Some users have reported an Excel-related failure that may appear after installing the Windows 10 Creators Update. After updating the system, some files cannot be opened in Excel for no apparent reason. Needless to say, everything worked well. Excel says something like this: “The file could not be accessed.”. But when you open the same file directly from Open file menu, all is right.

Since this problem may prove to be a hard nut to tear, we have prepared some solutions to solve this problem. If you have problems with Excel files, feel free to check out the list below.

How to resolve Excel files issues in Windows 10 Creators Update:
1) Make sure that the files are supported and not corrupted
2) Disable Protected view
3) Repair Excel
4) Restore Component services values to default
5) Reinstall Office

When you have installed SQL Server 2005 into your Windows (the database engine, now surpassed by the new great version of MS SQL 2008-2012) then you have unintentionally installed Just-In-Time debugger too. “JIT” causes a lot of problems – no longer work applications that previously ran without problems, there are various error message even when you are viewing web pages. JIT is simply set as the default application for trapping exceptions, which in conjunction with DEP (data execution prevention) creates a “firewall” for the elderly functional applications. One solution of this problem is quite simple: (more…)

Tagged with: , ,

In case that Windows startup screen says “specified file is missing or corrupt: \WINDOWS\system32\config\SYSTEM” does not yet need to panic and reinstall Windows. For some reason was damaged file WINDOWS\system32\config\SYSTEM (no, it is not a bug – it is truly a file without an extension, not a directory). Fortunately, Windows can create a variety of backup critical system files and have not forgotten on the abovementioned file SYSTEM.
(more…)

Tagged with: , , , , , , ,

Occasionally we need to validate e-mail addresses without send a message to the recipient and wait for answer. For example, we can verify whether an email address given via a simple web form, is not a fake. The principle of such validation involves several steps:

  • verification of the existence domain (what is behind the sign)
  • verification of the existence MX record for the domain
  • connection to the SMTP server according to the MX record
  • communication is established according to the SMTP protocol and check the server’s response to the command RcptTo

(more…)

Tagged with: , , ,