I have to run as adminstrator how do i run as someone else

when I open Firefox I have to open as the administrator.

What happens if you do not run as administrator? Do you get some crash? Can you please attach the crash log by following steps.
The steps to get the crash dump file are:
Open the “Task Manager” when the Adobe Illustrator CC crash window is displayed.
In the Task Manager window right-click on the name/string “Adobe Illustrator CC” and select the option “Create Dump File” in the context menu
It will display a dialog which says that it will create a file “Illustrato.dmp” in your “Temp” folder. Click on OK to create this. Wait for the action to get this completed.
Once the above file gets completed you can have this file by typing “%temp%” in your “Run” window (press “window button + r” on the keyboard). On clicking the enter key the TEMP folder can be opened.
Look there for the file name “Illustrator.dmp” and share it with [email protected]
Sanjay.

Similar Messages

  • How to get music from someone else's itunes library onto your

    How to get music from someone else's itunes library onto your

    I have a different problem, perhaps someone can help.
    My friends music library is on a hard drive, I can move songs to my library, they play fine on my computer.....However, when I try to move them to my i-phone, they turn to a light grey color and will not play on my phone.  They also have a circle with dots in front of the song.
    Some security limitation apparently, just trying to over-ride.
    Song format is .m4a

  • Will I pay for an app if I have already purchased and sending it as a gift to someone else?

    I am wondering will i pay for an app if i have already purchased and sending it as a gift to someone else?

    Yes, you will be charged for the Gift code even if you already purchased the app
    Casper

  • After I restore an ipad how do i reregister for someone else?

    After I restore an ipad how do i reregister for someone else?

    Hello there, Bkimlaw.
    The following Knowledge Base article offers up some great guidelines  and additional links for what to do before selling/giving away your iOS device:
    What to do before selling or giving away your iPhone, iPad, or iPod touch
    http://support.apple.com/kb/ht5661
    Thanks for reaching out to Apple Support Communities.
    Cheers,
    Pedro.

  • Lost and stolen list.... found phone, how do I transfer to someone else?

    I found my phone.  It is on the Lost and Stolen list.  How do I get it off the list so I can give the phone to someone else and it can then be activated by them?  Thank you.

    Call 8009220204 get tech to take off neg. List.  If you filed an ins. claim on it it belongs to asurion

  • I have been trying to get a feature/functionality in my Apple system -- have asked about it in Apple stores all over the country from coast to coast, and have received no response. How can I speak with someone at Apple that will help?

    Greetings whomever reads this.
    I have 2 issues that Apple has not been able to resolve, that are vexing me.
    1) Somehow I have 2-3 apple IDs ... passwords etc. I have purchased 2 iPads, 2 -3 iPhones, a Macbook Pro, and a Mac Mini with Thunderbolt monitor. Somewhere in that process I might have created another Apple ID, not sure. When the confusion started, I went to an Apple store, and they suggested I create a new Apple ID, against my better judgement I did, which added to the confusion. Now, every time I need to sign in using my Apple ID for anything, I have no idea what user ID goes with what password. I have gone to Apple stores several time to try to get this situation cleared up and each time they try to get me to create yet another Apple ID. Now I won't do that anymore, but the original confusion remains. How can I wipe out all Apple IDs and just have one?
    2) I have been trying to get a particular functionality/feature/capability added to my Mac system. Don't want to go into detail here because someone will steal my idea and make millions. I have posed this question to Mac personnel from Geniuses, to Business Teams -- no one can figure it out. How do I get this fabulous capability I have thought up to come to life so I can make millions?
    Russell
    <Personal Information Edited By Host>

    for #1
    Frequently asked questions about Apple ID - Apple Support
    I have multiple Apple IDs. Is there a way for me to merge them into a single Apple ID?
    Apple IDs cannot be merged. You should use your preferred Apple ID from now on, but you can still access your purchased items such as music, movies, or software using your other Apple IDs.
    If you are wondering how using multiple Apple IDs relate to iCloud, see Apple IDs and iCloud.
    for #2
    Apple does not accept unsolicited ideas see Apple - Legal - Unsolicited Idea Submission Policy

