Disable non MS store apps in Windows 11

Disable non MS store apps in Windows 11 post pictureYou can prevent starting of app installations files if they have not come from the MS store inside Windows 11.

This can make your PC more secure because all apps in the store will have to be digitally signed and overall it can provide you with more control over what will be installed.

Follow the guide below to find out how can you easily turn this feature ON.

  1. Press ⊞ WINDOWS + I to open Windows settings
  2. Select Apps and then choose Apps & Features
  3. Click on Choose where to get apps to bring a drop-down menu
  4. Select The Microsoft Store only (Recommended)
  5. Close settings

Settings will apply changes immediately and you continue using Windows right away.

With these settings turned ON if you want to install a downloaded application or run the installer you will not be able to, and message The app you’re trying to install isn’t a Microsoft-verified app will show on your screen.

You can always reverse this setting by choosing Anywhere in settings instead of Microsoft store only.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

How to fix the Javaw.exe Error Code

Javaw exe - What is it?

Javaw.exe is a type of executable file or a process used by Sun Microsystems. It is in charge of executing programs created with Java on Windows PC. It is a part of the Oracle Java Runtime Environment. The javaw exe error hampers your ability to run programs supported by Java. Common Javaw.exe error messages include:
  • "Javaw.exe Application Error."
  • "Javaw.exe is not a valid Win32 application."
  • “Cannot find javaw.exe.""Javaw.exe not found."
  • "Error starting program: javaw.exe."
  • "Javaw.exe is not running.""Javaw.exe failed."
  • "Javaw.exe has encountered a problem and needs to close. We are sorry for the inconvenience."

Solution

Restoro box imageError Causes

There can be many reasons for javaw.exe error code on your PC such as:
  • Viral infection
  • Malware attack
  • Invalid registry entries
Ignoring such error messages is not wise. You must resolve it right away as such errors can lead to serious PC threats like system failure and data security threats.

Further Information and Manual Repair

Scan the Javaw.Exe File For Malware

To fix Java Exe error on your system, first you need to find out the cause of the error. Is it triggered by malware or invalid registry entries? The best way to identify the cause is to check your system’s CPU usage. This can be done through assessing the Task Manager by pressing Ctrl+Alt+Del all at the same time. After that, click ‘Processes and locate the javaw.exe file. Remember this file does not require too much memory, so abnormal memory usage is a surefire sign that the java.exe file on your system is a virus. To resolve it, download an antivirus and run it to scan and remove viruses from your PC. However, running an antivirus may slow down your PC performance. On the other hand, if you find the memory usage is fine, then this means the error is not caused by malware but it occurred either due to old version system files on your PC or registry corruption.

Update the Javaw.Exe File

To remove the old version files, go to the start menu. Click Control Panel and then Add/Remove programs. Here find the Java program and uninstall it. Now after the program is completely uninstalled, go to Java’s official website and download the latest version of your desired program. Restart your PC after the installation is successfully complete.

Clean & Repair Registry

If the problem still persists, then the javaw exe error is mostly likely triggered due to registry corruption. The best way to resolve it is to clean and restore the registry. You can do it manually but you may find the manual procedure slightly time-consuming and complex especially you are not a computer programmer. Therefore we recommend you download Restoro.

Why Restoro?

Whether the javaw exe error occurs due to viral infection, invalid entries, or registry corruption, Restoro takes care of all. This is a new, cutting edge, and multi functional PC fixer deployed with multiple performance-boosting and system repair utilities including a powerful registry cleaner, an antivirus, a system optimizer, and Active X controls, and a Class ID detector. The registry cleaning utility wipes out all the unnecessary files, clearing up the cluttered disk. It cleans the registry and restores it. Simultaneously, the antivirus feature detects and scans all malicious software infecting your PC and removes them right away. The system optimizer module boosts the speed of your system and ensures your PC performs at its optimum pace. This is a safe, efficient, and bug-free tool. It has a user-friendly interface and easy navigation. Furthermore, it is compatible with all Windows versions. Click here to download Restoro and resolve Javaw exe error on your PC today!
Read More
Quick Fix Guide to Error 2032

What Is Error 2032?

Error 2032 is essentially the hexadecimal format of the error caused. This error code is actually a code format used by the Windows operating system. Manufacturers use this code to determine the cause behind the problem. This error is usually the result of the issues that arise with different applications. When this error occurs, individuals are not able to view multimedia content on their PC. They may also experience system crashes and this makes it crucial to resolve it.

