Logo

15 Deep WEB sites you need to visit

Deep WEBA not long time ago we had an article about the deep WEB and dark WEB here on errortools.com explaining its origins and its purpose. The article can be found here if you are interested: https://errortools.com/windows/what-is-deep-and-dark-web/

Now at this point in time, we want to present you with 15 great Deep WEB sites that could offer you some information not found anywhere else, that could offer you some privacy, or simply to have some fun and safely explore how it is like to be part of deep WEB.

Take notice that for successful visiting of given sites you will need to have installed TOR browser. More about Tor browser itself can be found here: https://errortools.com/blog/software-review-series-tor-browser/ and its official website for download here: https://www.torproject.org/download/

Make sure that you copy the onion link and paste it into your TOR browser in order to access the site. That being said, let’s begin.

Mail2Tor

http://mail2tor2zyjdctd.onion/

If you want secure and private ways of sending your emails then look no further. Mail2Tor uses a webmail client and encrypts each email received or sent, combine that for not storing IP addresses and you have a private and safe environment for your emails.

The Hidden Wiki

http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/index.php/Main_Page

The Hidden Wiki is the go-to site if you want to explore more of deep WEB since it is the site of collected .onion sites. Think of it as a registry of onion sites that want to be accessed publicly but offer anonymity.

TorLinks

http://torlinksd6pdnihy.onion/

TorLinks is another site focusing on .onion site listings. Site themselves are divided into categories and are easy to find. Take note that .onion sites come and go so make sure to visit frequently both The Hidden Wiki and TorLinks in order to be updated.

Torch Search Engine

ttp://xmh57jrzrnw6insl.onion/

Torch is the oldest and most well-known search engine for dark web links, with its database of over a million .onion websites there is a chance that you will find what you are looking for on it.

DuckDuckGo

http://3g2upl4pq6kufc4m.onion/

Integrated into TOR itself as a default search engine DucDuckGo has proven itself to be a great competitor and challenger to Google. But unlike Google, DuckDuckGo will not track you nor store your search activities making it a great general private search engine.

Facebook

https://www.facebookwkhpilnemxj7asaniu7vnjjbiltxjqhye3mhbshg7kx5tfyd.onion/

Yup, Facebook has its own .onion version of its popular platform. Now since Facebook itself is a social media platform anonymity is out of the question but with .onion routing, you can have and maintain a Facebook account from locations where you normally could not like in some countries where Facebook.com is banned.

Galaxy3

http://galaxy3bhpzxecbywoa2j4tg43muepnhfalars4cce3fcx46qlc6t3id.onion/

Galaxy3 is also a social platform, the site is mostly populated with code experts and other individuals posting all kinds of stuff.

The Dark Lair

http://vrimutd6so6a565x.onion/index.php/Board

Dark Lair was the first image exchange website that evolved into a social network. One difference from the other two mentioned is that you can engage in the website without registration as an anonymous user.

Pro Publica

https://www.propub3r6espa33w.onion/

The aim of the five-time Pulitzer Prize winner ProPublica is “To expose abuses of power and betrayals of the public trust by government, business, and other institutions, using the moral force of investigative journalism to spur reform through the sustained spotlighting of wrongdoing.”

It’s the first major online publication to have a .onion address. The non-profit newsroom is funded by organizations such as the Sandler Foundation and has made countless contributions to the fight for free speech and privacy.

Soylent News

http://7rmath4ro2of2a42.onion/

Soylent news is an onion site that well brings news. The difference from other sites of the same content is that Soylent news is community moderated without any big names involved so it is authentic in its content.

CIA

ttp://ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion/

Tor’s history is an unlikely tale. It was created by the U.S Navy with the purpose of helping informants in foreign nations to communicate safely over the Internet. The Central Intelligence Agency (CIA), in that spirit, released a .onion site so that people from across the globe can browse their resources securely and anonymously.

Secure drop

https://secrdrop5wyphb5x.onion/

Secure drop is a platform for changing leaked information and for journalists to communicate with their leads in private. It is used by Washington Post, Pro Publica, and The Guardian.

Hidden Answers

http://answerszuvs3gg2l64e6hmnryudl5zgrmwm3vh65hzszdghblddvfiqd.onion/

Hidden Answers is Reddit or Quora of the dark web but as in the spirit of the dark web, all discussed topics and stories are in total anonymity.