  • How do you know if someone else is attempting access to your wireless network? (WRT54G)

    I searched adn tried the Linksys FAQ to no avail to get an answer to the subject question.
    Is there any way to verify who is actually using or trying to attempt use of your wireless network, if so, where do I locate and view this information?
    I just set up a wireless system so my wife could get access from her wireless equipped laptop, but I really see no area to verify who is actually using the wireless network or if some other outside source/person is attempting to get access.
    Any info on where, how and what to do to view this type of info would be greatly appreciated and if it can't be, shouldn't there be something added to the system that would allow one to view all users accessing their wireless system?
    Thank you,
    Clay Fugitte

    Tracking down who is using your wireless system is usually difficult or impossible.  The router only knows the MAC address of the connecting computer.  MAC addresses can be faked.  Even if you knew the MAC address of the person connecting, what can you do with that info?  Go around the neighborhood asking people "Is this your MAC address?"
    Instead of worrying about who is connecting to your wireless, you should simply set up wireless security.  This will keep intruders off your wireless network.  Then you don't need to worry about who is connecting.
    It sounds like you are running an unsecured wireless router.  When you run an unsecured wireless router, anyone within range can login and use your Internet connection. At a minumum, this means that they will be using your bandwidth. At worst, they could be uploading copyrighted music, sending spam email, distributing viruses, or downloading child pornography --- all from an account with your name on it!   So my advice is --- secure your wireless network.
    To set up wireless security, do the following:
    First of all, to setup wireless security,  you must use a computer that is wired to the router.
    Where to find the router settings: The router's login password is usually on one of the "Administration" pages. The other settings are all found in the "Wireless" section of the router's setup pages, located at 192.168.1.1
    First, give your router a unique SSID. Don't use "linksys".
    Make sure "SSID Broadcast" is set to "enabled".
    Next, leave the router at its default settings (except for the unique SSID), and then use your pc to connect wirelessly to the router. Test your wireless Internet connection and make sure it is working correctly. You must have a properly working wireless connection before setting up wireless security.
    To implement wireless security, you need to do one step at a time, then verify that you can still connect your wireless computer to the router.
    Next, encrypt your wireless system using the highest level of encryption that all of your wireless devices will support. Common encryption methods are:
    WEP - poor (see note below)
    WPA (sometimes called PSK, or WPA with TKIP) - good
    WPA2 (sometimes called PSK2, or WPA with AES) - best
    WPA and WPA2 sometimes come in versions of "personal" and "enterprise". Most home users should use "personal". Also, if you have a choice between AES and TKIP, and your wireless equipment is capable of both, choose AES. With any encryption method, you will need to supply a key (sometimes called a "password" ).
    The wireless devices (computers, printers, etc.) that you have will need to be set up with the SSID, encryption method, and key that matches what you entered in the router.
    Retest your system and verify that your wireless Internet connection is still working correctly.
    And don't forget to give your router a new login password.
    Picking Passwords (keys): You should never use a dictionary word as a password. If you use a dictionary word as a password, even WPA2 can be cracked in a few minutes. When you pick your login password and encryption key (or password or passphrase) you should use a random combination of capital letters, small letters, and numbers, but no spaces. A login password, should be 12 characters or more. WPA and WPA2 passwords should be at least 24 characters. Note: Your key, password, or passphrase must not have any spaces in it.
    Most home users should have their routers set so that "remote management" of the router is disabled. If you must have this option enabled, then your login password must be increased to a minumum of 24 random characters.
    One additional issue is that Windows XP requires a patch to run WPA2. Go to Microsoft Knowledge base, article ID=893357 and it will direct you to the patch.
    Sadly, the patch is not part of the automatic Windows XP updates, so lots of people are missing the patch.
    Note:
    WEP is no longer recommended. The FBI has demonstrated that WEP can be cracked in just a few minutes using software tools that are readily available over the Internet. Even a long random character password will not protect you with WEP. You should be using WPA or preferably WPA2 encryption.

