Error in program startup order. Problems loading the PC. Complete system cleaning with cleaning programs

(created to support clients of Praktika LLC)

Important! Before making any changes to the 1C database, make a backup copy. If 1C is launched in configurator mode, then through the Administration -> Save data menu. If you already have older copies, do not write over them, make a separate archive. If 1C does not start in configurator mode, copy the entire database directory to another location. If you have another storage medium (second HDD, Zip drive, writing CD-ROM), then it is better to make a copy to it. Question : When launched, the program does not load and displays the message “Protection key not found.” Answer: This error can occur due to a number of reasons. The solution options depend on whether you have a network version or a local one. Let's start with local, as a simpler case. We suggest you perform the following steps. After each attempt, please try to launch 1C: Enterprise. It is possible that the problem will be solved in the first step, and then all subsequent ones will not be needed. a)Restart your computer by clicking Start->Shut Down ->Restart Computer ->OK. Wait until the computer will restart , then try starting 1C again. b)You may have forgotten to install the protection driver when installing the program. Then you need to launch it by clicking Start ->Programs->1C: Enterprise 7.7->Install protection driver. Restart your computer and try starting 1C: Enterprise again. cCheck the physical presence of the key on the computer; someone may have touched it and it fell out of the computer. To do this, you need to get to the back wall of the computer case, where the wires are connected. Important: It is highly recommended that you turn off your computer first. The key looks like a block about 3x4x1 cm. Most likely, it will be red or white. The key is inserted into the LPT port (in the same place as the printer). In any case, you can only insert the key into the LPT port. Important: you do not need to exert much force, the efforts should be comparable to the efforts when lifting a glass of tea. If the key does not fit into the port, do not try to force it in, as either it is not a key or you are not inserting it into the LPT port. It’s better to call the person responsible for computers in your company, or call us. After you have inserted the key into the port, turn on the computer and try to start 1C: Enterprise again. d) Sometimes a printer and other equipment placed “on top” of the key can interfere with its detection by the security server. After first turning off the computer and printer, try disconnecting the peripheral (usually the printer) from the computer, leaving the key in place. Now turn on the computer and try to start 1C. Of course, in this case, you will not be able to use the disabled device. If you are using a network version and the key is not located on your computer, then it is recommended that you seek help from the person who is responsible for the performance of computers in your company. If you are this person, then we can advise you to perform the following actions: a) Check that the problem computer “sees” the server on which the key is located. You can either ping the server from the command line by running the ping program from the problem computer with the name of the server computer as a parameter. For example, c: ping server1c. Or you can simply check the presence of a server computer in the list of computers available to the client by clicking on the “My Network Neighborhood” icon. If it turns out that the problem computer does not “see” the server, then you will need to carry out a standard check for network problems. We recommend starting with checking the integrity of the cables (no breaks), the functionality of the hub, the functionality of the network card (is the light on, is the ping 127 command successful. 0.0.1), in addition, you should make sure that the necessary protocols are available and that they are configured correctly. b) Make sure that the “Protection Server” program is running on the computer with the key. This program is necessary for the operation of 1C: Enterprise clients in the network version. You can start it by clicking Start -> Programs -> 1C: Enterprise 7.7 -> Protection Server. c) On every computer with 1C: Enterprise there is a nethasp.ini file, which by default is located in C: Program Files1Cv77BIN. This file contains settings for the program that checks for the presence of a key on the network. The file is quite well documented, and you can probably figure out its structure. We recommend that you pay special attention to the lines of the protocols used (perhaps there is only one IPX/SPX left, which is not used at all on your network), the wait time for searching for a key (if the network is weak, the program may simply not have time to find it) and links to the server computer (perhaps such a computer no longer exists, it has been moved or renamed). Question: When starting 1C: Enterprise, the program does not load and displays a message like “Database directory not found C:1C.” Answer: This happened due to the fact that the folder in which the 1C database is located is inaccessible. If the database is on your computer, then most likely you have moved it somewhere. Remember if you have moved any directories (folders) recently. If you know exactly where the database was moved, or it seems to you that the recently moved folder is the database, then when starting 1C in the dialog box, select the “Change” button (on the right are the OK, Cancel buttons and the next one is “Change”). Specify a new path to the database and, by clicking on the OK button, launch 1C: Enterprise again. If the database is not on your computer, but on a remote server, then it is better to seek help from the person who is responsible for the performance of computers in your company. If you still decide to fix the problem yourself, then, firstly, you need to check the presence of a network between two computers (you can simply check the presence of a server computer in the list of computers available to the client by clicking on the “My Network Neighborhood” icon). Secondly, you need to find out the location of the directory with the database on the server. After that, by clicking on the “Change” button in the 1C: Enterprise launch dialog box, select “My Network Neighborhood” -> Server on which the database is located -> Specify the path to the database. Now try launching 1C: Enterprise again. Question: I can’t start 1C: Enterprise, the program stops with the error “Data blocking error. The data may be being used by another task." Answer: 1C: An enterprise can be launched in two modes: Exclusive and Separated. In exclusive mode, only one user can open the database. The above message indicates that someone is already logged in in exclusive mode (perhaps you) and you are now trying to use the database. The first thing you need to do is check your computer. Look at the taskbar (to the right of the “Start” button), if you see the inscription “1C: Enterprise” there, then click on it and close it. This was a previously launched copy of the 1C: Enterprise program. Start 1C: Enterprise again. If 1C: Enterprise is not running in exclusive mode on your computer, then two options are possible. The first option is applicable if there are few computers on the network using 1C: Enterprise, and they are located close to each other. Then you can go to each computer and, by selecting the 1C menu item: Enterprise Help -> About the program, you will see the Operating mode in the very last line. If it says “Monopoly” on the left, then you need to close 1C: Enterprise on this computer and start it on your own. Most likely, the problem will be solved. The second option should be used when there are many computers on the network, and it takes too long to go around them one by one. Then you need to launch