1s program start order error. PC boot problems

(Created to accompany clients of Praktika LLC)

Important! Before making any changes in the 1C database, make a backup copy. If 1C is launched in the configurator mode, then through the menu Administration -> Save data. If you already have older copies, don't overwrite them, make a separate archive. If 1C does not start in configurator mode, copy the entire database directory to another location. If you have another storage medium (second HDD, Zip drive that writes a CD-ROM), it is better to make a copy to it. Question :

When launched, the program does not load and displays the message "Protection key not found". Answer: This error can occur due to a number of reasons. Solutions depend on whether you have a network version or a local one. Let's start with the local one, as with a simpler case. We suggest that you perform the following steps. After each attempt, please try to run 1C:Enterprise. It is possible that the problem will be solved at the first step, and then all subsequent ones will not be needed. a)Restart your computer by clicking Start->Shutdown ->Restart Computer ->OK. Wait until the computer will restart, then try to run 1C again. b)You may have forgotten to install the protection driver when installing the program. Then you need to run it by clicking Start ->Programs->1C: Enterprise 7.7->Install protection driver. Restart your computer and try to run 1C: Enterprise again. cCheck the physical presence of the key on the computer, maybe someone touched it and it fell out of the computer. To do this, you need to get to the back wall of the computer case, where the wires are connected. Important: It is highly recommended that you first turn off your computer. The key looks like a bar about 3x4x1 cm. Most likely, it will be red or white. The key is inserted into the LPT port (the same place as the printer). In any case, you will only be able to insert the key into the LPT port. Important: no need to exert great force, the effort should be comparable to the effort when raising a glass of tea. If the key does not fit into the port, do not try to force it in, as either it is not a key or you are not inserting it into the LPT port. It is better to call the person responsible for computers in your company, or call us. After you have inserted the key into the port, turn on the computer and try to start 1C: Enterprise again. d)Sometimes a printer and other equipment installed "on top" of a key can interfere with its determination by the protection server. Having previously turned off the computer and the printer, try disconnecting the peripherals (most often the printer) from the computer, leaving the key in place. Now turn on the computer and try to start 1C. Of course, in this case, you will not be able to use the disabled device. If you are using the network version, and the key is not located on your computer, it is recommended that you contact the person who is responsible for the operation of computers in your company for help. If you are this person, then we can advise you to do the following: a) Check that the problem computer "sees" the server where the key is located. You can either ping the server from the command line by running the ping program from the problem computer with the server computer name as a parameter. For example, c:ping server1c. Or you can simply check the presence of the server computer in the list of computers available for the client by clicking on the “My network environment". If it turns out that the problem computer does not "see" the server, then you will need to conduct a standard check for network problems. We recommend starting by checking the integrity of the cables (there are no breaks), the health of the hub, the health of the network card (is the light on, is the ping 127.0.0.1 command successful), in addition, you should make sure that the necessary protocols are available and that they are configured correctly. b)Make sure that the "Protection Server" program is running on the computer with the dongle. This program is necessary for the work of 1C: Enterprise clients in the network version. You can run it by clicking Start ->Programs->1C:Enterprise 7.7->Protection Server. c) On each computer with 1C: Enterprise there is a nethasp.ini file, which by default is located in C: Program Files1Cv77BIN. This file contains settings for the program that checks for the presence of a key on the network. The file is well documented and you can probably understand its structure. We recommend that you pay special attention to the lines of the protocols used (perhaps there is one IPX / SPX left that is not used at all in your network), the key search waiting time (in case of a weak network, the program may simply not have time to find it) and links to the server computer (perhaps the computer no longer exists, has been moved or renamed). Question: When you start 1C: Enterprise, the program does not load and displays a message like "The database directory was not found C: 1C." Answer: This happened due to the fact that the folder in which the 1C base is located is not available. If the database is located on your computer, then most likely you have moved it somewhere. Remember if you have moved any directories (folders) recently. If you know exactly where the base was moved, or it seems to you that the recently moved folder is the base, then when starting 1C, select the “Change” button in the dialog box (on the right are the OK, Cancel and next buttons - “Change”). Specify a new path to the database and, by clicking on the OK button, start 1C: Enterprise again. If the database is not on your computer, but on remote server, then it is better to seek help from a person who is responsible for the performance of computers in your company. If you still decide to fix the problem yourself, then, firstly, you need to check the existence of a network between the two computers (you can simply check the presence of the server computer in the list of computers available to the client by clicking on the "My Network Places" icon). Secondly, you need to find out the location of the directory with the database on the server. After that, by clicking on the "Change" button in the 1C: Enterprise launch dialog box, select "My network environment" -> Server on which the database is located -> Specify the path to the database. Now try running 1C: Enterprise again. Question: I can’t start 1C: Enterprise, the program stops with the error “Data blocking error. Perhaps the data is being used by another task." Answer: 1C: An enterprise can be launched in two modes: Exclusive and Divided. In exclusive mode, only one user can open the database. The above message indicates that someone is already logged in in exclusive mode (perhaps you), and now you are trying to use the database. The first thing to do is to check your computer. Look at the taskbar (to the right of the "Start" button), if you see the inscription "1C: Enterprise" there, then click on it and close it. It was a previously launched copy of the 1C: Enterprise program. Run 1C: Enterprise again. If 1C: Enterprise in exclusive mode is not running on your computer, then two options are possible. The first option is applicable if there are few computers on the network using 1C: Enterprise, and they are located close to each other. Then you can go to each computer and, by selecting the menu item 1C: Enterprise Help -> About the program, you will see the Mode of operation in the very last line. If “Exclusive” is written on the left, then you need to close 1C: Enterprise on this computer and run it on your own. Most likely, the problem will be solved. The second option should be used when there are a lot of computers on the network, and it takes too long to bypass them one by one. Then you need to start the Monitor with the Start -> Programs -> 1C: Enterprise -> User Monitor command. After starting the monitor, you need to select the menu item Monitor -> Active users. You will see a list of computers from which this moment the base is used (each line is a running 1C component: Configurator, Enterprise, Monitor, Debugger). If you pay attention to the leftmost column, you may notice that one of the computers is running 1C: Enterprise in exclusive mode (this is indicated by a red exclamation mark next to the icon). Go to this computer and close 1C: Enterprise there. The problem should now be solved. Sometimes it is possible that some computer has incorrectly shut down (or simply “frozen”), then you need to turn it off and turn it on again. If it is impossible to determine which computer occupied the base, and the Monitor does not specify a computer using the exclusive mode, then you will have to turn off all computers (you can do it one by one, trying to start 1C after turning off each computer). Question: The program does not start and displays the message "Error loading metadata". Answer: There is no general solution to the problem here. First make sure you have the right way to the base. You can check this by looking at the inscription at the very bottom of the 1C: Enterprise launch window. The path to the database should appear there (something like C: 1C). If you don’t know if this path is the right one, then read the answer to the question “When starting 1C: Enterprise, the program does not load and displays a message like “The base directory was not found C: 1C”. If this does not help, then try contacting the person in charge of computers in your company. If you have no one to turn to or it turns out that the path is correct, but the database, nevertheless, does not start, then it is better to contact us. Question: The program does not start and displays the message "Error opening table index file. To restore index files, run the program in exclusive mode." Answer: To solve this problem, you need to run the program in exclusive mode (check the "Exclusive" box when starting the program). Of course, you will first have to ask all users to exit 1C: Enterprise. The offer to restore index files must be answered in the affirmative. This process can take a significant amount of time, from 1-2 minutes for databases of 5-10 megabytes to about an hour for large databases. If you are unable to start the system in exclusive mode, although you are sure that all users have exited the program, then first check your computer, perhaps there is still a running copy of the program. If this did not help, then try turning off the client machines (you can do one at a time, with a check after each). It is likely that one of the programs was incorrectly terminated and did not release the database. Question: The program does not start and displays the message "The log file is corrupted." Answer: In your base directory (the path to the base is written at the bottom left in the launch window) there is a Syslog subdirectory. This directory contains the 1cv7.mlg file, this is the log file. Move it to another directory; if you think you don't need the log file, you can delete it. The main thing is to remove the log file from this directory. The next time you start 1C: Enterprise, it should successfully boot up and create empty file magazine. Question: When you start the program, a pop-up screen appears with the inscription 1C: Enterprise and immediately disappears. Answer: This problem arose due to the fact that you are not allowed to write to the database directory. 1C:Enterprise to run requires an entry in this directory. To correct the situation from the server where the base is located, select shared resource(disk or directory with the base), right-click, select the Properties menu, the Access tab, set the value to Full (or rearrange the indicator to "Share a folder" for Windows 2000). Save the changes, try running 1C: Enterprise again. Question: When trying to open a database, the program stops with an error message: "The sort order set for Database, does not match the system one. Answer: To fix this error, click on the icon My Computer-> Control Panel-> Languages ​​and Standards. Set the suggested value to "Russian" and restart your computer. Question: When starting the program, the download stops with an error message: "Runtime Error! Program c:Program Files1Cv77Bin1Cv77.exe. Abnormal Termination". Answer: There may be several reasons for this error to occur. First, copy your base directory to another location so that even in the worst case scenario (the lights were turned off during the fix), you can return to the situation before the start of the fix. You can take the following steps to fix this error yourself. After each step, try to start 1C: Enterprise.