Solution

Restoro box imageError Causes

Error 2032 is caused by problems in Windows system files. Improper registry entries may also cause this problem. Some of the common causes that trigger Error 2032 are improper deletion of hardware or applications. Similarly, incomplete hardware or application installations or uninstallations may also cause issues. These file errors are actually caused when a computer has recently been attacked by a virus, spyware, or malware or if the system is trying to recover from an unanticipated shutdown. Such activities often result in the corruption or deletion of registry entries in Windows system files. The corrupt files will obviously cause problems and the application will fail to perform correctly.

Further Information and Manual Repair

While there are several ways to solve this problem, some of the most useful and practical solutions are listed below as follows.
  • If you are an advanced user, this workaround is for you. First and foremost, restart your computer and log on to it as the administrator. Now click on the ‘Start’ button.  Now follow this path: All programs ->Accessories-> System Tools->System Restore. Once you choose to perform System Restore, you will come across options where you can select to ‘Restore your computer to an earlier time’. This option will appear in a new window. Click on it and then click Next. Click on the Next button again that appears in the confirmation window. Restart your computer after the restoration is finished. You have just resolved the error.
  • Another easier alternative to fix Error 2032 is for novice users. Download an Error 2032 repair utility. Install this program as you are most likely to come across a Scan button. If there is an option to fix and repair an error, select it after the scan is complete. You can then restart your computer again. Look for the error and you will realize that it has disappeared and that your system is now ready to use.
Read More
How to Fix Error 421

What is the Error 421?

Error 421 is a common SMTP (Simple Mail Transfer Protocol) Outlook error message. MS Outlook is one of the best and popular email applications widely used by PC Windows users for sending and receiving emails within and outside workplaces. It is most commonly used in offices by professionals for faster communication. This error may occur while sending and receiving emails on the server. The error 421 messages is displayed in either of the following formats:
“An unknown error has occurred: Server error 421” "Could not send your message. Error 421" 421 4.2.1 : (DYN:T1) http://postmaster.info.aol.com/errors/421dynt1.html 421 4.3.1 Out of disk space for temp file 421 4.3.2 All server ports are busy 421 Downstream server error 421 Fork failed 421 Greylisting enabled, please try later “An unknown error has occurred. Subject ‘Testing’, Account: ‘pop.charter.net’, Server: ‘mail.charter.net’, Protocol: SMTP, Server Response: ’421 Message rejected’, Port: 25, Secure(SSL): No, Server Error: 421, Error Number: 0x800CCC67”

Solution

Restoro box imageError Causes

Some common causes for this critical Outlook error are:
  • PST storage size exceeds 2GB file size
  • Improper ISP settings
  • Slow internet connection
  • PST file corruption
  • Trojan attack and viral infection
This is a critical Outlook error that should be resolved timely. If you delay, it may cause you a great deal of inconvenience. The error code 421 hampers your ability to access your email account, send and receive emails, add new contacts, view emails, calendar entries, and journals. In other words, it just brings your email activities to a standstill locking you out of the account.

Further Information and Manual Repair

To resolve this error code on your system, you don’t always have to hire a professional or call the network personnel to do the job. It may be a critical error but the good news is that it is quite easy to fix. Even if you don’t have technical expertise, you can still repair it. Here are some of the best methods to repair this issue on your system:

1. Change the Server Settings to its Maximum Limit

Try changing your server settings. Here set the inbound connections limit at the maximum limit.
  • To do this, open the Microsoft Exchange Server Administrator utility. The access path of this utility will vary depending on the installation procedure used to set up Exchange Server.
  • Once you open the MS Exchange Server Administrator utility, click the ‘Connections’ icon in the left side navigation pane. Now double click the internet mail service icon in the right side pane. As you click it, the Properties window will open.
  • Now click the ‘Connections’ tab in the Properties window and then click the ‘Advanced’ button. This will open the configuration window.
  • Here reset the number for ‘Maximum Number of Inbound Connections’ to a high number, its maximum limit. After changing the settings, close all open Exchange Server Administrator program windows to successfully complete the process.
After the process is complete, try accessing your Outlook email account again; if it works, then that’s great the error 421 is resolved. However, if it doesn’t, then the problem could be related to viral infection.