SCI-HUB

http://scihub22266oqcxt.onion/

With over 50 million research papers in the domain of science shared freely, Sci-Hub eliminates all barriers of free knowledge and offers a unique approach to education and scientific information.

Smartmixer.IO

http://smrtmxdxognxhv64.onion/

Smartmixer is a bitcoin mixer. The service scrambles your bitcoin with other users making your purchases completely anonymous.

And that's it. 15 dark WEB onion sites you need to visit. I hope that you enjoyed the list and found something useful in it. Also, note that onion links can change overnight so if any of provided links do not work just go to DuckDuckGo and search for the site with the onion at the end.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

How to Fix the Low Disk Space Notification on Windows 10
As you know, Microsoft constantly releases new updates with the main goal of fixing bugs as well as deliver users with new and exciting features. However, there are times when the latest update comes with an unwanted bug. One of these bugs is an error message saying, “Low Disk Space. You are running out of disk space on Local Disk (G:). Click here to see if you can free space on this drive.” So if you have recently installed a Windows 10 update, then you’ll most likely see a completely new drive on your computer which will appear right after the installation of the update and you’ll also start seeing the aforementioned error message. It gets irritating as this error message keeps on popping up even if you still have a lot of free space on your other drivers. Obviously, the main reason why this error message pops up all the time is the bug brought along by the Windows Update. This bug unhides the recovery partition drive and allocates it a drive letter which is why you are seeing a new drive in your computer. Thus, you can get rid of the pesky error message by simply removing the letter of the new drive. Just remember that you must not delete anything from the recovery partition drive nor format the drive. Formatting or deleting the recovery partition drive can heavily affect the recovery of Windows since the data on the drive is used by the Windows Recovery Environment or your system’s manufacturer. A lot of users have reported that removing the drive letter has resolved the issue. And if you worry that removing the drive letter will delete the drive, you are mistaken. This solution is basically harmless and is proven effective to make the notifications go away. Carefully follow the instructions below to get rid of the Low Disk Space notification by removing the drive letter.
  • Step 1: Tap the Windows key once.
  • Step 2: Next. In the Windows Start Search, type in “command prompt” and right-click on Command Prompt from the search results and select the “Run as administrator” option or you could simply tap Win + R keys and then input “cmd” and hit Enter to open Command Prompt.
  • Step 3: After opening Command Prompt, type in “diskpart” and tap Enter.
  • Step 4: Next, type in “list volume” and tap Enter. After that, you will see a list of drives.
  • Step 5: Take note of the letter associated with the newly created drive.
  • Step 6: Afterwards, type in “select volume <drive letter>” and tap Enter. Take note that you must replace the <drive letter> with the drive letter you’ve found in Step 5.
  • Step 7: Now type in “remove letter=<drive letter>” and then tap Enter. Once again, replace the <drive letter> with the letter you took note of in Step 5.
Read More
Fix 0xd00000e5, 0x8007139f, 0x80090030 PIN
The quickest and easiest way to log into your computer is when you use the PIN feature in Windows 10. Even though it is a bit slower compared to biometric logins such as Fingerprint and Iris scanning that comes under Windows Hello, the PIN feature is definitely less complicated. However, just like any other module of the software, it is also prone to some errors. In this post, you will be guided in fixing several PIN errors such as 0xd00000e5, 0x8007139f, and 0x8009003. These errors could be caused at different points in time like when you change or create a PIN or when you log into your computer. To fix the 0xd00000e5, 0x8007139f and 0x8009003 PIN errors, there are various solutions you can try. You may empty the contents of the NGC folder or remove and change the PIN or the password. You could also use the Group Policy Editor or reset the ACLs in the NGC folder as well as run built-in tools like System File Checker and the DISM tool.

Option 1 – Take ownership of the NGC folder and delete its contents

  • Boot your computer first into Safe Mode.
  • Next, you need to take ownership of the Ngc folder first and you can do that using Command Prompt.
  • Type “command prompt” in the Windows Search bar and then right-click on the relevant search result and select “Run as administrator”.
  • After that, if a User Account Control or UAC prompt appears, just click on Yes to proceed.
  • Next, type and enter this command: TAKEOWN /F C:WindowsServiceProfilesLocalServiceAppDataLocalMicrosoftNgc
  • Note that the <path> is the location of the folder or file in File Explorer.
  • Now type and enter this second command: ICACLS C:WindowsServiceProfilesLocalServiceAppDataLocalMicrosoftNgc /grant administrators:F
  • Finally, once the command has been executed, restart your computer.
  • Once your computer has restarted, delete all the contents in the Ngc folder and check if the error is now fixed.