  1. Restart your computer.
  2. Reinstall 1C: Enterprise.
  3. Copy the file 1Cv7.md, which is located in the NEW_STRU directory of your base, to your base directory. For example, if your base is located in the c:1Cbase directory, then you need to copy the 1Cv7.md file from c:1CbaseNEW_STRU to c:1Cbase. To the question: "Should I replace the current file?" should answer "Yes".
  4. Run the Configurator, select Administration -> IS testing and fixing. Click the Run button.
If the error has not been corrected, then, apparently, you will have to contact Praktika directly. Question: When launched, the program first asks for the encoding (code page and sort order), and then the download stops with an error message: “Unrecoverable database error. Code - 10. Error opening database dictionary. Answer: Copy the file 1Cv7.dd, which is located in the NEW_STRU directory of your base, to your base directory. For example, if your base is in the c:1Cbase directory, then you need to copy the 1Cv7.dd file from c:1CbaseNEW_STRU to c:1Cbase. To the question: "Should I replace the current file?" should answer "Yes". If such a file does not exist in the NEW_STRU directory, but you know the password for the configuration, then you can fix the problems by renaming any metadata object to itself (for example, delete the last letter “l” in the identifier of the MainBranch constant and put it again) . Save the configuration. Question: How to determine where the 1C: Enterprise base is located? Answer: When you start 1C: Enterprise or Configurator, a launch window appears in front of you. If the desired base is selected (a large field almost in the middle of the window), then at the bottom you can see the path to the base. It should look something like "C:1Cbase". Question: When launched from the third or fourth computer, the program does not start with a message like "Error accessing table DT****". Answer: The point is that the operating Windows system 95/98 does not allow more than 1024 files to be open at the same time. Given the average database size of 200-400 files, it turns out that the program will not run on 3-6 computers trying to access the database. It is necessary to transfer the database (for DBF versions, you can simply copy the entire directory and rewrite the paths on client machines) to a computer with a different operating system (recommended - Novell, Windows 2000, Windows NT). Question: 1С: The enterprise opens the base for a very long time. Answer: Perhaps this is due to the fact that the antivirus scanner checks all *.dbf and *.cdx files that 1C: Enterprise wants to open. To solve the problem, you need to exclude scanning of files of this type (for example, in the "AVP Monitor" program, this is called "Exclude by mask"). You don't have to worry about viruses from *. dbf files database and index files, as they cannot contain viruses. Question: What options exist command line for the 1cv7.exe file? Answer :