  • How do I stop receiving someone else' messages? The phone number on the machine's not mine. Signing in and out of Apple ID did not fix the problem.

    My brand new MacBook Air is receiving my partner's iMessages instead of mine, and all messages I send, go as from him. (Which has been highly embarrasing).
    I've already checked that my macine is linked to my Apple ID, which only has my phone numbers associated with it. I have already signed out, and signed back in.
    It is a brand new machine. But I believe I entered his number instead of mine when initially setting up my MacBook, and can't figure out how to change the phone number associated with this machine.
    His number is the only number which appears under: "You can be reached for messages at:" under Settings/Accounts.

    You can not change the number. That is linked to the phone the Apple ID is used on. Is he signed in on his phone with your Apple ID? Are you sharing an Apple ID?
    If you are sure you are signed in with your Apple ID and he is not using yours on his phone, then check the settings for iMessage on your phone: Settings > Messages > Send & Recieve. Is that the correct number? If so turn off iMesssage on your phone then turn it back on. Go back to your Mac and sign oput of iMessage then back in.

  • How to get rid of someone else's MAC ID on my computer and iphone

    Hello Everyone,
    I have not yet been able to register my apple computer (notebook), which i bought now a few years back. Trouble is that a person who was house/cat sitting for me, must have used my computer without my permision and now his email shows up everytime i try to do anything using my apple iD. I can't get rid of his ID in my computer's memory, whenever i need to insert my apple ID.  How do I get rid of his email address and see mine? I logged out and back into my account, but that didn't help. I reset my password, but still his ID keeps coming up, and, as i don't know his password (obviously) I can't get rid of it.
    Now this has contaminated my G4 and I can't get into itunes and therefore can only use my G4 as a telephone. Can't do anything more with it than i could do on my (cheapest available) phone.
    I am absolutely blocked, can't register either my G4 or my apple notebook and can't buy any apps or use itunes on my G4.
    Any help in gtting rid of this person's ID would be well received.
    The other problem is that this person is a confidence trickster (obviously i didn't know it at the time) and i am worried he can hack into my computer, use my network etc.
    Regards
    Mary

    Sign out of iTunes & App Store and sign in with the correct Apple ID.
    Settings>iTune & App Store>Apple ID>Sign out

  • How can I tell if someone else is tapped into iPhone 4s when I use as hotspot?

    I see a message saying there are 2 connections on my iPhone while in hotspot use.  It seems I remember being able to pull up ip address to check that noone else is hijacked on it.  Can you tell me how to do that?  Is that the best way to watch that?  Is it even possible that another person is tapped in?
    terri

    It is best to first change the password for your sync account and after having done that also generate a new sync key if you suspect that others are using your sync account.
    Also be sure to use a master password to protect your passwords, including the sync password, and prevent others from hacking your sync account.
    * https://support.mozilla.org/kb/ive-lost-my-phone-how-do-i-deactivate-sync
    *https://support.mozilla.org/kb/Protecting+stored+passwords+using+a+master+password

  • How do I get pass someone else's Apple ID on a iPad when I don't know the person? I cannot get pass this page

    I Bought a iPad and when I turn it on I get the hello scree, then the language page, then the country page then the fourth page says must sign in with Apple id and password and it shows the part of the persons I'd shaded out in grey. It says I need this because it activated my iPad. I cannot go any further than this page.  I cannot go to settings or anything.
    HOw do I get the device to delete the strangers I'd on iCloud and find my iPad  So I can set up my iPad?

    You won't be able to activate it. It is "Activation Locked". Return it for a refund.