2. Download a PST Repair Tool

If the cause of the error is PST files corruption, then not only will you be locked out of your email account, you are also at risk of losing all the data stored in your email account. However, the best way to resolve the error and ensure full data recovery is to download a reliable PST repair tool. By running a PST repair tool on your system, you can resolve the error 421 right away. It recovers your data, repairs corrupt and damaged PST files.

3. Scan Your PC with Restoro.

If viral infection and Trojans are causing the error 421 to pop up on your system, then it is recommended to download and scan your PC with Restoro. This is an advanced, intuitive, and user-friendly PC fixer. It is not just an antivirus but also a system optimizer and a registry cleaner. Unlike common antivirus software that only removes viruses and simultaneously slows down the system’s speed, Restoro removes all types of malicious software on your PC including malware, spyware, Trojans, and viruses, and also boosts the speed of your PC significantly. It is safe, easy to operate, and a quick fixer. It is compatible with all Windows versions. Click here to download Restoro and resolve error 421 today!
Read More
Chrome automatically opens a new tab
Recently, a number of users reported that their Google Chrome browsers keep on opening new tabs no matter what they do. This issue could be due to lots of reasons but the main ones are corrupt installation, background applications, adware, dubious browser extensions, malware, and so on. Although there are a lot of possible causes for this particular issue in Chrome, its potential fixes are straightforward so you should not have any problem following the given options below.

Option 1 – Get rid of any conflicting browser extensions

As mentioned, shady browser extensions can cause unusual behavior in a browser. Chances are, these extensions or toolbars might be conflicting with the loading of the website. Thus, you have to get rid of these unwanted extensions and toolbars to fix the issue.
  • Open Chrome and press Alt + F keys.
  • Go to More tools and click Extensions to look for any suspicious browser extensions or toolbars.
  • Click the Recycle bin and select Remove.
  • Restart Chrome and press Alt + F keys again.
  • Proceed to On Startup and mark Open a specific page or set of pages.
  • To check if the browser hijacker is still active, click Set pages, if it is active, overwrite the URL.

Option 2 – Try to disable applications from running in the background

  • Open Google Chrome and then click on the menu button located in the top-right corner.
  • From the drop-down, select Settings and then scroll down until you see the Advanced button. Click on it.
  • Next, turn off the toggle for “Continue running background apps when Google Chrome is closed” under the System section.
  • Now restart Chrome and check if it is working properly.

Option 3 – Try to configure the search settings of Chrome

  • Open Google Chrome and type any search query in the address bar and then tap Enter.
  • After that, it will open the Google search engine. From the top-right corner, click the Settings button.
  • Next, select Search settings from the drop-down menu.
  • Then scroll down to the new page that appears and make sure that the “Open New Window for each result” option is set to Uncheck.
  • Once you’re done, save the changes made and restart Google Chrome.

Option 4 – Reset Chrome

Resetting Chrome can also help you fix the error. This means that you will be restoring its default settings, disabling all the extensions, add-ons and themes. Aside from that, the content settings will be reset as well and the cookies, cache, and site data will also be deleted. To reset Chrome, here’s what you have to do:
  • Open Google Chrome, then tap the Alt + F keys.
  • After that, click on Settings.
  • Next, scroll down until you see the Advanced option, once you see it, click on it.
  • After clicking the Advanced option, go to the “Restore and clean up option and click on the “Restore settings to their original defaults” option to reset Google Chrome.
  • Now restart Google Chrome.

Option 5 – Try to clean reinstall Chrome

There are instances when programs leave files behind after you’ve uninstalled them and the same thing can happen to Chrome so before you reinstall Chrome, you have to make sure that you have deleted the User Data folder. To do so, refer to the following steps:
  • Hit the Win + R keys to open the Run dialog box.
  • Next, type “%LOCALAPPDATA%GoogleChromeUser Data” in the field and hit Enter to open the User Data folder.
  • From there, rename the default folder and name it something else, e.g. “Default.old”.
  • After that, install Google Chrome again and check if the issue is now fixed.