1cv7.exe MODE [ /M | /D | /u | /n | /P],
where MODE - startup mode, can take only one of three values:
config - configurator mode;
debug - debugger mode;
enterprise - normal (working) mode 1C: Enterprise.
the following keys are optional:
/M - run the program in exclusive mode;
/D - database directory;
/U - user's working directory (the directory from the list of users is ignored);
/N - username;
/P - user password;
/T - path to temporary files
/@ - for the configurator mode, specifying the batch file
/W - Web extension initialization

Example: 1cv7 enterprise /Dc:1cmainbase /NIvanov /P123,
in this case, the program will start without displaying dialogs about choosing a base and operating mode, and also without prompting for a user name and password.

Running in batch mode is described in detail in the book “Configuration and Administration. Part Two" on page 252.


Manually editing the Windows registry to remove invalid Error 5 keys is not recommended unless you are PC service professional. Mistakes made while editing the registry can render your PC unusable and cause irreparable damage to your operating system. In fact, even a single comma in the wrong place can prevent your computer from booting up!

Because of this risk, we highly recommend using a trusted registry cleaner such as WinThruster [Download] (Developed by Microsoft Gold Certified Partner) to scan and repair any Error 5 related issues. By using the [Download] Registry Cleaner, you can automate the process of looking for broken registry entries, missing file references (such as those causing the %%error_name%% error), and broken links within the registry. Before each scan, an automatically created backup copy, which allows you to undo any changes with a single click and protects you from possible damage to your computer. The best part is that fixing [Download] registry errors can drastically improve system speed and performance.


Warning: Unless you are an advanced PC user, we do NOT recommend manually editing the Windows Registry. Incorrect use of the Registry Editor can lead to serious problems and require reinstalling Windows. We do not guarantee that problems resulting from misuse of Registry Editor can be corrected. You use the Registry Editor at your own risk.

Before manually restoring Windows registry, you need to create a backup by exporting a part of the registry related to Error 5 (eg. Windows Operating System):

  1. Click on the button To begin.
  2. Enter " command" in search bar... DO NOT PRESS YET ENTER!
  3. Holding keys CTRL-Shift on the keyboard, press ENTER.
  4. An access dialog will be displayed.
  5. Click Yes.
  6. The black box opens with a blinking cursor.
  7. Enter " regedit" and press ENTER.
  8. In the Registry Editor, select the Error 5-related key (eg. Windows Operating System) you want to back up.
  9. On the menu File select Export.
  10. Listed Save to select the folder where you want to save the backup Windows key operating system.
  11. In field File name enter a name for the backup file, such as "Windows Operating System Backup".
  12. Make sure the field Export range value selected Selected branch.
  13. Click Save.
  14. The file will be saved with .reg extension.
  15. You now have a backup of your Windows Operating System-related registry entry.

The next steps for manually editing the registry will not be covered in this article, as they are likely to damage your system. If you would like more information on editing the registry manually, please see the links below.

Sometimes it fails to start installed application. And Windows 7 displays a message with an error code or an incomprehensible inscription. The easiest option for further action, taken by many, is to reinstall the program. Although this solution does not always give a positive result. Here are the most common application launch problems accompanied by a message with an error code or description. And ways to solve them.

Application and operating system compatibility error

This error occurs when the version of the application being launched is incompatible with Windows 7. Many creators software products(especially for free software) do not have time to develop current versions their programs. Or the user has installed an outdated (outdated) version of the application for Windows 7. Then there may be problems when trying to run it. The system displays a message that an error occurred while starting the application. Or even if the application has started, it will not work correctly. This problem can be solved by native means of the OS. To do this, do the following:

  • Click the mouse on the shortcut of the desired application or file with the "exe" extension.
  • By pressing the key on the right, we call up its context menu.
  • Select "Fix Compatibility Issues" from the list.
  • In the Program Compatibility window that appears, select Program Diagnostics.
  • In the next dialog box, put a checkmark next to the item with a description of the problem “The program worked in previous versions OS" and click "Next".
  • Then we select the OS version in which the application functioned without problems.
  • Click "Next".

A window appears with a description of the parameters with which the launch will be carried out. Clicking "Next" starts the program. If these launch options in Windows 7 did not lead to the correct operation of the application:

  • In the Program Compatibility dialog box, click on No, try different settings.
  • We set new parameters and try to run the program again.

Memory read error

This application startup error can be caused by several reasons. But most of all in Windows 7, it is related to the operation of the DEP service.

DEP is a data execution prevention service. Its main function is to stop the spread of viruses in the computer by blocking access to system partitions. random access memory. The service does not interfere with the malware installation process in any way. It only blocks access to certain sectors of the system's memory.

If a program that does not have access rights to one of these partitions tries to enter memory, then DEP immediately stops its work. The result of closing this application is a "Program Error" message. To configure this service, do the following:

  • We enter the "Control Panel" through the "Start".
  • Select the "System" tab.
  • In the list on the left, click on "Advanced system settings".

This procedure in Windows 7 only allows you to configure exceptions for the DEP service by including it in a special list of applications. Programs listed in the list will be allowed access to system memory partitions. You should not include those programs here if you are not sure about their origin and safety.

