Here is additional information from Pervasive's site. If you upgrade to the latest version and service pack then it is supposed to have resovlved the issue.
At the end of this is a Microsoft article about it. Notice at the very end it talks about he compatibility template. You will have to locate it on MS site.
The reason for this is that Windows 2000 changed the default permissions for Users in the HKEY_LOCAL_MACHINE branch from read\write to read-only. The Pervasive requester dll's fail when attempting to write to this branch.
Solution:
Pervasive.SQL 2000 Service Pack 2 provided a fix for this by moving some of the keys to the HKEY_CURRENT_USER branch.
A workaround for Pervasive.SQL 7.0 or 2000 Pre-Service Pack 2 users is to add additional permissions to the Pervasive registry key for those users.
You can add the permissions to the entire Pervasive subkey which will allow the users to change and use non-default settings listed in the local setup or configuration utility.
At a minimum, users will need to have read\write\modify access to the
HKEY_LOCAL_MACHINE\SOFTWARE\Pervasive Software\Communications Requester\Version 7.00\Settings
subkey.
WARNING: Please take extreme caution while editing registry. Editing your registry is dangerous and can disable your operating system causing you to have to reinstall all your software. Pervasive Software Inc. will not be responsible for any mishap due to registry changes.
Run Regedt32
Browse to
HKEY_LOCAL_MACHINE\SOFTWARE\Pervasive Software\Communications Requester\Version 7.00\Settings
Go to Security - Permissions, and select the Advanced button.
Select the Users group or the appropriate group for your Pervasive users.
In addition to the default permissions of
Query Value, Enumerate Subkeys, Notify, and Read Control,
add
Set Value, Create Subkey, and Delete.
This will show in the Entries list as a separate value with Special permissions.
Windows 2000 includes a set of text-based security template files that you can use to apply uniform security settings on computers within an enterprise.
You can apply these templates to group policy objects using the Group Policy Editor snap-in in Microsoft Management Console (MMC), or you can apply them directly to a specific computer using the Security Configuration and Analysis MMC snap-in.
The templates modify security settings incrementally and do not include the default security settings. The assumption is that the templates are to be applied to Windows 2000-based computers that have been installed cleanly, (that is, not upgraded from Microsoft Windows NT 4.0 or an earlier version of Windows). Computers that are upgraded from Windows NT do not use the default Windows 2000 security settings, but instead use whatever security settings were in place prior to the upgrade.
More Information
The security templates are:
Basic: Basicwk.inf (Windows 2000 Professional), Basicsv.inf (Windows 2000 Server), and Basicdc.inf (domain controller)
The Basic templates specify default security settings for all security areas, with the exception of user rights and group membership.
Secure: Securews.inf (Windows 2000 Professional)and Securedc.inf (domain controller)
The Secure templates provide increased security for areas of the operating system that are not covered by permissions, including: increased security settings for the account policy, increased settings for auditing, and increased security settings for some well-known security-relevant registry keys. Access Control Lists (ACLs) are not modified by this template, because the assumption is that default Windows 2000 security settings are in effect.
Highly Secure: Hisecws.inf (Windows 2000 Professional) and Hisecdc.inf (domain controller)
The Highly Secure templates are provided for Windows 2000-based computers that operate in native Windows 2000 environments only. Requires that all network communications be digitally signed and encrypted at a level that can only be provided by Windows 2000. Computers configured with this template cannot communicate with downlevel Windows clients.
Compatible: Compatws.inf (Windows 2000 Professional)
The Compatible template opens up the default permissions for the Local Users group so that legacy programs are more likely to run. This configuration is not considered a secure environment.
First Published: Jun 10 1999 8:07AM
Keywords: kbtool kbinfo
Gil