Option 6 – Try scanning your computer using Windows Defender

As mentioned, the error when accessing the security settings or properties of a folder or file might be due to a virus or malware. It could be that it had made some modifications that prevents you from accessing security settings or properties. To eliminate it, you have to scan your computer using security programs like Windows Defender.
  • Tap the Win + I keys to open Update & Security.
  • Then click on the Windows Security option and open Windows Defender Security Center.
  • Next, click on Virus & threat protection > Run a new advanced scan.
  • Now make sure that Full Scan is selected from the menu and then click the Scan Now button to get started.
Read More
Removing Linkey From Windows Tutorial

Linkey is a potentially unwanted web browser search extension for the top browsers, designed to modify the user’s search and home pages in order to direct advertising. This extension changes your default search provider, redirects new tabs, and distributes information & statistics to the server. This extension will display unwanted ads, redirect you through unwanted search engines, and send your browsing information (potentially private information) back to its ad network.

From the publisher: Linkey is compatible with all the latest versions of Internet Explorer, Chrome, and Firefox. Linkey is a simple browser extension that allows you to get the best sites in one click in visualized & friendly interface.

About Browser Hijackers

Browser hijacking is actually a type of unwanted software, often a browser add-on or extension, which causes modifications in the browser’s settings. Browser hijackers could do many different things on your PC. Usually, hijackers will force hits to websites of their preference either to increase traffic producing higher advertisement revenue, or to obtain a commission for each and every user visiting there. Nonetheless, it’s not that harmless. Your online safety is compromised and it is also extremely annoying. Browser hijackers could also allow other malicious programs without your knowledge to further damage your computer.

How to know whether the web browser is hijacked?

The typical symptoms that suggest having this malicious software on your PC are: 1. your homepage has been reset to some unfamiliar site 2. your browser is constantly being redirected to adult sites 3. the essential web browser settings are modified and undesirable or insecure resources are put into the trusted sites listing 4. unsolicited new toolbars are added to your browser 5. you may notice endless pop-up ads on your screen 6. your web browser starts running sluggishly or exhibits frequent errors 7. You simply can’t access particular sites, particularly anti-malware websites.

How it infects your computer

Browser hijackers attack computers through malicious e-mail attachments, downloaded infected computer files, or by checking out infected internet sites. They could be included with toolbars, BHO, add-ons, plug-ins, or browser extensions. Also, certain freeware and shareware can put the hijacker in your PC through the “bundling” technique. Examples of well-known browser hijackers are Fireball, GoSave, Ask Toolbar, CoolWebSearch, Babylon Toolbar, and RocketTab. Browser hijackers could interrupt the user’s browsing experience severely, keep track of the websites visited by users and steal financial information, cause problems in connecting to the internet, and ultimately create stability issues, making applications and computers crash.

How you can get rid of a browser hijacker

Some hijackers can be simply removed by deleting the free software they came with or by removing any extension you have recently added to your computer. Unluckily, the majority of the software products used to hijack a browser are deliberately built to be difficult to eliminate or detect. Moreover, manual removals demand in-depth system knowledge and therefore can be an extremely difficult job for novices.

What To Do When You Cannot Download Safebytes Anti-Malware?

All malware is bad and the magnitude of the damage may vary greatly in accordance with the type of infection. Certain malware variants modify internet browser settings by including a proxy server or modify the computer’s DNS configurations. When this happens, you will be unable to visit some or all of the websites, and therefore unable to download or install the necessary security software to remove the malware. If you’re reading this, you may have infected by a virus that prevents you from downloading computer security software like Safebytes Anti-Malware. There are a few options you can attempt to get around with this obstacle.

Install in Safe Mode

The Windows-based PC has a special mode called “Safe Mode” in which just the bare minimum required programs and services are loaded. If the malware is blocking internet access and affecting your PC, running it in Safe Mode will let you download antivirus and run a diagnostic scan while limiting potential damage. In order to get into Safe Mode or Safe Mode with Networking, press F8 while the system is starting up or run MSConfig and look for the “Safe Boot” options under the “Boot” tab. After you restart into Safe Mode with Networking, you could download, install, as well as update anti-malware software from there. After installation, run the malware scanner to remove most standard infections.

Use an alternate browser to download an antivirus application

Certain viruses might target vulnerabilities of a specific web browser that obstruct the downloading process. If you appear to have a virus attached to Internet Explorer, then switch over to an alternate internet browser with built-in safety features, such as Chrome or Firefox, to download your favorite antivirus program – Safebytes.

