

White Papers

----Writing College Essays

---Converting to NTFS

---> Error Messages

---Misc Computer Help

---Repairing HP-85 Capstan      Gooey wheel

---Converting .aa audible files to .mp3 files

---Converting Fat32 to NTFS


::: --{White Papers }--:::


::: ---{Error Messages}--- :::



::: ---{ Error Message When Installing programs}--- :::
"You do not have access to make the required system configuration modifications. Please rerun this installation from an administrators account"


* ERROR MESSAGE - When installing a program you receive an error message that says- "You do not have access to make the required system configuration modifications. Please rerun this installation from an administrators account"

Fix 1 - {Totally Successful}

If the only user listed for this key is "Everyone".
Click on "Advanced".
1. Run -> regedit
2. Right-click on HKEY_CLASSES_ROOT
3. Click "Permissions"
4. Click "Add"
5. Click "Locations"
6. Click on "Georgess_PC" (my computer's name) [ Yours will have a different name]
7. Click "Okay"
8. Click "Advanced"
9. Click "Find Now" to find user accounts on my comp.
10. Click on user accts to be added; "Georges" and "Admininistrator" (my user acct. and admin accts.)
11. Click "Okay"
12. Click "Okay" after the account name is visible in blank form field under "Enter the object names to select"
13. When the user account(s) is then listed in the permissions dialog box for HKEY_CLASSES_ROOT, highlight and give full access to the newly added account(s)

Fix 2 - {Less successful}

Error Message:
During the installation, the following error occurs even when logged in with an Administrator's account.

"You do not have access to make the required system configuration modifications.
Please rerun this installation from an Administrator's account."

Inadequate permissions are set to the 'HKEY_LOCAL_MACHINE\Software' and the 'HKEY_CLASSES_ROOT\CLSID' registry keys and their subkeys.

Solution or Workaround
Modify the permissions to the 'HKEY_LOCAL_MACHINE\Software' and the 'HKEY_CLASSES_ROOT\CLSID' registry keys and their subkeys, to Allow Full Control for the Administrator, Administrators, and SYSTEM Groups.

Contained in this document are the steps necessary to modify permissions to keys in the Windows registry.

WARNING: The instructions below include making changes to essential parts of your operating system. It is recommended that you backup your operating system and files, including the registry, before proceeding. Consult with a qualified computer systems professional, if necessary.

Ideawindow cannot guarantee results from incorrect modifications while following these instructions. Therefore, use caution and proceed at your own risk.

Click Start > Run. Type 'regedt32'.
Browse to the key/folder to be modified and highlight it.
Windows NT and 2000 - Click Security > Permissions.

Windows XP - Click Edit > Permissions

Give FULL permission to Administrator

Fix 3

Resetting Security Settings to the Default Settings

The steps below do not apply to Windows XP Home Edition, or Windows Vista Home Basic and Home Premium editions. To restore security setting for Home editions, either use the Microsoft Fix, System Restore or a backup.Note After security settings are applied, you cannot undo the changes without restoring from a backup. If you are uncertain about how to restore your security settings to the default settings, you must make a complete backup that includes the System State (the registry files). Items that are reset include NTFS file system files and folders, the registry, policies, services, permissions , and group membership.

To restore your operating system to the original installation default security settings, follow these steps:
Open a new Command Prompt:

In Windows XP:
-Click Start, click Run, type cmd, and then press ENTER.

In Windows Vista:
-Click Start and then type cmd in the Start Search box.
In the results area, right-click cmd.exe, and then click Run as administrator. You will be prompted to type the password for an administrator account. Click Continue if you are the administrator or type the administrator password. Then, click Continue.

In Windows XP, type the following command, and then press ENTER:
secedit /configure /cfg %windir%\repair\secsetup.inf /db secsetup.sdb /verbose

In Windows Vista, type the following command, and then press ENTER:
secedit /configure /cfg %windir%\inf\defltbase.inf /db defltbase.sdb /verbose
You receive a "Task is completed" message and a warning message that something could not be done. You can safely ignore this message. For more information about this message, see the %windir%\Security\Logs\Scesrv.log file.

Next steps After you run this Microsoft Fix it (or complete these manual steps), standard user accounts may no longer appear on the log on screen when you start your computer or try to switch users. This occurs because standard user accounts are removed from the Users group when you reset Windows security settings. To add the affected users accounts back to the Users group, follow these steps:
-Click Start, and then All Programs. Or click Programs.

-Click Accessories, and then click Command Prompt (Windows XP). Or right-click Command Prompt, and then
- Click Run As Administrator (Windows Vista).

In the Command Prompt window, type net users and then press ENTER. A list of user accounts is displayed.
For each accountname listed in the Command Prompt that is missing from the log on or switch user screen, type the following command and then press ENTER:


net localgroup users accountname /add
Now go to the "Did this fix the problem?" section.
More information In Windows Vista, the Defltbase.inf file is a Security configuration template for the default security. You can view the settings for this file in the following location:
Back to the top
Secedit parameters description
/configure: Specifies that Secedit.exe sets system security settings.
/DB file_name: Provides the path of a database that contains the security template to be applied. This is a required argument. However, the database file does not have to exist if you use the /CFG switch to specify a security template.
/CFG file_name: This argument is valid only when you use it with the /DB parameter. It is the path of the security template that will be imported into the database and applied to the system. If you do not specify this argument, the template that is already stored in the database is applied.
/overwrite: This argument is valid only when the /CFG argument is also used. This argument specifies whether the security template in the /CFG argument overwrites any template or composite template that is stored in the database instead of appending the results to the stored template. If this is not specified, the template in the /CFG argument is appended to the stored template.
/areas AreaName1AreaName2...: Specifies the security areas to be applied to the system. The default is "all areas." Each area must be separated by a space.
AreaNameX Description
SECURITYPOLICY Local policy and domain policy for the system. This includes account policies, audit policies, and other policies.
GROUP_MGMT Restricted group settings for any groups that are specified in the security template.
USER_RIGHTS User logon rights and granting of permissions.
REGKEYS Security on local registry keys.
FILESTORE Security on local file storage.
SERVICES Security for all defined services.
Note Each area coincides with a similar name in the security template.
/log logpath: You can use this switch to configure the location of the log file that tracks the changes.
/verbose: Specifies more detailed progress information.
/quiet: Reduces the feedback that is provided during the update on the screen and in the log file.








eXTReMe Tracker
© 2004
Tim Walsh
Website Development
All Rights Reserved