the Monitor with the command Start -> Programs -> 1C: Enterprise -> User Monitor. Having launched the monitor, you need to select the menu item Monitor -> Active users. You will see a list of computers from which the database is currently being used (each line is a running 1C component: Configurator, Enterprise, Monitor, Debugger). If you pay attention to the leftmost column, you may notice that one of the computers is running 1C: Enterprise in exclusive mode (this is displayed by a red exclamation mark next to the icon). Go to this computer and close 1C: Enterprise there. The problem should now be resolved. Sometimes it is possible that some computer shut down incorrectly (or simply froze), then you need to turn it off and turn it on again. If it is impossible to determine which computer has occupied the base, and the Monitor does not indicate a computer using exclusive mode, then you will have to turn off all computers (you can one at a time, trying to start 1C after turning off each computer). Question: The program does not start and displays the message “Error loading metadata.” Answer: There is no general solution to the problem here. First, make sure that the correct path to the database is specified. You can check this by looking at the inscription at the very bottom of the 1C: Enterprise launch window. There should be a path to the database (something like C:1C). If you don’t know whether this is the right path, then read the answer to the question “When starting 1C: Enterprise, the program does not load and displays a message like “The database directory is not found C:1C.” If this does not help, then try contacting the person responsible for computers in your company. If you have no one to contact or it turns out that the path is correct, but the database nevertheless does not start, then it is better to contact us. Question: The program does not start and displays the message “Error opening table index file. To restore index files, run the program in exclusive mode." Answer: To solve this problem, you need to run the program in exclusive mode (check the “Exclusive” box when starting the program). Of course, you will first have to ask all users to log out of 1C: Enterprise. The offer to restore index files must be answered in the affirmative. This process can take a significant amount of time, from 1-2 minutes for databases of 5-10 megabytes to about an hour for large databases. If you cannot start the system in exclusive mode, although you are sure that all users have exited the program, then first check your computer; there may be a running copy of the program left there. If this does not help, then try turning off the client machines (you can do one at a time, checking after each one). It is likely that one of the programs was terminated incorrectly and did not free the database. Question: The program does not start and displays the message “The log file is damaged.” Answer: In your database directory (the path to the database is written at the bottom left of the launch window) there is a Syslog subdirectory. In this directory there is a file 1cv7.mlg, this is the log file. Move it to another directory; If you think that you do not need the log file, you can delete it. The main thing is to remove the log file from this directory. The next time you start 1C: Enterprise it should boot successfully and create an empty log file. Question: When you start the program, a pop-up screen appears with the inscription 1C: Enterprise and immediately disappears. Answer: This problem arose because you are not allowed to write to the database directory. 1C: Enterprise requires an entry to this directory to launch. To correct the situation from the server on which the database is located, select a shared resource (disk or directory with the database), right-click, select the Properties menu, Access tab, set the value to Full (or change the indicator to “Share folder” for Windows 2000). Save the changes and try running 1C: Enterprise again. Question: When trying to open the database, the program stops with the error message: "The sort order set for Database, does not coincide with the system one." Answer: In order to fix this error, click on the My Computer icon -> Control Panel -> Languages ​​and Standards. Set the suggested value to “Russian” and restart your computer. Question: When starting the program, the download stops with the error message: “Runtime Error! Program c:Program Files1Cv77Bin1Cv77.exe. Abnormal termination.” Answer: There are several possible reasons for this error. First, copy the directory of your database to another location, so that even if the worst outcome occurs (the lights are turned off during the correction process), you can return to the situation before the correction began. You can take the following steps to fix this error yourself. After each step, try to launch 1C: Enterprise.
  1. Restart your computer.
  2. Reinstall 1C: Enterprise.
  3. Copy the file 1Cv7.md, which is located in the NEW_STRU directory of your database, to the directory of your database. For example, if your database is in the c:1Cbase directory, then you need to copy the 1Cv7.md file from c:1CbaseNEW_STRU to c:1Cbase. To the question: “Should I replace the current file?” you should answer “Yes”.
  4. Launch the Configurator, select Administration -> Information Security Testing and Correction. Click on the Run button.
If the error has not been corrected, then, apparently, you will have to contact Praktika directly. Question: When launched, the program first asks for the encoding (code page and sort order), and then the download stops with the error message: “Unrecoverable database error. Code – 10. Error opening database dictionary.” Answer: Copy the file 1Cv7.dd, which is located in the NEW_STRU directory of your database, to the directory of your database. For example, if your database is in the c:1Cbase directory, then you need to copy the 1Cv7.dd file from c:1CbaseNEW_STRU to c:1Cbase. To the question: “Should I replace the current file?” you should answer “Yes”. If such a file does not exist in the NEW_STRU directory does not exist, but you know the password for the configuration, then you can fix the problems by renaming any metadata object to itself (for example, in the MainBranch constant identifier, erase the last letter “l” and put it again) . Save the configuration. Question: How to determine where the 1C: Enterprise database is located? Answer: When you launch 1C: Enterprise or Configurator, a launch window appears in front of you. If the desired database is selected (a large field almost in the middle of the window), then below you can see the path to the database. It should look something like “C:1Cbase”. Question: When launched from the third or fourth computer, the program does not start with a message like “Error accessing table DT****.” Answer: The fact is that the Windows 95/98 operating system does not allow you to keep more than 1024 files open at a time. Considering the average size of the database is 200-400 files, it turns out that the program will not run on 3-6 computers trying to access the database. It is necessary to transfer the database (for DBF versions you can simply copy the entire directory and rewrite the paths on client machines) to a computer with another operating system (recommended - Novell, Windows 2000, Windows NT). Question: 1C: The company has been opening its base for a very long time. Answer: This may be due to the fact that the antivirus scanner checks all *.dbf and *.cdx files that 1C: Enterprise wants to open. To solve the problem, you need to exclude scanning of files of this type (for example, in the AVP Monitor program this is called “Exclude by mask”). You do not have to worry about the penetration of viruses from *.dbf files of the database and index files, since they cannot contain viruses. Question: What parameters are there? command line for the file 1cv7.exe? Answer :