Install security software on a thumb drive

Here’s another solution which is creating a portable USB anti-malware software that can check your system for malicious software without needing installation. Do these simple actions to clean up your affected PC using portable anti-malware. 1) Download the anti-malware program on a virus-free computer. 2) Plug the Flash drive into the clean computer. 3) Double-click on the downloaded file to open the installation wizard. 4) Choose the USB flash drive as the destination for saving the software file. Follow the on-screen instructions to finish the installation. 5) Unplug the USB drive. You may now utilize this portable anti-malware on the infected computer system. 6) Double click the Safebytes Anti-malware icon on the flash drive to run the software. 7) Click on “Scan Now” to run a complete scan on the infected computer for malware.

A Look at the Best AntiMalware Program

Want to download the very best anti-malware software for your laptop? There are several applications in the market that come in paid and free versions for Microsoft Windows systems. Some of them are excellent, some are ok types, while some will destroy your PC themselves! When searching for an anti-malware tool, choose one which provides dependable, efficient, and complete protection against all known computer viruses and malware. On the list of highly recommended software programs is SafeBytes AntiMalware. SafeBytes carries a good track record of top-quality service, and customers are very happy with it. Safebytes is one of the well-established computer solutions companies, which offer this all-inclusive anti-malware software. Using its cutting-edge technology, this application will allow you to eradicate multiples types of malware such as computer viruses, trojans, PUPs, worms, ransomware, adware, and browser hijackers. SafeBytes has got a variety of wonderful features that can help you protect your PC from malware attacks and damage. Below are some typical features present in this tool: Live Protection: SafeBytes offers a totally hands-free active protection that is set to observe, prevent and remove all threats at its very first encounter. This utility will always monitor your computer for any suspicious activity and updates itself regularly to keep current with the newest threats. Most Reliable AntiMalware Protection: This deep-cleaning anti-malware software program goes much deeper than most antivirus tools to clean your computer system. Its critically acclaimed virus engine finds and disables hard-to-remove malware that conceals deep inside your PC. Internet Security: Through its unique safety rating, SafeBytes notifies you whether a site is safe or not to access it. This will make sure that you’re always certain of your safety when browsing the net. Lightweight Utility: The program is lightweight and can run silently in the background, and that does not have an effect on your PC efficiency. 24/7 Live Professional Support: SafeBytes provides 24/7 technical support, automatic maintenance, and upgrades for the best user experience.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove Linkey without the use of an automated tool, it may be possible to do so by removing the program from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. You will likely also want to reset your browser. To ensure the complete removal, manually check your hard drive and registry for all of the following and remove or reset the values accordingly. Please note that this is for advanced users only and may be difficult, with incorrect file removal causing additional PC errors. In addition, some malware is capable of replicating or preventing deletion. Doing this in Safe Mode is advised.

The following files, folders, and registry entries are created or modified by Linkey

Files: C:Users%USER%AppDataLocalTempis33084504mysearchdial.dll C:Users%USER$AppDataLocalTempis357113909833170_stpsetup.exe c:Users%USER$AppDataLocalTempMega Browsemegabrowse_setup.exe C:Program Files (x86)Linkeylog.log C:Program Files (x86)LinkeyHelper.dll C:Program Files (x86)LinkeyChromeExtensionChromeExtension.crx C:Program Files (x86)Linkey C:Program Files (x86)LinkeyChromeExtension C:Program Files (x86)LinkeyIEExtension C:Users%USER$AppDataRoamingDigitalSitesUpdateProc Registry: HKLMSOFTWARECLASSESAPPID6A7CD9EC-D8BD-4340-BCD0-77C09A282921 HKLMSOFTWAREWOW6432NODECLASSESAPPID6A7CD9EC-D8BD-4340-BCD0-77C09A282921 HKLMSOFTWARECLASSESCLSID181F2C09-56DD-4F98-86D7-59BA2BC59B5A HKLMSOFTWARECLASSESCLSID4D9101D6-5BA0-4048-BDDE-7E2DF54C8C47 HKLMSOFTWAREMICROSOFTWINDOWSCURRENTVERSIONEXPLORERBROWSER HELPER OBJECTS HKLMSOFTWARELINKEY HKLMSOFTWAREWOW6432NODELINKEY HKLMSOFTWAREWOW6432NODESYSTEMKGeneral HKUS-1-5-18-ED1FC765-E35E-4C3D-BF15-2C2B11260CE4-0SOFTWARECONDUITValueApps HKLMSOFTWAREWOW6432NODEMICROSOFTWINDOWSCURRENTVERSIONEXPLORERBROWSER HELPER OBJECTSEF5625A3-37AB-4BDB-9875-2A3D91CD0DFD HKLMSOFTWARELINKEY|ie_jsurl, http://app.linkeyproject.com/popup/IE/background.js HKLMSOFTWAREWOW6432NODELINKEY|ie_jsurl, http://app.linkeyproject.com/popup/IE/background.js
Read More
How to turn off Live Photo on iPhone