Option 2 – Try to remove and change the PIN or password

The 0xd00000e5, 0x8007139f, and 0x8009003 PIN errors could be caused by some conflicting issues with the PIN or password you have set for the User Account of your computer. Thus, you have to remove or change the PIN or password to fix these PIN errors.
  • Remove the PIN by going to Settings > Accounts > Sign-in options.
  • From there, go to the PIN section and click on the Remove button.
  • You will be asked to verify your account to proceed in removing the PIN, enter your credentials.
  • Restart your computer and then set up a new PIN.
  • Once you’re done, restart your computer and check if the error is gone now.

Option 3 – Try to use the Group Policy Editor

  • Tap the Win + R keys to open the Run utility and type “gpedit.msc” in the field and tap Enter to open the Group Policy Editor.
  • Next, navigate to this policy setting: Computer Configuration > Administrative Templates > System > Logon
  • After that, double click on the “Turn on convenience PIN Sign-in” option located on the right-side panel.
  • Then set its radio button to Enabled. You will see the following description when you do so:
“This policy setting allows you to control whether a domain user can sign in using a convenience PIN. If you enable this policy setting, a domain user can set up and sign in with a convenience PIN. If you disable or don’t configure this policy setting, a domain user can’t set up and use a convenience PIN. Note: The user’s domain password will be cached in the system vault when using this feature. To configure Windows Hello for Business, use the Administrative Template policies under Windows Hello for Business.”
  • After setting the radio button to Enabled, it will turn on the Logins in your computer using the PIN.
  • Close the Group Policy Editor and restart your computer for the changes to take effect.

Option 4 – Try to reset the ACLs in the Ngc folder

  • Type “command prompt” in the Windows Search bar and then right-click on the relevant search result and select “Run as administrator”.
  • After opening Command Prompt with admin privileges, execute this command: C:/Windows/Service/Profiles/Local/Service/AppData/Local/MicrosoftNgc /T /Q /C /RESET
  • The command you entered will start checking for errors and fix them automatically.

Option 5 – Run the System File Checker scan and the DISM tool

System File Checker:

  • Tap Win + R to launch Run.
  • Type in cmd in the field and tap Enter.
  • After opening Command Prompt, type in sfc /scannow
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.
  • Now restart your computer.

DISM tool:

  • Open Command Prompt.
  • Then type in the following commands and make sure to hit Enter right after you type each one of them:
    • Dism /Online /Cleanup-Image /CheckHealth
    • Dism /Online /Cleanup-Image /ScanHealth
    • Dism /Online /Cleanup-image /Restorehealth
  • After that, wait until the process is finished and do not close the window as the process will probably take a couple of minutes.
  • Once it’s done, restart your computer.
Read More
Run Windows Updates from Command Line
As you know, one of the most highlighted features of Windows 10 is Windows Updates. It was offered to the customers as a service rather than a product with the release of Windows 10 under the scenario of Software as a Service which led to Windows Updates being set by default on Windows 10 and without an option for any users to disable it. Although not all users are happy with what Microsoft did, this is an ultimate step towards the greater good of all its customers since Windows Updates helps users in keeping their computers secured against all kinds of threats as well as provide them with the greatest and latest updates from Microsoft. So if you are one of those users who approved of the Windows Updates service, then read on as this post will guide you in running Windows Updates from Command Line either via Command Prompt or Windows PowerShell. For the complete set of instructions, refer to the options given below.

Option 1 – Run Windows Update via Command Prompt

Command Prompt in the Windows operating system exists for a very long time now compared to the comparatively new Windows PowerShell. That’s why it has similar capabilities to run Windows Updates. However, the highlighting point here is that you don’t have to download any module for Windows Updates. To get started running Windows Updates using Command Prompt, refer to the steps below.
  • First, type “cmd” in the Cortana search box, and from the search results, right-click on Command Prompt and select the Run as Administrator option to open it with Administrator privileges.
  • If a User Account or UAC prompt appears, just click on Yes to proceed.
  • Next, type in the commands listed below, and don’t forget to tap Enter right after you type each one of them.
    • UsoClient StartScan – use this command to start checking for updates.
    • UsoClient StartDownload – use this command to start downloading updates.
    • UsoClient StartInstall – use this command to start installing the downloaded updates.
    • UsoClient RestartDevice – use this command to restart your computer after you install.
    • UsoClient ScanInstallWait – use this command to check, download and install updates.
Note: Keep in mind that the commands in Command Prompt listed above are only meant for Windows 10. On the other hand, if you are using an older Windows version, you can try using the following commands instead:
  • wuauclt /detectnow – use this command to start checking for updates.
  • wuauclt /updatenow – use this command to start installing the updates detected.
  • wuauclt /detectnow /updatenow – use this command to check, download and install updates.

