I'll start by saying that I don't have the problem, possibly because I
don't own any HP accessories, so I haven't tried Steve's suggestion
and I couldn't verify that it works if I did. I'm going by posts from
others saying that it works.
Things to check are:
- Were you logged into an administrator account when you made the
registry change? (I'm not sure you can edit that area at all if you
don't have administrator privileges.)
- Did you locate the correct key?
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Shell Extensions\Cached
(On my XP system, the Cached key doesn't exist. I assume it's
created by the update.)
- Did you remove the carriage return that Steve's posting software
inserted between the first closing bracket and the second opening
bracket in the key name? This was noted by "George" in a reply about
five posts down the thread from Steve's.
- In the event this still doesn't work for you, I think the
probability of being zapped by the vulnerability is fairly low if you
don't go to web pages of questionable parentage. According to the
description at
http://www.microsoft.com/technet/security/bulletin/ms06-015.mspx, to
trigger the vulnerability you'd have to visit a malicious web page
that redirects you to a server that downloads an attack program to
your PC.
--
Regards,
Jay Freedman
Microsoft Word MVP
Email cannot be acknowledged; please post all follow-ups to the
newsgroup so all may benefit.