Apple introduced the Live Photo feature way with iPhone 6S in their iOS9. Live Photo idea was that each time you take a photo, your phone will capture a few seconds of video along with sound and all of that is sent when you share your photo. This of course can sometimes be really bad when some not wanted audio gets recorded in the background.

live photo

Since the feature was introduced it has been set as the default option when taking pictures so each time you snap one you just capture a small amount of video and audio along. Good thing is that this feature can be turned off and the even better news is that you can edit your old photos to remove back video and audio.

How to share only photo

You can keep your Live Photos but share only a single still typical photo if you wish. Go to the photos app on your phone and select the photo you wish to share. Press the Share button on the bottom left part of the screen and once the Share menu appears tap on the Live button in the upper left corner of the selected photo. The button should turn grey and become slashed and now you can share only still photo. This is only temporary for this one specific share so next time you want to do this you will have to go through the process again.

How to disable Live Photo

If you are not happy with the previous solution and really do not want to turn off the Live feature each time you want to share a photo or you just simply do not want the feature at all there is way to turn if off for good. Take note that you can temporarily not use this feature just by opening the camera, switching to photo mode, and then tapping on the Live photo button on the toolbar that looks like three circles one inside another. This will temporarily turn the Live Photo feature for this session but next time when you open the camera by default it will be turned on again. This is a good approach if you want the feature but sometimes you just want not to use it.

In order to turn it off completely go to the settings of your phone and go to Camera and then preserve settings. inside the preserve setting turn the switch Live Photo to ON position, now go-to camera and again click on the live photo button to turn it off but this time setting will be saved and next time you open the camera it will not be ON.

Editing old Live Photos

As stated before you can edit your old pictures in order to make them stills. You can edit them to remove audio only but keep the video part, or you can completely remove everything and convert them into typical still images.

In order to only remove audio from your Live Photos go to pictures and select one that you wish to change, click on edit, and inside edit tap on the Live Photo icon (three circles). Next tap on the audio icon located in the top left corner of your screen and it will change into the mute icon. Click on done and you are finished.

To completely remove the Live photo go to Photos, select picture, click on edit and select the live photo button again. This time tap and hold the Live button next to the sound until it turns gray with a strike through it. Click on done and you are finished.

Read More
Fix Windows Upgrade Error 0x800701E3
There are various components that take part during a Windows Upgrade process such as the CPU, Disk, Network, and many more. This is why the process of upgrading your Windows 10 computer can be quite complex and due to its complexity, there are times when you might encounter some errors like the Windows Upgrade error 0x800701E3. If you encounter this kind of error then it has something to do with the “disk” part of the whole upgrade process which could be due to a conflict with the storage of your Windows 10 computer. When you receive this error, you will see the following error message on your screen:
“Windows cannot install required files. Make sure all files required for installation are available and restart the installation. Error code: 0x800701e3.”
To fix this Windows Upgrade error, here are some suggestions that might help.

Option 1 – Delete Files from Software Distribution Folder & Catroot2 folders

The downloaded Windows Updates are placed in a folder called “SoftwareDistribution”. The files downloaded in this folder are automatically deleted once the installation is completed. However, if the files are not clean up or if the installation is still pending, you can delete all the files in this folder after you pause the Windows Update service. For complete instructions, refer to the steps below.
  • Open the WinX Menu.
  • From there, open Command Prompt as admin.
  • Then type in the following command – don’t forget to hit Enter right after typing each one of them.
net stop wuauserv net start cryptSvc net start bits net start msiserver
  • After entering these commands, it will stop the Windows Update Service, Background Intelligent Transfer Service (BITS), Cryptographic, and the MSI Installer
  • Next, go to the C:/Windows/SoftwareDistribution folder and get rid of all the folders and files thereby tapping the Ctrl + A keys to select them all and then click on Delete. Note that if the files are in use, you won’t be able to delete them.
After resetting the SoftwareDistribution folder, you need to reset the Catroot2 folder to restart the services you just stopped. To do that, follow these steps:
  • Type each one of the following commands.
net start wuauserv net start cryptSvc net start bits net start msiserver
  • After that, exit Command Prompt and restart your computer, and then try to run Windows Update once more.