1cv7.exe MODE [ /M | /D | /U | /N | /P ],
where MODE is the launch mode, can take only one of three values:
config - configurator mode;
debug - debugger mode;
enterprise - normal (working) mode 1C: Enterprise.
the following keys are optional:
/M - launch the program in exclusive mode;
/D - database directory;
/U - user’s working directory (the directory from the list of users is ignored);
/N - user name;
/P - user password;
/T - path to temporary files
/@ - for configurator mode specifying a batch launch file
/W - initialization of the Web extension

Example: 1cv7 enterprise /Dc:1cmainbase /NIvanov /P123,
in this case, the program will launch without displaying dialogs about choosing a database and operating mode, as well as without prompting for a user name and password.

Launching in batch mode is described in detail in the book “Configuration and Administration. Part two" on page 252.


There are a huge number of reasons why programs installed on a computer suddenly stop working or start running altogether. Unfortunately, many of them are of an extremely specific nature, associated with certain software and technical nuances of each individual application and require an exclusive approach from the user to resolve the issue of restoring their functionality.

However, there are many common reasons that arise quite often, and by eliminating them, you can easily restore the operation of most software. We want to offer such truly effective universal solutions to our users in the instructions below.

So, if any program installed on your computer has stopped working or starting, you need...

Check technical requirements (System Requirements)

Before downloading and using any program, always carefully check the technical requirements for each program on the official website of the software developer. At the same time, be sure to keep in mind that such tech. There are two types of requirements: minimum (guarantee that the program will run on your machine, but do not guarantee that it will function quickly and fully) And recommended.

Those who download software from our website mydiv.net should note that information on technical requirements is located on the main page of each program in the tab "Requirements"(see screenshot).

Studying tech. requirements of each application, pay attention to the following nuances, especially if you have problems not with “household” software, but with specialized utilities ( for example, the program for setting up, testing and overclocking any hardware or other professional applications does not start / does not work):

  • Processor power, its brand, model and other additional parameters (for example: Intel Core 2 Extreme QX9650, 3GHz).
  • Volume random access memory , its brand, type, bus frequency, etc. (for example: Corsair DDR3 2048MB, 1333MHz).
  • Video card parameters: brand, model, integrated (built-in) or discrete (external), volume and type of video memory, etc. (for example: AMD Radeon HD 7770, 1GB GDDR5).
  • Hard drive: be sure to check the amount of free space required to install the program + additional space for storing temporary and files created in this program, as well as: brand, model, type (external or internal), type (SSD, HDD or SSHD) and other tech. options hard drive.
  • Sound card. Carefully check all the requirements for the sound device: brand, model, type (internal or external), etc. This is especially necessary for launching and using specialized programs for setting up and testing sound cards, audio editors, converters, etc.
  • Operating system requirements: Be sure to check the OS version, its build number, requirements for the presence of installed service packs, the bit depth of the operating system, etc. (for example: Windows 7 Home Premium SP1 x64 or Windows 10 Build 10547).
  • Additional software. In addition to the hardware requirements necessary to launch and operate programs, there are also “software requirements” for the software. That is, for the normal functioning of any application, the mandatory installation of additional technical software may be required. Here is a list of what you definitely need to install on your computer and update periodically to keep the installed version up to date:
    • Microsoft DirectX. A set of libraries and tools necessary for processing and reproducing computer graphics.
    • K-Lite Codec Pack or Advaced Codecs. Sets of multimedia codecs necessary for playing audio and video on a computer. They are also often used by specialized programs for editing and converting audio and video.
    • Adobe Flash Player. A browser add-on program that allows you to play videos on the Internet.
    • Microsoft Visual C++. A set of libraries and plugins necessary for the operation of many computer programs (including video games) written in C++ or C#.
    • Microsoft .NET Framework. Required for programs and games written using .NET technology.
    • Java JRE. Required for running programs created using the Java language.

For other software requirements, check on the official websites of program developers! Having carefully studied all the hardware and software requirements, you will immediately understand whether your computer can handle it the desired program or not!

Update/reinstall drivers

The driver is the most important technical program on which the normal operation of all devices connected to the computer (processor, video card, sound card and other devices), as well as the operating system and all the software installed on it. Agree, if you have any problems with the webcam driver, then you are unlikely to be able to use a program for recording from a webcam or make a video call on Skype. Another option... For example, if you do not have a sound card driver installed on your computer (or it has started to conflict), then your media player will definitely show “silent movies”, and you can also forget about working in audio editors/converters. Therefore, it is quite obvious that you need to carefully monitor the drivers and update them on time!