Option 2 – Run Windows Updates via Windows PowerShell

If you run Windows Updates in the Windows PowerShell, it will require you to install the Windows Update module manually. Hence, you have to get the Windows Updates downloaded and install Windows Updates.
  • Search for PowerShell in the Cortana search box and then run it with administrator privileges.
  • Once you’ve opened the Windows PowerShell, type the following command and hit Enter.
    • Install-Module PSWindowsUpdate – use this command to install the Windows Update module for Windows PowerShell.
    • Get-WindowsUpdate – use this command to connect to the servers of Windows Update and download the updates if found.
    • Install-WindowsUpdate – use this command to install the Windows Updates you’ve downloaded to your computer.
Read More
A Quick Fix Guide to Error 0x8004060c

What's Error 0x8004060c?

If you use Ms-Outlook. You may experience the malfunction 0x8004060c sooner or later. This malfunction was proven to arise in nearly every MS Outlook variation be it 2010 or 2,000, 2007. The malfunction 0x8004060c hinders your capacity to deliver and get e-mails from and your MS-Outlook account and happens without any forewarning. The error happens when the PST file grows too big and there's almost no memory to handle the increase (Which is rather rare nowadays). Generally, the PST file has about 2 gigabytes upper limit and when you reach that, this error is unavoidable. This error happens when you attempt incorporating data that is fresh into your MS-OUTLOOK Account.

Solution

Restoro box imageError Causes

This malfunction might generate difficulties for you personally as your e-mails vanish and can happen suddenly. The system could also crash at times unpredictably. You may not be able to see fresh notifications and attachments in your e-mail. Also, it's also possible to drop significant contact details. What's more, this malfunction could stop e-mails that are fresh to arrive in your inbox. Therefore, it is undoubtedly a significant issue that has to be repaired immediately. The following may be some of the causes for error 0x8004060c:-
  • This error might occur when OST/PST file got corrupt.
  • OST file becomes inaccessible due to Exchange connectivity or synchronization issue.
  • OST/PST file exceeded its default maximum file size.

Further Information and Manual Repair

In the event that you find the malfunction 0x8004060c at any stage, you should do the repair instead of risking dropping connections and all the significant data in your account. The easiest way to repair this malfunction and to handle this issue would be to download the Restoro. Click here to obtain this fix tool on your computer. After installing, click your mouse's left button after which can use the application. It repairs the error code 0x8004060c in the least period and walks you through the entire repair procedure quickly.
Read More
Fix Windows Update Error 0x800F081F – 0x20003
If you are trying to upgrade your computer but encounter the Windows Update Error 0x800F081F – 0x20003 instead, then read on as this post will guide you in fixing this Windows Update error. This kind of error is commonly encountered when upgrading your copy of Windows 10 and is caused by errors with various developer-related settings that are being enabled in the system. When you encounter Windows Update Error 0x800F081F – 0x20003, you will see either of these error messages:
“We couldn’t install Windows 10. The installation failed in the SAFE_OS phase with an error during INSTALL_UPDATES operation: Error 0x800F081F”  “The installation failed in the Safe_OS phase with an error during apply_image operation: Error: 0x800f081f – 0x20003”
To fix this kind of Windows Update error, you need not use external programs but you can try to disable the Developer Mode, run the Windows Update troubleshooter or restart all the Windows Update-related services and components. For more details, refer to the options provided below.

Option 1 – Try to disable Developer Mode

You might have to disable Developer Mode to fix the Windows Update Error 0x800F081F – 0x20003. How? Refer to these steps:
  • Tap the Win + I keys on your keyboard to open the Settings app.
  • Next, go to Update & Security > For Developers.
  • From there, select the toggle for Sideload apps or Microsoft Store apps located on the right-side panel.
  • If you get any prompt, just click on Yes.
  • After that, navigate to Apps > Apps & features and then click on Optional features on the right-side panel.
  • Then scroll down to locate the Windows Developer Mode entry and select it and click on Uninstall.
  • Once you’re done uninstalling the Windows Developer Mode component, close the Settings app and restart your computer to apply the changes made.