  • How can I listen to someone else's library? It briefly did, then disappeared when he restarted his computer. (Info within)

    I spent a week with someone far away, and plugged in my iPod to his computer briefly to charge it for my flight home. I don't use my iPod very much, but when I plugged it in recently, I later noticed that "(Name)'s Library" showed up under "Home Sharing" which was under "Shared". I haven't touched sharing or anything. I could see and listen to all of his 5,000 songs. Later, he restarted his computer, and it disappeared, along with Home Sharing tab in the side bar. I actually enjoyed some of his music. We both turned on Home Sharing, I even signed into his Apple ID to see if that would do anything. Nothing.
    First, I'm curious why it showed up in the first place. Second, I'd like to know how to get it back. I see on the internet sharing is easy for local networks, but we're in different countries. And it was on separate Apple ID accounts.
    Help?

    Hello Auralous,
    Thanks for using Apple Support Communities.
    For more information on this, take a look at:
    Troubleshooting Home Sharing
    http://support.apple.com/kb/ts2972
    Best of luck,
    Mario

  • How do I un-sync someone else's Facebook from my iPhoto

    A while back, my friend somehow synced up her facebook to my phone. Now all of her picture albums from facebook show up on my iPhoto. If I try to share something directly from iPhoto it will show up on her newfeed. I don't know how to un-sync her facebook and sync mine. Also, she lives in a completly different state now. How can I fix this?

    Hey ruthie_adams,
    Thanks for the question. I understand your friend’s Facebook account is linked to your iPhoto application. To remove her account, simply delete it from iPhoto > Preferences > Accounts.
    iPhoto '11: Accounts preferences
    http://support.apple.com/kb/PH2340
    Thanks,
    Matt M.

  • How to run a File digitally signed by me on someone else computer i like?

    My pdf file that I signed by my digital id is not running on someone else computer & Its saying that no digital id present to decrypt it,contact document author.I want to know what measures should i addopt so that it runs on computers of my choice of recipients.I don't want that it also runs on every computer,I just want it runs on my recipient's computer whome I prefer.
    Please guide me what do I need to share with my clients so that they are able to run it too??

    I guess you confuse terminology. It seems to me that you encrypted PDF with a certificate encryption, not signed it. Is this correct? I am not quite sure what you mean by "run a PDF". It seems to me that you mean "open PDF". Is this correct? If my assumptions are correct, then continue reading.
    You can open a pdf encrypted with certificate encryption onlt on a computer that has a Digital ID (with private key) that corresponds to one of the certificates (with public key only), included in the recipients section of the encryption block. The whole purpose of the certificate encryption is to limit who may open the document. At the encryption step the document's author selects the list of possible recipients by providing certificates with their public keys. Only the recipient who has a Digital ID installed on the system with the private key that corresponds to one of the certificates with the public key included in the recipients section of the encryption block may open this PDF.
    If you encrypt PDF with the certificate encryption you need to do two things. First, you need to collect from your possible recipients tehir certificates with the public key (public key is not secret, only private key is). Second, in Acrobat UI when you get to "Select recipients" step, you browse to the locations where you stored possible recipients public-key certificates (the "Browse" button) and select those who you want to be able to open this PDF. If some certificates are stored on-line or in common storage directories (like LDAP) you can search for them using the "Search" button.
    You may want to learn more about encryption by reading Acrobat documentation, including books (like "Acrobat in classroom") about Acrobat..

  • I am totally frustrated by the fact that now i have gone to iCloud and after a few synchs, my contacts are all mixed up with the wrong information.  For instance, my email and phone number comes up under someone else's name (a thousand contacts)

    I am totally frustrated by the fact that now i have gone to iCloud and after a few synchs, my contacts are all mixed up with the wrong information.  For instance, my email and phone number comes up under someone else's name (a thousand contacts).  I dont know how to repair this.  what a nightmare

    An icloud account is designed to be used by just one user.  If you have given your ID or set up your account on someone else's device, then their data will be mingled with your or worse.

Maybe you are looking for