Complete uninstallation and reinstallation of broken programs

Indeed, this method can really work. Applications that fail or do not start at all should be removed from the system and reinstalled. To correctly remove programs from the operating system, it is best to use specialized applications "uninstallers". For these purposes, we recommend using Revo Uninstaller. Detailed instructions About, how to properly reinstall programs on your computer and use Revo Uninstaller , can be read in.

However, the programs uninstallers To date, a lot has been created. If the above program does not suit you in any way, then you can choose any other application you like from this set of programs.

Complete system cleaning with cleaning programs

This method is also quite justified, especially as a preventative against program failures in the future. Remember! The less “garbage” that accumulates in the operating system, the more stable it and all the software installed on it will work!

To perform tasks of this kind, it is best to use special programs - “cleaners”. The best of them, undoubtedly, is CCleaner. How to use CCleaner and completely clean the system , it is written in detail. For those who would like to use this program on an ongoing basis in the future, we recommend another thematic guide "".

However, there are also quite a lot of cleaning programs on the modern computer market. If the need arises, you can easily select any other program to clean the “OS” by looking at this set of “Programs for cleaning the operating system”.

Removing programs from startup (autorun)

Programs that are in autorun always automatically start along with the operating system and continue to hang in the background in the future. Without a doubt, many of them may well conflict with other applications running/running on the PC, as well as greatly slow down the system and even often lead to crashes! Try removing all unnecessary applications from startup and, quite possibly, the programs you need will start launching and working normally again.

You can clear startup from unnecessary objects different ways as manually (via service msconfig), and with the help of specialized utilities, for example, the same CCleaner. You can read more about how to edit autorun in the manual " ".

Cleaning computers from viruses

Malware can also be the real reason why certain programs on a computer may not work or start, since viruses can easily damage, delete and block working program files. Therefore, we recommend that all users acquire a serious antivirus and completely scan the system!

You can select suitable anti-virus programs here (these sets contain the best, including free anti-virus applications of various types):

Additional antivirus software, you can search on mydiv.net in other sets of programs in the "Security" section.

Read carefully in these guides about how to use antiviruses and thoroughly clean your computer from various malware:

Add exceptions to antivirus

As you know, there are no ideal antiviruses. Many of them often suffer from false positives. At any moment, an antivirus can easily delete files of any program that it “doesn’t like” from the computer or block their execution. Accordingly, these programs will immediately stop working or start altogether.

To avoid such unpleasant situations, you need to use the function "Exceptions", available in almost every normal antivirus. Please note! You can add only those files and folders that you consider 100% safe to exceptions!

To learn how to correctly create exceptions in antiviruses, read these guides:

  • " ",

Run programs as administrator and disable UAC

UAC- account control system Windows users, created to control the delimitation of user access rights to operating system functions and prevent unauthorized launch of various applications in the “background” mode.

Only the administrator has elevated privileges in the system. And only it can run many system services and applications installed on the computer! Therefore, if any program does not start for you, try restarting it with administrative rights. At the same time, you can turn off the system UAC so as not to interfere in the future.

You can read more about how this is done in the manual " ".

Various network problems...

Here you will find solutions for the most common network problems due to which many programs installed on the computer stop working or starting.

Prescribing Google DNS

Many programs require a constant and stable Internet connection to launch and work, with which most of our providers often have serious problems. One of the most common problems is DNS server failures. So, if your router detects the presence of a connection, but for some unknown reason the pages in the browser do not load, it is quite possible that the provider has some problems with the DNS servers. To fix the problem, you need to set it in the network card settings alternative DNS servers from Google.

It's done like this. Click on the network icon (in the lower right corner of the screen) and open "Network and Sharing Center".

In the menu that opens, select the option "Change adapter settings" and you will be taken to the section "Network connections".

In this section, select "Connect via local network" or "Wireless network connection"(if you get internet via Wi-Fi). Right-click on the selected object and select "Properties".

In the properties of the network card, select "Internet Protocol Version 4 (TCP/IPv4)" by double-clicking on it. In the network protocol properties that open, enter the following numbers: "Preferred DNS Server" - 8.8.8.8, "Alternate DNS server"- 8.8.4.4. Then, to confirm the operation, press "OK".

As an alternative, you can do this. In the "preferred server" column, write IP address of your router(usually: 192.168.1.1 or 192.168.0.1 ), and in the “alternative” - already Google’s DNS.

After this, if the problem was with the DNS servers, the pages in the browser begin to open normally, and the operation of many programs that require an Internet connection returns to normal.

Adding programs to antivirus network exceptions

As mentioned earlier, in one of the instructions described above, many modern antiviruses are far from ideal and often upset users with false positives. At their “purely personal” discretion, they can easily block all network activity of any programs running/running on the computer. It’s not hard to guess where this will lead! There is only one way to deal with this - add programs and processes running in the system to exceptions

Turn off offline work in Internet Explorer

Many Windows applications (for example, Windows Live Mail and Skype, etc.) are directly connected to the browser Internet Explorer. That is, simply, they use its engine. Because of this (in some situations) offline mode this browser may cause problems with online applications. If, for example, your mail in Windows Live Mail is not restored or you cannot log into Skype (white or blue screen without fields for entering login / password) and other similar problems with previously normally working software, you may need disable offline mode in Internet Explorer.

It's done like this. Launch Internet Explorer. Press the key "ALT" to display the browser control panel. Open the tab "File" and remove the checkbox from the item "Work autonomously"(also, this option can be located in the tab "Service").

However, please note that in new versions of the IE browser, there is no such option in the control panel, and you can disable offline mode only through editing the registry!