  • In the "Advanced" tab, select the "Performance" item.
  • Click on its Settings.
  • In the "Performance Options" window, go to the "Data Execution Prevention" part.
  • Here we select the item "Turn on DEP for programs and services other than those I select."
  • Use the "Add" button to edit the exclusion list.
  • Don't forget to click Apply.

Error 0xc0000022

Such an application launch error in Windows 7 occurs due to the lack of any library required for the program to work. Library files have the extension "dll". The reason for the lack of libraries may be the activity of viruses.

Error code 0 x c0000022 also occurs when a user tries to run an incorrectly "cracked" program after installing it. During startup, when the application instance is being initialized, a missing library is accessed. Not finding it, the system displays a message with this error code.

Most often, the appearance of such a message is caused by a problem in the interaction of the video card with the system part due to the lack of the necessary libraries in the program code of the drivers. Possible ways solutions:

If this did not help, and the attempt to start the application still failed, then you can roll back the system. To do this, select the recovery point (date) during the creation of which the program was launched without problems.

There are a huge number of reasons due to which the programs installed on the computer suddenly stop working or even run at all. Unfortunately, many of them are of an extremely specific nature, associated with certain software and technical nuances of each individual application and require an exclusive approach from the user in resolving the issue of restoring their performance.

However, there are many common, quite often occurring reasons, by eliminating which, you can easily restore the work of most software. Such, really effective universal solutions, we want to offer our users in the instructions below.

So, if any program installed on your computer stops working or starts, you need to ...

Check the technical requirements (System Requirements)

Before downloading and using any program, always carefully check the technical requirements for each program on the official website of the software developer. At the same time, be sure to consider that such requirements are of two types: minimal (guarantee that the program will run exactly on your machine, but do not guarantee that it will function quickly and fully) and recommended.

Those who download software from our site mydiv.net should pay attention that information on technical requirements is located at home page each program in the tab "Requirements"(see screenshot).

Studying those. requirements of each application, pay attention to the following nuances, especially if you have problems not with "household" software, but with specialized utilities ( for example, a program for setting up, testing and overclocking any hardware or other professional applications does not start / does not work):

  • Processor power, its brand, model and other additional parameters (for example: Intel Core 2 Extreme QX9650, 3GHz).
  • RAM, its brand, type, bus frequency, etc. (for example: Corsair DDR3 2048MB, 1333MHz).
  • Graphics card options: brand, model, integrated (built-in) or discrete (external), the amount and type of its video memory, etc. (for example: AMD Radeon HD 7770, 1GB GDDR5).
  • Hard drive: be sure to specify the volume free space required to install the program + extra bed for storing temporary and files created in this program, as well as: brand, model, type (external or internal), type (SSD, HDD or SSHD) and other technical. options hard drive.
  • Sound card. Please check all requirements carefully. audio device: brand, model, type (internal or external), etc. Especially, it is necessary to launch and use specialized programs for setting up and testing sound cards, audio editors, converters, etc.
  • Operating system requirements: be sure to check the version of the OS, its build number, the requirements for the presence of installed service packs, the bit depth of the OS, etc. (for example: Windows 7 Home Premium SP1 x64 or Windows 10 Build 10547).
  • Additional software. In addition to the hardware requirements necessary for the launch and operation of programs, there are also " software requirements"to the software. That is, for the normal functioning of any application, it may be necessary to install additional technical software. Here is a list of what you must install on your computer and periodically update, keeping the installed version up to date:
    • Microsoft DirectX. A set of libraries and tools necessary for the processing and reproduction of computer graphics.
    • K-Lite Codec Pack or Advaced Codecs. Multimedia codec sets required to play audio and video on a computer. Very often used by specialized programs for editing and converting audio and video.
    • Adobe Flash Player. A browser add-on that allows you to play videos on the Internet.
    • Microsoft Visual C++. A set of libraries and plugins required for the operation of many computer programs(including for video games) written in C++ or C#.
    • Microsoft .NET Framework. Required for the operation of programs and games written using .NET technology.
    • Java JRE. Required for the operation of programs created using the Java language.

For other software requirements, check the official websites of software developers! Having carefully studied all the hardware and software requirements, you will immediately understand whether your computer will "pull" desired program or not!

Update/reinstall drivers

The driver is the most important technical program on which the normal operation of all devices connected to the computer (processor, video card, sound card and other devices) depends 100%, as well as the operating system and all the software installed on it. Agree, if you have any problems with the webcam driver, then you are unlikely to be able to use the program to record from a webcam or make a video call on Skype. Another option... For example, if the driver is not installed on your computer (or started to conflict) sound card, then your media player will definitely show "silent movies", and you can also forget about working in audio editors / converters. Therefore, it is quite obvious that the drivers need to be closely monitored and updated in time!

Complete uninstallation and reinstallation of non-working programs

Indeed, this method can actually work. Failing or not running applications at all should be tried to be removed from the system and reinstalled. To correctly remove programs from the "OS", it is best to use specialized applications "uninstallers". For these purposes, we recommend using Revo Uninstaller. Detailed instructions About, how to reinstall programs on a computer and use Revo Uninstaller , can be read in .

However, the programs uninstallers many have been created to date. If the above program does not suit you with something, then you can choose any other application you like from this set of programs.

Complete cleaning of the system with cleaner programs

This method is also quite justified, especially as a prevention of program failures in the future. Remember! The less any "garbage" will accumulate in the operating system, the more stable it and all the software installed on it will work!

To perform tasks of a similar plan, it is also best to use special programs - "cleaners". The best of them is undoubtedly CCleaner. How to use CCleaner and completely clear the system , written in detail. For those who wish to continue using this program on permanent basis, we recommend another thematic guide "".

