Our users computers are all set to transfer files to the secretary's incoming folder which is on the c: drive. We had Express Scribe set up to look at that folder using the upload button so that she could select teh next file according to priority etc. Since it was re-installed after a computer upgrade, (version 4.30) I can no longer set this as the default so every time she looks she needs to navigate from the default (in her documents) to the incoming folder.
Is your secretary using Load or Sync? If she's using Load, then Scribe should remember the most-recently-used folder. If she's using Sync, then the source folder is set in Options -> Incoming -> Properties -> "Source folder", with the "Receive method" set to "File Copy".
She prefers LOAD as this usually displays all the files available in the incoming folder. She can then select the most appropriate (and see how many are left to do). Another secretary can also dip in to the same folder. SYNC just uploads the next or everything indiscriminately.
Just tried 4.31 - same thing happens, can't stop it going to "my documents" first! Using XP Professional. Bizarrely the other secretary with the same setup can always go to the standard incoming folder (across the network with a mapped drive).
We have 2 apparantly identical computers, both using Scribe 4.3, one of which will manually load from the last folder used, the other will always open with "my documents" and needs then to be navigated to the incoming folder. Is there a setting in Windows XP which will affect this?
I posted yesterday over in MBAM Help because I noticed that my MBAM Pro isn't updating automatically anymore. For the last couple of weeks, I've had to go in and manually update the database. Also, for some reason or another, The Weather Channel app is being detected as adware. Not sure why. I know it asks to install toolbars when it installs, but I always decline, and it always seems to work. I've used that app for a long time, and they just came out with a new version, so that might be why it's being detected.
[*]Removing malware can be unpredictable...It is unlikely but things can go very wrong! Please make sure you Backup all files that cannot be replaced if something were to happen. You can copy them to a CD/DVD, external drive or a pen drive[*]Please don't run any other scans, download, install or uninstall any programs unless requested by me while I'm working with you.[*]The removal of malware is not instantaneous, please be patient. Often we are also on a different Time Zone.[*]Perform everything in the correct order. Sometimes one step requires the previous one.[*]If you have any problems while following my instructions, Stop there and tell me the exact nature of the issue.[*]You can check here if you're not sure if your computer is 32-bit or 64-bit[*]Please disable your antivirus while running any requested scanners so that they do not interfere with the scanners.[*]When we are done, I'll give you instructions on how to cleanup all the tools and logs[*]Please stick with me until I give you the "all clear" and Please don't waste my time by leaving before that.[*]Your topic will be closed if you haven't replied within 3 days[*](If I have not responded within 24 hours, please send me a Private Message as a reminder)
STEP 0
RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes
so that your normal security software can then run and clean your computer of infections.
When RKill runs it will kill malware processes and then removes incorrect executable associations and fixes policies
that stop us from using certain tools. When finished it will display a log file that shows the processes that were
terminated while the program was running.
As RKill only terminates a program's running process, and does not delete any files, after running it you should not reboot
your computer as any malware processes that are configured to start automatically will just be started again.
Instead, after running RKill you should immediately scan your computer using the requested scans I've included.
Please download Rkill by Grinler from one of the links below and save it to your desktop.
Link 1
Link 2
[*]Make sure that at least the first two check boxes are selected.[*]Click on OK[*]Then click on YES to create the folder.[*]Note: if it is necessary to restore the registry, open the backup folder and start ERDNT.exe
Not sure what's going on with the proxy. I don't use any proxies or torrenting software, but I do have Constant Guard from Comcast, and I was using OpenDNS before. When I installed the CG, it disabled the OpenDNS. I only use Norton because Comcast gives it out for free to their customers. I tried other free AV, but most of them seem to be adware. Norton lets everything go by it.
[*]Click Scan[*]Wait for the scan to finish[*]If any threats were found, click the 'List of found threats' , then click Export to text file....[*]Save it to your desktop, then please copy and paste that log as a reply to this topic.
Have to attach the combofix.txt, as it's too long to post. Computer seems to be running a bit better and booting faster. I'm also seeing an error left over from the last time iTunes tried to update. The last time it tried to install an update, it gave an elevation error, and now every time I reboot, I get a bunch of errors looking for MSVCRT80.dll. No idea what that's all about, but I suspect it probably has to do with all the junk that Eset found on my system.
I uninstalled Java, and ran the JavaRa, as you described, however it didn't generate a log file. It said it removed JRE 6, then when it went to open the log, it said it couldn't find it and opened a blank Notepad.
The usual academic integrity policies apply. Students are expected to behave in a professional & ethical manner, and your work should be your own. At minimum, plagiarism or cheating will result in a zero for the relevant assignment. More severe ethical violations can warrant further penalties, including a failing grade at the discretion of the course instructor.
For homework in particular, while you discuss problems together with your peers, any work handed in must be your own! Identical submissions will result in violations of the academic integrity policy.
Ignorance is not an excuse for any academic dishonesty. It is your responsibility to read the linked policy to avoid any misunderstanding. Do not hesitate to ask the instructor(s) if you are ever in doubt about what constitutes plagiarism, cheating, or any other breach of academic integrity.
For the primary audience of this course, academic integrity should not be an issue. Nevertheless, if you find that you are struggling with the material in the course, feel free to reach out to me or the TA. Send us an email, drop by during office hours, see me after class, post on Ed, etc. No student should feel like they must resort to cheating in this class.
No exceptions will be made to the above policy or any extensions given. In case of an event that greatly interferes with your ability to complete assignments this semester, grading will be determined by the University policy on such extenuating circumstances.
Attendance of lectures is crucial in the sense that exams will be based on both lectures and assigned reading materials. You are responsible for all lecture materials and for any announcements made in class, whether or not you are present.
Please communicate with the instructor and/or the teaching assistant if you become ill or emergencies arise so that we will be aware of your circumstances. If you miss a class, you should ask a classmate to review their notes from that day. If you have to miss classes for a prolonged period due to serious illness, you should speak to the teaching assistant and/or the instructor as soon as possible.
Each quality transcription (see first few for examples on the Lectures page) can earn up to 2% extra credit in the course (to make up for points lost in the midterms, homework or final exam) for a maximum of up to 8%.
Sign up here to scribe the lectures (limited to two students per lecture). While the example notes are typeset and converted to HTML, you may also send in typset PDFs (or their latex source files) and neatly handwritten notes.
To obtain disability-related academic adjustments and/or auxiliary aids, students with disabilities must contact the course instructor as soon as possible and provide the instructor with a Letter of Academic Accommodations from Disability Resources and Educational Services (DRES). To ensure that disability-related concerns are properly addressed from the beginning, students with disabilities who require assistance to participate in this class should apply for services with DRES and see the instructor as soon as possible. If you are concerned you have a disability-related condition that is impacting your academic progress, there are academic screening appointments available that can help diagnose a previously undiagnosed disability. Please find resources available by visiting the DRES website.
The Grainger College of Engineering is committed to the creation of an anti-racist, inclusive community that welcomes diversity along several dimensions, including, but not limited to, race, ethnicity and national origins, gender and gender identity, sexuality, disability status, class, age, or religious beliefs.
The success of this course depends on each of us creating a supportive and safe learning environment that promotes free discussion and ensures that everyone has an equal opportunity to succeed. Everyone is expected to contribute to creating and sustaining a climate where employees, instructors, and students may work together without being concerned about personal ridicule, or being exposed to inappropriate or intolerable language. You are invited to notify the course director of any instances of racism, discrimination, microaggressions, or other offensive behavior if you feel safe doing so.
7fc3f7cf58