This is done as follows. Open menu "Start" and in the search bar type the command: regedit. Click left. click on the shortcut that appears at the top regedit.exe to launch Registry Editor.

Next, find the branch in the registry: HKEY+CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings. After this, double-click with the left mouse button on the parameter "GlobalUserOffline" and in the window that opens, set the value - 0 .

If you find such a parameter in the registry, then you definitely need to create it! Right-click in the right window of the Registry Editor and select the option "Create", and then "DWORD value".

After all operations are completed, IE's offline mode will be disabled and the functionality of the programs you need should be restored.

This concludes this guide. As far as possible, we have presented you with all the fastest and most effective methods for solving common problems related to the launch and operation of software. Try using the most suitable ones and, most likely, your programs will work again!


Manually editing the Windows registry to remove Error 5 keys that contain errors is not recommended unless you are a PC service professional. Mistakes made when editing the registry can render your PC inoperable and cause irreparable damage to your operating system. In fact, even one comma placed in the wrong place can prevent your computer from booting!

Because of this risk, we highly recommend using a trusted registry cleaner such as WinThruster [Download] (developed by Microsoft Gold Certified Partner) to scan and repair any Error 5-related issues. Using Registry Cleaner [Download] can automate the process of finding corrupted registry entries, missing file references (such as those causing the %%error_name% error), and broken links within the registry. Before each scan, a backup copy, which allows you to undo any changes with one click and protects you from possible damage to your computer. The best part is that fixing registry errors [Download] can dramatically improve system speed and performance.


Warning: Unless you are an experienced PC user, we DO NOT recommend manually editing the Windows Registry. Using Registry Editor incorrectly can cause serious problems and require Windows reinstallation. We do not guarantee that problems resulting from incorrect use of Registry Editor can be corrected. You use Registry Editor at your own risk.

Before manually restoring Windows registry, you need to create a backup by exporting the part of the registry associated with Error 5 (for example, Windows Operating System):

  1. Click on the button Begin.
  2. Enter " command" V search bar... DON'T CLICK YET ENTER!
  3. While holding down the keys CTRL-Shift on your keyboard, press ENTER.
  4. A dialog box for access will be displayed.
  5. Click Yes.
  6. The black box opens with a blinking cursor.
  7. Enter " regedit" and press ENTER.
  8. In the Registry Editor, select the Error 5-related key (for example, Windows Operating System) that you want to back up.
  9. On the menu File select Export.
  10. On the list Save to select the folder where you want to save the backup Windows key Operating System.
  11. In field File name Enter a name for the backup file, for example "Windows Operating System backup".
  12. Make sure the field Export range value selected Selected branch.
  13. Click Save.
  14. The file will be saved with extension .reg.
  15. You now have a backup of your Windows Operating System-related registry entry.

The following steps for manually editing the registry will not be described in this article, as they are likely to damage your system. If you would like more information about editing the registry manually, please check out the links below.

It's time to submit a quarterly or, better yet, an annual report, click on the program shortcut 1C Enterprise 7.7 and in response you get error message: "" After which you can only launch the configurator? Don't know what to do? Let's find a way out of an unpleasant situation together.

The reason for this error messages clear - settings mismatch 1C Enterprise 7.7 And Windows 7.
Let's start troubleshooting the problem.

Solution 1. Let's give the code page in accordance with the operating system Windows 7:
Click on the program shortcut 1C Enterprise 7.7 and in the window that opens, mark the database you are going to work with. Then click on the “Configurator” button. In the configurator that opens, follow the menu path AdministrationCode page of information security tables... Then in the window " Code page of infobase tables» select from the list → + Current system installation→ OK. In the window that opens asking for changing the code page click “Yes”. Wait for the procedure to complete and close the Configurator. That's it, you can work with this information base in Windows 7(for other databases the procedure will have to be repeated). But do not forget that if you transfer this database to a computer with an operating Windows system XP, you will receive an error message again.

Solution 2. Let's disable sort order checking:
Create an empty file ordnochk.prm and put it in a folder BIN located in the installation directory 1C Enterprise 7.7 , thus disabling the sorting check for all databases at once. This solution, despite its simplicity, can cause some problems and, moreover, will only work if you are using version 26 or later of the program 1C Enterprise 7.7 .

Naturally, if you use 1C Enterprise 7.7 on local computer with installed Windows 7, or this operating system is installed on all machines, then your choice Solution 1 .
If the computers have different operating systems, then it will suit you better Solution 2. Important! All changes in the Configurator will need to be made exclusively on a computer with the installed Windows XP, information databases should also be stored there, but here is the file ordnochk.prm, on the contrary, you need to put it in a folder BIN located on a machine running an operating system Windows 7.

As you can see, error message: « The sort order set for the database is different from the system one! » is easy to fix. Good luck!

You turn on the computer, a text loading screen appears on which numbers and letters quickly flash. Usually, the computer works fine and you don't pay attention to them. But this is an important part of the computer’s operation during which the firmware built into the BIOS runs. But then something incomprehensible happened and everything stopped, an error code is displayed on the screen, and sometimes nothing is displayed at all - the cursor blinks and everything is frozen in an incomprehensible dream.

How it works

After turning on the computer, there is no operating system in its RAM. And without an operating system, the computer's hardware cannot perform complex actions, such as loading a program into memory. This creates a paradox that seems insoluble: in order to load an operating system into memory, we must already have the operating system in memory.

The solution to this paradox is the use of several microprograms located in one or more chips, BIOS (Basic Input/Output System). P loading process begins with the processor automatically executing commands located in permanent (or rewritable) memory (EEPROM or Flash ROM), starting from a given address. These firmwares do not have all the functionality of the operating system, but they do have enough functionality to perform sequential loading of other programs, which are executed one after another until the last one loads the operating system.