However, there are also quite a lot of cleaner programs on the modern computer market. If the need arises, you can easily choose any other program for cleaning the "OS" by looking at this set "Programs for cleaning the operating system".

Removing programs from startup (autorun)

Programs that are in autorun always automatically start along with the operating system and continue to hang in it in the background. Without a doubt, many of them may well conflict with other applications launched / running on a PC, as well as greatly slow down the system and even often lead to its failure! Try to remove all unnecessary applications from startup and, quite possibly, the programs you need will start up again and work normally.

You can clear autoload from unnecessary objects different ways, as manually (through the service msconfig), and with the help of specialized utilities, for example, the same CCleaner. You can read more about how to edit autorun in the "" manual.

Cleaning computers from viruses

Malicious software can also be a real reason why certain programs on the computer may not work or start, since viruses can easily damage, delete and block the working files of programs. Therefore, we recommend that all users get a serious antivirus and fully check the system!

Choose suitable antivirus programs you can here (these sets contain the best, including free anti-virus applications of various plans):

Additional antivirus software, you can search at mydiv.net in other sets of programs in the "Security" section.

To learn how to use antiviruses and efficiently clean your computer from various malware, carefully read these guides:

Add exclusions to antivirus

As you know, ideal antiviruses do not exist. Many of them often sin with false positives. At any time, the antivirus can easily remove files of a program that it "did not like" from the computer or block their execution. Accordingly, these programs will immediately stop working or even run.

To avoid such unpleasant situations, you need to use the function "Exceptions", which is available in almost every normal antivirus. Please note! You can add to exceptions only those files and folders that you consider 100% safe!

To learn how to correctly create exclusions in antiviruses, read these guides:

  • " ",

Run programs as administrator and disable UAC

UAC- a Windows user account control system designed to control the differentiation of user access rights to operating system functions and prevent unauthorized launch various applications in the background.

Only the administrator has elevated privileges in the system. And only he can run many system services and applications installed on the computer! Therefore, if any program does not start for you, try restarting it with administrative rights . At the same time, you can turn off the system UAC so as not to interfere in the future.

You can read more about how this is done in the manual "".

Various network issues...

Here you will find solutions for the most frequently encountered network problems due to which many programs installed on the computer stop working or start.

Prescribing Google's DNS

Many programs need a constant and stable Internet connection to run and work, with which most of our providers often have serious problems. One of the most common problems is DNS server failures. So, if your router detects a connection, but at the same time, the pages in the browser are not loaded for some reason, it is quite possible that the provider has some problems with the DNS servers. To fix the problem, you need to register in the settings network board alternative DNS servers by Google.

It is done like this. Click on the network icon (in the lower right corner of the screen) and open "Network and Sharing Center".

In the menu that opens, select the option "Change adapter settings" and you will be taken to the section "Network connections".

In this section select "Connection by local network" or "Wireless Network Connection"(if you get internet via Wi-Fi). Click on the selected object with the right mouse button and select item "Properties".

In the properties of the network card, select the item "Internet Protocol Version 4 (TCP/IPv4)" by double clicking on it. In opened properties network protocol write down the following numbers: "Preferred DNS Server" - 8.8.8.8, "Alternate DNS Server"- 8.8.4.4. Then, to confirm the operation, press "OK".

As an alternative, you can also do this. In the "preferred server" column, write ip address of your router(usually: 192.168.1.1 or 192.168.0.1 ), and in the "alternative" - ​​already Google's DNS.

After that, if the problem was precisely with the DNS servers, the pages in the browser begin to open normally, and the work of many programs that require an Internet connection returns to normal.

Adding programs to antivirus network exclusions

As mentioned earlier, in one of the above instructions, many modern antiviruses are far from ideal and often upset users with false positives. At their "purely personal" discretion, they can easily block all network activity of any programs running / running on the computer. What this will lead to is not difficult to guess! There is only one way to deal with this, add programs and processes running in the system to exceptions

Turn off offline work in Internet Explorer

Many windows applications (for example, Windows Live Mail and Skype etc.) are directly "tied" with Internet browser explorer. That is, simply, use its engine. Because of this (in some situations) offline mode this browser may cause problems with network applications. If, for example, your mail is not being restored in Windows Live Mail, or you cannot sign in to Skype (white or blue screen without fields for entering a login / password) and other similar problems with previously working software, you may need to disable offline mode in Internet Explorer.

It is done like this. Run Internet Explorer. Press key "ALT" to display the browser control panel. Open a tab "File" and remove the checkbox from the item "Work autonomously"(also, this option can be in the tab "Service").

However, please note that in new versions of the IE browser, there is no such option in the control panel, and you can disable offline mode only through registry editing!

This is done in the following way. Open the menu "Start" and in the search bar type the command: regedit. Click lion. mouse button on the label that appears at the top regedit.exe to launch the Registry Editor.

Next, in the registry, find the branch: HKEY+CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings. After that, double-click on the parameter with the left mouse button "GlobalUserOffline" and in the window that opens, set the value - 0 .

If you find such a parameter in the registry, then it must be created! Right-click in the right window of the Registry Editor and select the option "Create", and then "DWORD Value".

After all operations are completed, IE offline mode will definitely be disabled and the programs you need should be restored.

This is where this guide ends. Where possible, we have presented you with all the fastest and most effective methods for solving common problems related to the launch and operation of the software. Try to use the most suitable ones and, most likely, your programs will work again!

You turn on the computer, a text boot screen appears on which numbers and letters flash quickly. Usually, the computer works fine and you don't pay attention to them. But this is an important part of the computer's operation during which the microprograms built into the BIOS work. But then something incomprehensible happened and everything stopped, an error code is displayed on the screen, and sometimes nothing is displayed at all - the cursor blinks and everything froze in an incomprehensible dream.