Option 2 – Try to run the Windows Update Troubleshooter

You should also try to run the built-in Windows Update troubleshooter as it could help you resolve the Windows Update Error 0x800F081F – 0x20003. To run it, go to Settings and then select Troubleshoot from the options. From there, click on Windows Update and then click the “Run the troubleshooter” button. After that, follow the next on-screen instructions and you should be good to go.

Option 3 – Try restarting various Windows Update-related services and components

  • Tap the Win + X key combination and select Command Prompt (Admin) to open Command Prompt with admin privileges.
  • After opening Command Prompt, copy and paste each one of the commands listed below one by one and tap Enter right after you enter each command.
    • net stop wuauserv
    • net stop bits
    • net stop appidsvc
    • ren %systemroot%SoftwareDistribution SoftwareDistribution.bak
    • ren %systemroot%system32catroot2 catroot2.bak
  • Once you’ve entered all the commands given above, they will stop all the Windows Update services that are running on your computer as well as clear the SoftwareDistribution folder, and reset the Catroot2 folder. Now you have to start all these Windows Update services you’ve just stopped by executing the following commands:
    • net start wuauserv
    • net start bits
    • net start appidsvc
    • net start cryptsvc
  • After that, restart your computer and try to run the setup again, and see if the error is now fixed.
Read More
What to do if Windows Media Player is not playing the Music Playlist in Windows 10
Many users would probably agree that the Windows Media Player, in most cases, is a lot better than the Groove. Although it is understandable why the Groove Music app was created, it may be time for Microsoft to bring its focus back on Windows Media Player. Even more, so that some users are experiencing an issue where they were not able to play their playlist in the Windows Media Player on their Windows 10 PCs. One particular user claimed that when he removed his music from the C drive and transferred them to the C drive for some reason he didn’t state. Right after he did that, any attempts to play songs in the Windows Media Player just don’t seem to work. Transferring music to a different location shouldn’t cause any issue but for some unknown reason, it did. According to security experts, the reason why the Windows Media Player didn’t play the playlist is that it still believes that the songs are still located in the C drive when they’re really not. So the question here is, how can you get the Windows Media Player to recognize the exact and correct location of the songs? Worry not, for this post will show you how exactly you can do that. Carefully follow each one of the instructions given below to fix the Windows Media Player issue.

Option 1 – Try running the WMP Troubleshooters

In case there are any issues with the Windows Media Player, you can always count on the WMP Troubleshooters to fix the problem for you. These built-in troubleshooters, namely, Windows Media Player Library and Windows Media Player DVD Troubleshooters can help you fix the problem, so run them both and see if you can now play those songs or not.

Option 2 – Try rebuilding the Windows Media Player Database

If the first option didn’t work for you, you might have to rebuild the Windows Media Player database. You can do this by following the steps below.
  • Tap the Win + R keys at the same time to open the Run dialog box.
  • After that, copy and paste this command in the field: %userprofile%Local SettingsApplication DataMicrosoftMedia Player
  • Once you’ve pasted the command, hit Enter then you will see a new File Explorer which is the folder for the Media Player. You will have to delete every item in this folder, except for the folders. Meaning to say, you must only delete the individual contents inside but not the folders.
  • Now launch the Windows Media Player again and watch as it rebuilds the music library automatically.
Read More
Microsoft vs Google & Facebook
microsoft hqMicrosoft wants to escalate the situation from Australia to the EU, what a surprise. Hello all and welcome to another news article, this time we are focusing on Microsoft pushing the EU to accept law proposition from Australia. For all of you who are not familiar with the given situation let me quickly explain. The feud began when the Australian government proposed a new law that targeted Facebook and Google specifically. The government said that it believed that both of the tech giants were using content from news outlets without paying. Have you ever seen the little news snippets that Google or Facebook sometimes show its users to keep them up to date? These are lifted directly from news websites, and the Australian government claimed that this practice meant that people didn't bother visiting the news website. This then staved news websites of revenue. As such, the government put forward a new law that would mean Google and Facebook would have to pay the source website for every time they displayed a news snippet. Facebook responded by removing its Australian news coverage in light of the law. Google, however, put up a fight. It argued that its snippets encouraged people to click on it to read more, thus driving more traffic to the news website. It also said that such a law would be too expensive to maintain in the long run. As such, Google threatened to remove itself from Australia if the law passed. This was likely a scare tactic, as 95 percent of Australian web users use Google; however, it actually opened the door for its rival, Microsoft. Microsoft saw how it could push its own search engine BING to replace google. It of course went and reached the Australian government to assure them that BING is more than capable to fulfill its needs and fully abide by the proposed law. Now Microsoft knows that if this law passes it could see a similar situation happening in Europe and it is pushing it. US News reported on how Microsoft plans to encourage EU countries to adopt this new law too. The company has teamed up with the European Publishers Council and News Media Europe to make the following statement: Publishers might not have the economic strength to negotiate fair and balanced agreements with these gatekeeper tech companies, who might otherwise threaten to walk away from negotiations or exit markets entirely
Read More
Error Code 0xc00000e9
If Error Code 0xc00000e9 appears on your screen, there is no cause to panic yet as there are different ways to fix this. Here, I will list down different methods to get your computer back on track:
  1. Check peripheral connections
  2. Check your SATA cables
  3. Check your hard drive
  4. Check your BIOS settings