The sequence of main blocks of BIOS functions in PC-compatible computers:

1. - POST - self-test when turning on the power of the processor, memory, system logic chipset, video adapter, disk controller, keyboard, mouse and other controllers and devices;

2. - Setup BIOS (BIOS parameter setting program) - configuration of system parameters. It can be triggered during the POST procedure by pressing a certain key combination. If it was not called by the user, the parameters installed and saved in permanent memory during the last configuration of Setup BIOS are loaded.

3. - Operating system loader - a subroutine that searches for a valid primary boot sector on a disk device.

4. - BIOS - a set of drivers designed for interaction between the operating system and hardware when the system boots.

During the BIOS loading process, in addition to the above, connection, disconnection, and setting of the operating mode of the system board device controllers is carried out in accordance with the settings recorded in permanent memory.

Why is this necessary?

This is needed for:

  • checking the serviceability and therefore readiness for operation of the system board hardware;
  • checking the readiness of external hardware, including its parameters and serviceability, as well as its compliance with the required minimum, which will allow you to control the computer before and after booting;
  • checking the ability to boot the operating system.

During its execution, the presence of boot devices that must be initialized before loading the operating system is checked.

These include:

  • input devices (keyboard, mouse),
  • basic output device (display),
  • device from which the OS will be loaded - disk drive, hard drive, CD-ROM, flash drive, SCSI device, network card (if booting over the network)

The BIOS then polls the devices listed in a pre-built list until it finds a boot device. If such a device is not found, an error message will be displayed and the boot process will be stopped. If the BIOS detects a boot device, it reads the bootloader from it and transfers control to it.

In the case of a hard drive, the boot loader is called the master boot record (MBR) and is often independent of the operating system. Typically, it looks for the active hard drive partition, loads the boot sector of that partition, and transfers control to it. This boot sector is typically operating system specific. It must load the operating system kernel into memory and transfer control to it.

If no active partition exists, or the active partition's boot sector is invalid, the MBR can load a backup boot loader and transfer control to it. The backup bootloader must select a partition (often with the help of the user), load its boot sector, and transfer control to it.

Boot sequence for a standard IBM-compatible personal computer

After turning on the personal computer, its processor does not yet start working.

The first device that starts after you press the computer's power button is the power supply. If all supply voltages are available and comply with the norm, a special Power Good signal will be sent to the motherboard, indicating successful testing of the power supply and allowing the system board components to start.

After this, the chipset generates a CPU reset signal, which clears the processor registers and starts it up.

The first command to be executed is located at address FFFF0h and belongs to the BIOS address space. This command simply transfers control to the BIOS initialization program and executes the next command (BIOS firmware).

The BIOS initialization program, using the POST program, checks that all computer devices necessary for the BIOS to operate and subsequently load the main operating system are working correctly and initializes them.

Thus, its job is to sequentially read and execute commands from memory.

System memory is configured so that the first instruction the processor reads after a reset will be in the BIOS chip.

By sequentially selecting commands from the BIOS, the processor will begin to perform a self-test, or POST, procedure.

POST procedure

The POST self-test procedure consists of several steps.

  • Initial initialization of the main system components;
  • Detecting RAM, copying BIOS code into RAM and checking BIOS checksums;
  • Initial chipset setup;
  • Finding and initializing the video adapter. Modern video adapters have their own BIOS, which the system BIOS tries to detect in a specially designated address segment. During the initialization of the video adapter, the first image generated using the BIOS of the video adapter appears on the screen;
  • Checking the CMOS checksum and battery status. If the CMOS checksum is incorrect, default values ​​will be loaded;
  • Testing the processor and RAM. Test results are usually displayed on the screen;
  • Connecting a keyboard, testing I/O ports and other devices.
  • Initializing disk drives. Information about detected devices is usually displayed on the screen;
  • Distribution of resources between devices and displaying a table with detected devices and resources assigned to them;
  • Search and initialize devices that have their own BIOS;
  • Calls the BIOS INT 19h software interrupt, which looks for the boot sector on devices specified in the boot list.

Depending on the specific BIOS version, the order of the POST procedure may vary slightly, but the above basic steps are performed when booting any computer.

What are POST codes?

After turning on the computer's power, if the power supply and the main components of the motherboard are working (clock generator, components responsible for the operation of the system bus and memory bus), the processor begins executing the BIOS code.

To be precise, in many modern chipsets, before the system controller transmits commands to the processor, the “smart” system bus is pre-configured. But this does not change the essence of the matter.

The main task of the BIOS at this stage is to check the serviceability and initialize the main hardware components of the computer. First, the internal registers of the chipset and processor are configured, and the integrity of the BIOS code is checked. Then the type and size of RAM is determined, and the video card (integrated into the chipset or external) is searched and initialized. Next, the I/O ports, disk drive controller, IDE/SATA controller and the drives connected to it are configured. And finally, additional controllers integrated on the motherboard are searched for and initialized and installed cards extensions. In total, there are about a hundred intermediate steps, after which control is transferred to the BOOTStrap loader, which is responsible for starting the operating system.

Each POST test step has its own unique number, called a POST code. Before the next procedure starts, its POST code is written to a special port called Manufacturing Test Port. When the device is successfully initialized, the POST code of the next procedure is written to the Manufacturing Test Port, and so on, until all tests are completed. If configuration of the device fails, further execution of POST tests stops, and the POST code of the procedure that caused the failure remains in the Manufacturing Test Port. After reading it, you can clearly identify the problematic device.