How it works

After turning on the computer, there is no operating system in its RAM. And without an operating system, the computer's hardware can't do complex things like loading a program into memory. Thus a paradox arises that seems unresolvable: in order to load an operating system into memory, we must already have an operating system in memory.

The solution to this paradox is the use of several microprograms placed in one or more microcircuits, the BIOS (Basic Input / Output System). P download process begin with automatic execution instruction processor located in read-only (or writable) memory (EEPROM or Flash ROM), starting at a given address. This firmware does not have all the functionality of the operating system, but it (functionality) is enough to perform sequential loading of other programs that are executed one after the other until the last one loads the operating system.

The sequence of the main blocks of BIOS functions in PC-compatible computers:

1. - POST - power-on self-test of the processor, memory, system logic chipset, video adapter, disk controller, keyboard, mouse and other controllers and devices;

2. - Setup BIOS(installer BIOS settings) - configuring system parameters. It can be launched during the POST procedure by pressing a certain key combination. If it has not been called by the user, the parameters set and saved in permanent memory during the last setup BIOS configuration.

3. - Operating system loader - a subroutine that searches for a valid main boot sector on a disk device.

4. - BIOS - a set of drivers designed to interact with the operating system and hardware when the system boots.

In the process BIOS boot in addition to the above, connection, disconnection, setting the operating mode of the system board device controllers is carried out in accordance with the settings recorded in the permanent memory.

Why is this needed?

This is needed for:

  • checking the health and therefore readiness for operation of the motherboard hardware;
  • checking the readiness of the external hardware, including its parameters and serviceability, as well as its compliance with the necessary minimum, which will allow you to control the computer before and after booting;
  • checking the ability to boot the operating system.

During its execution, the presence of boot devices is checked, which must be initialized before the operating system is loaded.

These include:

  • input devices (keyboard, mouse),
  • basic output device (display),
  • device from which the OS will be loaded - floppy drive, hard disk, CD-ROM, flash disk, SCSI device, Network Card(when booting over the network)

The BIOS then polls the devices listed in the pre-created list until it finds a bootable device. If no such device is found, an error message will be displayed and the download process will be stopped. If the BIOS detects a boot device, it reads the bootloader from it and transfers control to it.

In the case of a hard drive, the bootloader is called the master boot record(MBR) and is often independent of the operating system. It usually looks for an active hard drive partition, loads boot sector this section and transfers control to it. This boot sector is usually operating system specific. It must load the operating system kernel into memory and transfer control to it.

If a active partition does not exist, or the boot sector of the active partition is invalid, the MBR can load the backup bootloader and transfer control to it. The backup bootloader must select a partition (often with the help of the user), load its boot sector, and transfer control to it.

Boot sequence for standard IBM compatible personal computer

After turning on a personal computer, its processor does not start working yet.

The first device that starts after pressing the power button on the computer is the power supply. If all supply voltages are available and correct, a special Power Good signal will be sent to the motherboard, indicating a successful test of the power supply and allowing the motherboard components to start.

After that, the chipset generates a CPU reset signal, according to which the CPU registers are cleared, and it starts up.

The first command to be executed is located at FFFF0h and belongs to the BIOS address space. This command simply transfers control to the BIOS initialization program and executes the next command (the BIOS firmware).

BIOS initialization program with POST programs checks that all the computer devices necessary for the BIOS to work and the subsequent loading of the main operating system are working correctly and initializes them.

So its job is to sequentially read and execute commands from memory.

System memory is configured so that the first instruction that the processor reads after a reset will be in the BIOS chip.

By successively selecting commands from the BIOS, the processor will begin to perform a self-test, or POST.

POST procedure

The POST self-test procedure consists of several steps.

  • Initial initialization of the main system components;
  • Detection of RAM, copying BIOS code to RAM and checking BIOS checksums;
  • Initial chipset setup;
  • Search and initialization of the video adapter. Modern video adapters have their own BIOS, which the system BIOS tries to detect in a dedicated address segment. During the initialization of the video adapter, the first image generated by the BIOS of the video adapter appears on the screen;
  • Check CMOS checksum and battery condition. If the CMOS checksum is wrong, the default values ​​will be loaded;
  • CPU and RAM testing. Test results are usually displayed on the screen;
  • Connecting a keyboard, testing input / output ports and other devices.
  • Initialization of disk drives. Information about discovered devices is usually displayed on the screen;
  • Distribution of resources between devices and output of a table with discovered devices and resources assigned to them;
  • Search and initialization of devices with their own BIOS;
  • Call BIOS software interrupt INT 19h, which looks for the boot sector on the devices specified in the boot list.

Depending on the specific BIOS version, the order of the POST procedure may vary slightly, but the above basic steps are performed when any computer boots.

What are POST codes?

After turning on the power of the computer, if the power supply and the main components of the motherboard (clock generator, components responsible for the operation of the system bus and memory bus) are working, the processor starts executing the BIOS code.

To be very precise, in many modern chipsets, before sending commands to the processor, the system controller pre-configures "smart" system bus. But this does not change the essence of the matter.

The main task of the BIOS at this stage is to check the health and initialize the main hardware components of the computer. First, the internal registers of the chipset and processor are configured, and the integrity of the BIOS code is checked. Then the type and size of RAM is determined, the video card is searched for and initialized (integrated into the chipset or external). Next, the I / O ports, the drive controller, the IDE / SATA controller and the drives connected to it are configured. And, finally, the search and initialization of additional controllers integrated on the motherboard and installed expansion cards is carried out. In total, about a hundred intermediate steps are obtained, after which control is transferred to the BOOTStrap loader, which is responsible for starting the operating system.