Quick Fix 1. Check Peripheral Connections

  1. Turn off your computer.
  2. After the computer has been shut down, take off all the peripherals or the USB cables that are connected to your USB ports. This includes even the keyboard and the mouse. We just need to have only the monitor plugged in for this one.
  3. Turn on your computer and see if it starts as it normally does.
  4. If it does, try connecting back your external devices or peripherals one by one until you find the one that causes the error.
  5. Once you trace the device that’s causing the error, you will have to change its USB cable and update its driver to support your operating system.

Quick Fix 2. Check your SATA cables

It is possible that what causes a barrier between your operating system and your hard drive from communicating is the SATA cable used. For example, if you’re using an older SATA with a SATA III port, there might not be adequate support for the transfer of data from one another. Or, the problem might be a loose SATA cable which would still require you to buy a new one to replace your loose or damaged cable. To check if your SATA cables are causing the error, simply follow these steps:
  1. Turn off your computer.
  2. Carefully open its case.
  3. Check the hard drive and the SATA port where it’s connected.
  4. Try to use a newer cable and connect it to your SATA port. (If you used a SATA II cable, you can see if a SATA III cable is more compatible.)
  5. Replace your SATA cable with a newer one if Step 4 proves to be successful.

Quick Fix 3. Check your hard drive.

  1. Try to use a different hard drive and see if error code 0xc00000e9 still appears.
  2. If it works out just fine, then the problem might be physical damage to your hard drive and would need to be repaired depending on the case. Just simply take it to a technician and let him know about the issue.

Quick Fix 4. Check your BIOS settings

  1. Restart your computer.
  2. Once your computer starts, press and hold the ESC, F2, F12, or DEL key to go to BIOS settings.
  3. You will then be redirected to the BIOS Setup Utility screen. From here, go to Boot options.
  4. In the Boot Options, see if your first boot device is your hard drive. If it isn’t, press the arrow key to select the hard drive and move it to the top of the boot device list.
  5. Save the settings.
  6. Reboot your computer.
Note: If all the methods above do not work, the problem might be on your drivers and you might need to update them. You can update your driver in two ways: Manual driver update and Automatic driver update. You can find procedures online in updating your drivers.
Read More
10 Worst Computer Viruses in history
Computers viruses, worms, ransomware, etc. are kinds of malicious software that no user should take lightly. On several occasions, we have touched upon security steps that each user should take in order to protect its identity and data. Sadly sometimes even when all precautions are taken some malware can still slip through and wreak havoc. Today we are looking at some of the worst or the best, depending on your view that has indeed wreaked plenty of havoc.

viruses10 worst computer viruses in history

In the list of the 10 most famous computer viruses below, we show the costs, dates, reach, and other key facts. First a note about terms: we use the words “virus” and “worm” interchangeably because most readers search for them that way. But there’s a subtle difference that we explain after the list.