Keep in mind that after rebooting the computer using the operating system (soft or warm boot) or exiting power-saving mode, not all steps for testing and configuring hardware components are usually performed, but only the necessary minimum - this is faster. When troubleshooting, you must always perform a “hard” (“cold”) reboot - using the RESET key or turning off the computer’s power. This is the only way to guarantee that all initialization steps will be completed in full.

Award BIOS 6.0: full boot option

This table can be used not only as a list of POST codes, but also as a sequence of actions that are performed when the computer is turned on. It contains POST codes that are displayed during the full POST procedure.

POST code Description of the procedure
CF The processor type is determined and CMOS read/write is tested
C0 The chipset and L1-, L2-cache are pre-initialized, the interrupt controller, DMA, and timer are programmed
C1 The type and amount of RAM is detected
C3 The BIOS code is unpacked into a temporary area of ​​RAM
0C BIOS checksums are checked
C5 The BIOS code is copied to shadow memory and control is transferred to the Boot Block module
01 The XGROUP module is unpacked at physical address 1000:0000h
02 Processor initialization. The CR and MSR registers are set
03 I/O resources are determined (Super I/O)
05 Clears the screen and CMOS status flag
06 Coprocessor is checked
07 The keyboard controller is determined and tested
08 Keyboard interface is defined
09 Initializing the Serial ATA Controller
0A Detects the keyboard and mouse that are connected to the PS/2 ports
0B AC97 audio controller resources are installed
O.E. Testing memory segment F000h
10 The type of flash memory is determined
12 CMOS tested
14 Set values ​​for chipset registers
16 The clock generator is initially initialized
18 The processor type, its parameters and L1 and L2 cache sizes are determined
1B The interrupt vector table is initialized
1C Checks CMOS checksums and battery voltage
1D Power management system is defined
1F Loading the keyboard matrix (for laptops)
21 The Hardware Power Management system is initializing (for laptops)
23 Math coprocessor, floppy drive, chipset initialization are tested
24 The processor microcode is updated. Creates a resource distribution map for Plug and Play devices
25 Initial PCI initialization: lists devices, searches for VGA adapter, writes VGA BIOS to C000:0
26 Installed clock frequency by CMOS Setup. Synchronization of unused DIMM and PCI slots is disabled. The monitoring system (H/W Monitor) is initialized
27 Interrupt INT 09h is enabled. The keyboard controller is initialized again
29 The MTRR registers are programmed and the APIC is initialized. The IDE controller is being programmed. The processor frequency is measured. The video system BIOS extension is called
2B Search for video adapter BIOS
2D The Award splash screen displays, information about the processor type and its speed
33 Keyboard resets
35 First DMA channel being tested
37 Testing the second DMA channel
39 DMA page registers are tested
3C Configuring the 8254 controller (timer)
3E Checking the 8259 interrupt controller
43 Interrupt controller is checked
47 ISA/EISA buses are tested
49 The amount of RAM is calculated. Registers are being configured for the AMD K5 processor
4E Programming MTRR registers for Syrix processors. L2 cache and APIC are initialized
50 USB bus detected
52 The RAM is tested and the results are displayed. Clearing extended memory
53 If the CMOS is cleared, the login password is reset
55 Displays the number of processors (for multiprocessor platforms)
57 The EPA logo is displayed. Initial Initialization of ISA PnP Devices
59 The virus protection system is determined
5B Prompt for running BIOS update from floppy disk
5D Super I/O controller and integrated audio controller starts
60 Entering CMOS Setup if the Delete key was pressed
65 PS/2 mouse is initializing
69 L2 cache is enabled
6B Chipset registers are configured according to BIOS Setup
6D Assigns resources for ISA PnP devices and COM ports for integrated devices
6F The floppy controller is initialized and configured
75 IDE devices are detected and installed: hard drives, CD/DVD, LS-120, ZIP, etc.
76 Displays information about detected IDE devices
77 Serial and parallel ports are initialized
7A The math coprocessor is reset and ready for operation.
7C Defines protection against unauthorized writing to hard drives
7F If there are errors, a message is displayed and the Delete and F1 keys are pressed
82 Memory is allocated for power management and changes are written to the ESCD table. The splash screen with the EPA logo is removed. Requests a password if needed
83 All data is saved from the temporary stack to CMOS
84 Displaying the Initializing Plug and Play Cards message
85 USB initialization completes
87 SYSID tables are created in the DMI area
89 ACPI tables are installed. Interrupts are assigned to PCI devices
8B Called by the BIOS of additional ISA or PCI controllers, with the exception of the video adapter
8D RAM parity parameters are set using CMOS Setup. APM is initialized
8F IRQ 12 is allowed for PS/2 mouse hot plugging
94 Completing chipset initialization. Displays the resource allocation table. Enable L2 cache. Setting the summer/winter time transition mode
95 Sets the keyboard auto-repeat frequency and Num Lock state
96 For multiprocessor systems, registers are configured (for Cyrix processors). The ESCD table is created. The DOS Time timer is set according to the RTC CMOS clock. Boot device partitions are saved for use by the built-in antivirus. The speaker announces the end of POST. The MSIRQ FF table is created. The BIOS INT 19h interrupt is executed. Search for the bootloader in the first sector of the boot device

Failure to complete or failure of any step in the test sequence leads to testing stopping and issuing a POST code corresponding to this failure step.

POST codes from other manufacturers can be found on the websites of your motherboard manufacturer or DIOS manufacturer or on the Internet.