Each of the POST test steps has its own unique number, called the POST code. Before starting the execution of the next procedure, its POST code is written to a special port called the Manufacturing Test Port. Upon successful initialization of the device, the POST code of the following procedure is written to the Manufacturing Test Port, and so on, until all tests are passed. If the device configuration fails, further POST tests are stopped, and the POST code of the procedure that caused the failure remains in the Manufacturing Test Port. After reading it, you can uniquely identify the problem device.

Keep in mind that after rebooting the computer using the operating system (“soft” or “hot” reboot) or when exiting the energy-saving mode, not all steps for testing and configuring hardware components are usually performed, but only the necessary minimum - it’s faster this way. When troubleshooting, you should always perform a "hard" ("cold") reboot - by pressing the RESET key or turning off the computer's power. This is the only way to ensure that all initialization steps are completed in full.

Award BIOS 6.0: Full Boot Option

This table can be used not only as a list of POST codes, but also as a sequence of actions that are performed when the computer is turned on. It contains the POST codes that are displayed during the full POST procedure.

POST code Description of the procedure
CF Processor type is determined and CMOS read/write is tested
C0 The chipset and L1-, L2-cache are pre-initialized, the interrupt controller, DMA, timer are programmed
C1 The type and amount of RAM is detected
C3 BIOS code is decompressed into a temporary area of ​​RAM
0C Checking BIOS checksums
C5 The BIOS code is copied to shadow memory and control is transferred to the Boot Block module
01 The XGROUP module is unpacked at physical address 1000:0000h
02 Processor initialization. CR and MSR registers are set
03 I/O resources are defined (Super I/O)
05 Clears the screen and CMOS status flag
06 Coprocessor being checked
07 Keyboard controller defined and tested
08 The keyboard interface is defined
09 Initializing the Serial ATA Controller
0A Detects keyboard and mouse connected to PS/2 ports
0B Installing AC97 audio controller resources
OE Memory segment F000h is being tested
10 The type of flash memory is determined
12 CMOS tested
14 Set values ​​for chipset registers
16 The clock generator is initially initialized
18 The processor type, its parameters and L1 and L2 cache sizes are determined
1B Interrupt vector table initialized
1C CMOS checksums and battery voltage are checked
1D The Power Management system is defined
1F Keyboard matrix is ​​loading (for laptops)
21 Hardware Power Management is initializing (for laptops)
23 Tested math coprocessor, floppy drive, chipset initialization
24 Processor microcode is updated. A resource allocation map for Plug and Play devices is created
25 PCI initialization: enumerate devices, search for VGA adapter, write VGA BIOS at C000:0
26 Installed clock frequency by CMOS setup. Disables synchronization of unused DIMM and PCI slots. The monitoring system is being initialized (H/W Monitor)
27 Interrupt INT 09h is enabled. Keyboard controller initialized again
29 MTRR registers are programmed, APIC is initialized. The IDE controller is being programmed. Processor frequency is measured. The video system BIOS extension is called
2B Finding the video adapter BIOS
2D The Award splash screen, information about the type of processor and its speed is displayed
33 The keyboard is reset
35 First DMA channel being tested
37 Second DMA channel being tested
39 DMA page registers are tested
3C The 8254 controller is configured (timer)
3E Checking the 8259 Interrupt Controller
43 Interrupt controller checked
47 ISA/EISA tires tested
49 The amount of RAM is calculated. Registers are configured for AMD processor K5
4E The MTRR registers for the Sirix processors are being programmed. L2 cache and APIC are initialized
50 USB bus defined
52 RAM is tested with results displayed. Expanded memory is cleared
53 If the CMOS is cleared, the login password is reset
55 The number of processors is displayed (for multiprocessor platforms)
57 The EPA logo is displayed. Initialization of ISA PnP Devices
59 The system of protection against viruses is determined
5B Displaying a prompt to run a BIOS update from a floppy disk
5D Super I/O controller and integrated audio controller start up
60 Entering CMOS Setup if the Delete key was pressed
65 PS/2 mouse initialized
69 Enable L2 cache
6B Chipset registers are configured according to BIOS Setup
6D Assign resources for ISA PnP devices and COM ports for integrated devices
6F Initializing and configuring the floppy disk controller
75 IDE devices are detected and installed: hard drives, CD/DVD, LS-120, ZIP, etc
76 Displays information about detected IDE devices
77 Initialize serial and parallel ports
7A The math coprocessor is reset and ready to work
7C Defines protection against unauthorized writing to hard drives
7F If there are errors, a message is displayed and the Delete and F1 keys are expected to be pressed.
82 Memory is allocated for power management and changes are made to the ESCD table. The splash screen with the EPA logo is removed. Requires a password if needed
83 All data is stored from the temporary stack in CMOS
84 Displaying the message Initializing Plug and Play Cards
85 USB initialization complete
87 SYSID tables are created in the DMI area
89 ACPI tables are installed. Assign interrupts to PCI devices
8B Called by the BIOS of additional ISA or PCI controllers, except for the video adapter
8D RAM parity parameters are set by CMOS Setup. APM is initialized
8F IRQ 12 is allowed for hot plugging a PS/2 mouse
94 Completion of chipset initialization. Displays the resource allocation table. Enable L2 cache. Setting the daylight saving time mode
95 Sets keyboard auto-repeat frequency and Num Lock state
96 For multiprocessor systems, registers are configured (for Cyrix processors). The ESCD table is created. The DOS Time timer is set according to the RTC CMOS clock. Partitions of boot devices are saved for use by the built-in antivirus. The speaker announces the end of POST. MSIRQ FF table is created BIOS interrupt INT 19h is executed. Searching for the bootloader in the first sector of the boot device

Failure or failure of any step in the test sequence leads to the testing stop and the issuance of a POST - code corresponding to this step of failure.