1. Mydoom – $38 billion

The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent. Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server. Mydoom is still around today, generating 1% of all phishing emails. That’s no small feat considering the 3.4 billion phishing emails sent each day. By that figure, Mydoom has taken on a life of its own, infecting enough poorly-protected machines to send 1.2 billion copies of itself per year, 16 years after its creation. Though a $250,000 reward was offered, the developer of this dangerous computer worm was never caught. Wondering what makes the world’s most secure computers so safe? See the Tech@Work guide: Upgrade to the World's Most Secure and Manageable PC

2. Sobig – $30 billion

The 2003 Sobig computer virus is actually another worm. It is second only to the Mydoom virus in its scope. The $30 billion figure is a worldwide total, including Canada, the U.K., the U.S., mainland Europe, and Asia. Several versions of the worm were released in quick succession, named Sobig.A through Sobig.F, with Sobig.F being the most damaging. This cybercriminal program masqueraded as legitimate computer software attached to emails. It disrupted ticketing at Air Canada and interfered with countless other businesses. Despite its widespread damage, the creator of the successful bug was never caught.

3. Klez – $19.8 billion

Klez is a close third on the list of the worst computer viruses ever created. With nearly $20 billion in estimated damages, it infected about 7.2% of all computers in 2001, or 7 million PCs. The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses. As with other viruses and worms, Klez was released in several variants. It infected files, copied itself, and spread throughout each victim’s network. It hung around for years, with each version more destructive than the last. Windows has come a long way since most of the computer viruses on this list hit the web. Thankfully, built-in protection with Microsoft Defender is always on the watch.

4. ILOVEYOU – $15 billion

The year 2000’s ILOVEYOU virus worked by sending a bogus “love letter” that looked like a harmless text file. Like Mydoom, this attacker sent copies of itself to every email address in the infected machine’s contact list. Shortly after its May 4 release, it had spread to more than 10 million PCs. The virus was created by a college student in the Philippines named Onel de Guzman. Lacking funds, he wrote the virus to steal passwords so he could log into online services he wanted to use for free. He reportedly had no idea how far his creation would spread. This virus is also known as Loveletter. Need to up your remote work security game before there’s another entry on the list of most deadly computer viruses? See our guide: How to Work Remotely and Securely

5. WannaCry – $4 billion

The 2017 WannaCry computer virus is ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. The WannaCry ransomware ripped through computers in 150 countries, causing massive productivity losses as businesses, hospitals, and government organizations that didn’t pay were forced to rebuild systems from scratch. The malware raged like wildfire through 200,000 computers worldwide. It stopped when a 22-year-old security researcher in the U.K. found a way to turn it off. Computers with out-of-date operating systems were hit especially hard. That’s why security experts always recommend updating your systems frequently.

Ransomware strikes again

In September 2020, one of the potentially largest computer virus attacks in medical history hit Universal Health Services. The U.S. hospital chain, which has more than 400 locations, was reportedly struck by damaging ransomware. The attack forced the cancellation of surgeries and made healthcare workers switch to paper records.

6. Zeus – $3 billion

The Zeus computer virus is an online theft tool that hit the web in 2007. A whitepaper by Unisys three years later estimated that it was behind 44% of all banking malware attacks. By then, it had breached 88% of all Fortune 500 companies, 2,500 organizations total, and 76,000 computers in 196 countries. The Zeus botnet was a group of programs that worked together to take over machines for a remote “bot master.” It originated in Eastern Europe and was used to transfer money to secret bank accounts. More than 100 members of the crime ring behind the virus, mostly in the U.S., were arrested in 2010. It’s not as prominent today, but some of the virus’ source code lives on in newer botnet viruses and worms. Zeus caused documented damage of $100 million. But the real cost in terms of lost productivity, removal, and undocumented theft is undoubtedly much higher. A $3 billion estimate, adjusted for inflation, puts this virus at a cost of $3.7 billion in today’s dollars.

7. Code Red – $2.4 billion

First observed in 2001, the Code Red computer virus was yet another worm that penetrated 975,000 hosts. It displayed the words “Hacked by Chinese!” across infected web pages, and it ran entirely in each machine’s memory. In most cases it left no trace in hard drives or other storage. Financial costs are pegged at $2.4 billion. The virus attacked websites of infected computers and delivered a distributed denial of service (DDoS) attack on the U.S. White House’s website, www.whitehouse.gov. In fact, the White House had to change its IP address to defend against Cod Red. Can your printer get a virus? See our cool infographic: The State of Printer Security

8. Slammer – $1.2 billion

The SQL Slammer worm cost an estimated $750 million across 200,000 computer users in 2003. This computer virus randomly selected IP addresses, exploiting vulnerabilities and sending itself on to other machines. It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic. The Slammer worm hit banks in the U.S. and Canada especially hard, taking ATMs offline in many locations. Customers of Toronto’s Imperial Bank of Commerce found themselves unable to access funds. The attack reared its ugly head again in 2016, launching from IP addresses in Ukraine, China, and Mexico.