Reading POST codes

In workshops or repair specialists, control of the execution of BIOS microprograms is carried out using a special expansion card. It is inserted into a free slot (most modern models are designed for the PCI bus) and as it loads, it displays on its indicator the code of the currently executing procedure.

An example would be the BM9222 PCI Post card.

However, the POST card is not a widely used means. Rather, it is a professional computer repairman's tool. Realizing this fact, motherboard manufacturers began to equip models designed for enthusiasts experimenting with computer settings and overclocking with built-in POST code indicators.

An example would be the ECS H67H2-M motherboard, or models X58 Extreme3, P55 Deluxe3 and 890GX Extreme3.

There is also a cheaper solution - during the initial initialization of components, POST codes can be displayed on the screen along with other service information. However, this solution has a significant drawback: if the problem is related to the video card, you most likely will not see anything.

Last opportunity to find out about a failure that occurred during testing Sound signals of error messages.

Sounds and error messages

Despite the fact that POST codes are the most powerful tool for identifying hardware problems when starting a computer, the BIOS also provides other diagnostic tools. If you do not have a POST card at your disposal, and the motherboard cannot display POST codes, you can rely on sound signals and error messages.

But for this it is necessary that the PC case has a system speaker and it is connected to the motherboard.

Sound signals are especially valuable at the initial stage, when the video card has not yet been initialized and, as a result, is not able to display anything on the screen. The unique combination of long and short signals will indicate the problematic component.

At later stages, it is easier to navigate by the error message displayed by the BIOS in the event of a hardware problem. In some BIOS versions this message is accompanied by a special sound signal, in others it replaces it. But in any case, the information is usually enough to identify the failing component.

It should be noted that sound signals and error messages are actually a more visual option for displaying certain POST codes, and are by no means an additional diagnostic tool. If you have a POST card at your disposal, or the motherboard is capable of displaying POST codes, you need to focus on the codes - they give a much more accurate and detailed picture. Compare at least the number of POST codes (about a hundred) and the number of different error messages or beeps (several dozen).

Sequence of beeps Description of the error
1 short Successful POST
2 short Minor errors found. A prompt appears on the monitor screen to enter the CMOS Setup Utility program and correct the situation. Check that the cables are securely fastened in the hard drive and motherboard connectors.
3 long Keyboard controller error
1 short, 1 long Random access memory (RAM) error
1 long, 2 short Video card error
1 long, 3 short Keyboard initialization error or video card error
1 long, 9 short Error reading from ROM
Repeating short Problems with the power supply
Repeating long RAM problems
Repeated high-low frequency CPU problems
Continuous Problems with the power supply
Setup procedure

Login to BIOS Setup

Entering BIOS Setup is only possible when the computer is turned on and the initial POST test is successful (one short signal from the system speaker).

To do this, you need to press a specific key or key combination.

Typically, when testing, the screen saver displays a message like “Press DEL to enter Setup” - this means that you must press the DEL key to enter BIOS Setup. You can find out which key is assigned to enter the BIOS from the instructions for motherboard. If there are no instructions and the screen saver does not display any hints, you can try the most well-known combinations:

Delete
Esc
Ctrl + Shift + S or Ctrl + Alt + S
Ctrl + Alt + Esc
Ctrl + Alt + Delete

Safe work with BIOS Setup

Working with BIOS Setup is associated with a certain risk, since if the parameter is changed incorrectly or carelessly, the system may become unstable or not function at all. There are a few simple tips that can help reduce the possible risk to a minimum:

  • It is best to experiment with BIOS Setup settings on a new computer that is not filled with information;
  • Try not to experiment with the BIOS at all on computers that process or store important or voluminous information. Before setting up your system using the BIOS, take care of backup important data. The main thing in such computers is stability. A frozen overclocked computer after several hours of video processing is a waste of time, electricity and work results. An unoverclocked one will cope with this task much more efficiently and will save your nerves;
  • Before you change important parameters, always record the set and changed value. This will allow you to return it to working condition in case of unstable operation of the system;
  • Do not change parameter values ​​that you do not know. Check their meaning either in the instructions for the motherboard, or on the Internet on the board developer’s resource;
  • Do not edit several important unrelated parameters at once. When the system is unstable, it is much more difficult to determine which parameter caused the unstable operation;
  • Do not overclock your computer without proper study and preparation of the system being overclocked;
  • Do not use the Hard Disk Utility section, which is designed for low-level formatting of older hard drive models and is found in older BIOS versions, because can damage a modern hard drive;
  • If, after setting the parameters and exiting the BIOS, the computer stops starting at all, you can return the system to a working state in several ways:
    • If it is possible to enter BIOS Setup after restarting the computer, you need to set the edited parameters to the previous values. Some BIOS versions themselves roll back changes from the last session.
    • If the changes made are unknown, it is better to use the default parameters using the Load Fail-Safe Defaults command. After this, you will have to configure the system for optimal operation.
    • If the computer does not start at all due to incorrect BIOS settings, then in this case it is necessary to reset the CMOS contents. In this case, all values ​​including date/time will be changed. To do this, reset incorrect settings by simply moving the Flash Recovery (IBM) jumper or the Clearing CMOS jumper to the “clearing CMOS” position. In the latter case, you just need to close the contacts of the corresponding jumper with a jumper for a few minutes.
    • In case of unsuccessful results of Setup BIOS, after resetting the unsuccessful configuration using a jumper in the Setup BIOS procedure, it is necessary to duplicate the return of loading BIOS values ​​ru.Wikipedia.org<< на главную>>

Top