POST codes from other manufacturers can be found on your motherboard or DIOS manufacturer 's websites or on the Internet .

Reading POST Codes

In workshops or at the repair specialists, the control of the BIOS firmware is carried out using a special expansion card. It is inserted into a free slot (most modern models are designed for PCI bus) and, as it loads, displays on its indicator the code of the currently executed procedure.

An example would be a PCI Post Card BM9222.

However, the POST card is not a widely used tool. Rather, it is a professional computer repair tool. Realizing this fact, motherboard manufacturers began to equip models designed for enthusiasts experimenting with settings and overclocking a computer with built-in POST code indicators.

An example would be the ECS H67H2-M motherboard, or models X58 Extreme3, P55 Deluxe3 and 890GX Extreme3.

There is also a cheaper solution - during the initial initialization of components, POST codes can be displayed on the screen along with other service information. True, this solution has a significant drawback: if the problem is related to the video card, you most likely will not see anything.

The last opportunity to learn about the failure manifested during testing Beep error messages.

Sound signals and error messages

Despite the fact that POST codes are the most powerful tool for identifying hardware problems when starting a computer, the BIOS provides other diagnostic tools. If you do not have a POST card at your disposal, and the motherboard cannot display POST codes, you can focus on beeps and error messages.

But for this it is necessary that the PC case has a system speaker and it is connected to the motherboard.

Sound signals are especially valuable at the initial stage, when the video card has not yet been initialized and, as a result, is not able to display anything on the screen. A unique combination of long and short signals will indicate the problematic component.

In later stages, it is easier to navigate by the error message displayed by the BIOS in the event of a hardware problem. In some BIOS versions, this message is accompanied by a special beep, in some it replaces it. But in any case, the information is usually enough to identify the failing component.

It should be noted that sound signals and error messages are actually a more visual option for displaying certain POST codes, and by no means an additional diagnostic tool. If you have a POST card at your disposal, or the motherboard is capable of displaying POST codes, you need to focus on the codes - they give a much more accurate and detailed picture. Compare at least the number of POST codes (about a hundred) and the number of different error messages or beeps (a few dozen).

Beep sequence Error Description
1 short Successful POST
2 short Minor bugs found. A prompt appears on the monitor screen to enter the CMOS Setup Utility program and correct the situation. Check the reliability of the fastening of the cables in the connectors of the hard drive and the motherboard.
3 long Keyboard controller error
1 short, 1 long Random Access Memory (RAM) Error
1 long, 2 short Video card error
1 long, 3 short Keyboard initialization error or Video card error
1 long, 9 short Error while reading from ROM
Repetitive short Problems with the power supply
recurring long RAM problems
Repetitive high-low frequency CPU issues
Continuous Problems with the power supply
Setup procedure

Entering BIOS Setup

You can only enter BIOS Setup when the computer is turned on and the initial POST is successfully completed (one short beep is heard from the system speaker).

To do this, you must press a specific key or key combination.

Usually, the screen saver during testing displays an inscription like “Press DEL to enter Setup” - this means that you must press the DEL key to enter BIOS Setup. You can find out which key is assigned to enter the BIOS from the instructions for motherboard. If there is no instruction, and the screen saver does not display tips, you can try the most famous combinations:

Delete
Esc
Ctrl + Shift + S or Ctrl + Alt + S
Ctrl + Alt + Esc
Ctrl+Alt+Delete

Safe work with BIOS Setup

Working with BIOS Setup is associated with a certain risk, since if the parameter is changed incorrectly or carelessly, the system may function unstable or not function at all. There are a few simple tips to help minimize the potential risk:

  • It is best to experiment with BIOS Setup settings on a new computer that has not been filled with information;
  • Try not to experiment with the BIOS at all on computers that process or store important or large information. Before configuring the system using the BIOS, take care of backup important data. The main thing in such computers is stability. A hung overclocked computer after several hours of video processing is a waste of time, energy and the result of work. An overclocked one will cope with this task much more efficiently and save your nerves;
  • Before changing important parameters, always fix the set and changed value. This will allow you to return it to a working state in case of unstable operation of the system;
  • Do not change the values ​​of parameters that you do not know. Specify their meaning either in the instructions for the motherboard, or on the Internet on the resource of the board developer;
  • Do not edit several important unrelated parameters at the same time. When the system is unstable, it is much more difficult to determine which parameter caused the instability;
  • Do not overclock your computer without proper study of the operation of the overclocked system and preparation;
  • Do not use the Hard Disk Utility section, which is designed for low-level formatting of obsolete hard drives and is found in older BIOS versions, because. can disable a modern hard drive;
  • If, after setting the parameters and exiting computer BIOS stops starting at all, you can return the system to a working state in several ways:
    • If after rebooting the computer it is possible to enter the BIOS Setup, you need to set the previous values ​​of the edited parameters. Some BIOS versions themselves roll back changes from the last session.
    • If the changes made are unknown, it is best to use the default settings using the Load Fail-Safe Defaults command. After that, you will have to configure the system for optimal operation.
    • If the computer does not start at all due to incorrect BIOS settings, then in this case it is necessary to reset the contents of CMOS. In this case, all values ​​including date/time will be changed. To reset incorrect settings, simply move the Flash Recovery (IBM) jumper or the Clearing CMOS jumper to the "clear CMOS" position. In the latter case, you just need to close the contacts of the corresponding jumper with a jumper for a few minutes.
    • In case of unsuccessful results of the Setup BIOS setup, it is necessary, after resetting the unsuccessful configuration using the jumper in the Setup BIOS procedure, to duplicate the return loading of BIOS values ​​en.Wikipedia.org<< на главную>>
Internet