9. CryptoLocker – $665 million

Thankfully, ransomware attacks like the 2013 CryptoLocker virus have dipped since their 2017 peak. This malware attacked upwards of 250,000 machines by encrypting their files. It displayed a red ransom note informing users that “your important files encryption produced on this computer.” A payment window accompanied the note. The virus’ creators used a worm called the Gameover Zeus botnet to make and send copies of the CryptoLocker virus. According to a report by security firm Sophos, the average ransomware attack costs a business $133,000. If we estimate that CryptoLocker hit 5,000 companies, that would put its total cost at $665 million. Where will cybersecurity go next? See our guide: The Future of Cybersecurity

10. Sasser – $500 million

The Sasser worm was written by a 17-year-old German computer science student named Sven Jaschan. He was arrested at the age of 18 in 2004 after a $250,000 bounty was posted for the computer virus’ creator. A friend of Jaschan’s tipped authorities that the youth had penned not only the Sasser worm but also the damaging Netsky.AC attack. Jaschan was given a suspended sentence after it was found he was a minor when he wrote the malware. The Sasser worm crashed millions of PCs, and though some reports put damages at $18 billion, the relatively low infection rate suggests a more likely cost of $500 million. Other notable viruses The top 10 worst computer viruses above are just the ugly tip of a gargantuan digital iceberg. With a million new malware programs popping up every 3 years, we may miss the forest for a few outstanding trees. Here are just a few more viruses that have wreaked havoc over the years: Mimail: This worm tried to harvest data from infected machines to launch a string of DDoS attacks, but was relatively easy to remove. Yaha: Yet another worm with several variants, thought to be the result of a cyber-war between Pakistan and India. Swen: Written in C++, the Swen computer worm disguised itself to look like a 2003 OS update. Its financial cost has been pegged at $10.4 billion, but not reliably. Storm Worm: This worm showed up in 2007 and attacked millions of computers with an email about approaching bad weather. Tanatos/Bugbear: A 2002 keylogger virus that targeted financial institutions and spread to 150 countries. Sircam: A computer worm from 2001 that used counterfeit emails with the subject line, “I send you this file in order to have your advice.” Explorezip: This worm used fake emails to spread to every machine on thousands of local networks. Melissa: The most dangerous computer virus in 1999, Melissa sent copies of itself that looked like NSFW pics. The U.S. FBI estimated cleanup and repair costs at $80 million. Flashback: A Mac-only virus, Flashback infected over 600,000 Macs in 2012 and even infected Apple’s home base in Cupertino, Calif. In 2020, there’s now more malware on Macs than on PCs. Conficker: This 2009 virus still infects many legacy systems and could do significant damage if it ever activates. Stuxnet: This worm is reported to have destroyed Iranian nuclear centrifuges by sending damaging instructions.
Read More
a New browser from DuckDuckGo is coming
DuckGoGo a popular private search engine is releasing its first browser soon that is focused on privacy like its search engine. duckduckgo browserFrom the recent blog, Gabriel Weinberg, CEO of DuckDuckGo, has stated:
“Like we’ve done on mobile, DuckDuckGo for desktop will redefine user expectations of everyday online privacy,”
From everything that we have learned so far, the browser will be focused on making privacy super easy and simple, eliminating tons of different settings about privacy, and making the whole environment robust privacy protection all set by default. Settings will be applied in all fields, across search, browsing, email, and more. Gabriel also said that aim of the browser is not just a privacy browser, it is meant to be built and used as your everyday browser, for everyday use that protects your privacy as a bonus. One interesting thing that was stated is that browser itself is built upon OS-provided rendering engines instead of typical Chromium. DuckDuckGo says this approach will strip away a lot of the unnecessary cruft and clutter that's accumulated over the years in major browsers. Also, the company stated that when compared to Chrome, the DuckDuckGo app desktop is cleaner, way more private and that early tests have found out that it is significantly faster as well. Is this just corporate advertising or reality? We will see once the browser is released, or once it is released for public testing. Until then take care and happy holidays.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status