Option 2 – Try running the DISM tool

You can try running the Deployment Imaging and Servicing Management or DISM tool to fix the Windows Upgrade problem. Using this built-in tool, you have various options such as the “/ScanHealth”, “/CheckHealth”, and “/RestoreHealth”.
  • Open the Command Prompt with admin privileges.
  • Then type in the following commands and make sure to hit Enter right after you type each one of them:
    • Dism /Online /Cleanup-Image /CheckHealth
    • Dism /Online /Cleanup-Image /ScanHealth
    • exe /Online /Cleanup-image /Restorehealth
  • Do not close the window if the process takes a while as it will probably take a few minutes to finish.

Option 3 – Run the System File Checker Scan

System File Checker or SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files with good system files. To run the SFC command, follow the steps given below.
  • Tap Win + R to launch Run.
  • Type in cmd in the field and tap Enter.
  • After opening Command Prompt, type in sfc /scannow
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.
  • Restart your computer.

Option 4 – Try running the ChkDsk utility

You can also run the ChkDsk utility to fix the Windows Upgrade error 0x800701E3.
  • First, open This PC and right-click on your operating system partition for Windows.
  • Next, click on Properties and navigate to the Tools tab.
  • Then click on Check under the Error Checking section.
  • After that, a new mini window will be opened and from there click on Scan drive and let it scan your disk drive partition for any errors and then restart your computer.

Option 5 – Run the Windows Update Troubleshooter

Running the built-in Windows Update troubleshooter is one of the things you can first check out as it is known to automatically resolve any Windows Update or upgrade errors like error code 0x800701E3. To run it, go to Settings and then select Troubleshoot from the options. From there, click on Windows Update and then click the “Run the troubleshooter” button. After that, follow the next on-screen instructions and you should be good to go.

Option 6 – Run Microsoft’s online troubleshooter

Running Microsoft’s online troubleshooter might also help you fix the Windows Upgrade error code 0x800701E3. This online troubleshooter is known to help in fixing Windows Update errors, it scans your computer for issues that might be causing the problem and then fixes them automatically.
Read More
How to Fix Remote Computer requires network level authentication Error in Windows 10
A couple of Windows 10 users have reported an error on domain-connected systems when they tried accessing their computer systems remotely. This occurs when the network level authentication or NLA is enabled on the computer. If you are one of these users, you better keep reading as this post will guide you on how you can fix this error. To resolve this issue, there are several workarounds you can try. You can either disable this option directly via properties or you can also modify some registry entries or sub-keys and restart the system. When you encounter this problem, an error message pops up that states:
“The remote computer that you are trying to connect to requires network level authentication (NLA), but your windows domain controller cannot be contacted to perform NLA. If you are an administrator on the remote computer, you can disable NLA by using the options on the Remote tab of the System Properties dialog box.”
Or you could also see this error message instead:
“The remote computer requires Network Level Authentication, which your computer does not support. For assistance, contact your system administrator or technical support.”
Before you proceed in troubleshooting the problem using the options provided below, you need to create a backup for your data or system restore point as well as make a copy of any registry entries you are going to modify.

Option 1 – Disable Network Level Authentication via Properties

The NLA is a useful tool that provides your computer with extra security and helps network administrators in controlling who can log into the system with just a click of a single box. However, there are times when it can become a disadvantage and could prevent you from accessing your system remotely. Thus, you need to disable it using Properties.
  • Tap the Win + R keys to open the Run dialog box.
  • After that, type in “sysdm.cpl” and tap Enter to open System Properties.
  • Next, go to the remote tab and uncheck the checkbox for the “Allow connections only from computers running Remote Desktop with Network Level Authentication (recommended)” option.
  • Now click the Apply button to save the changes made and exit System Properties and then try logging into the remote computer again and see if the problem is fixed or not.

Option 2 – Disable NLA via Registry Editor

Note that you can only use this option if the first one didn’t work for you. Take note that this option will require you to restart your PC completely which could mean some downtime if your computer is running a production server. So make sure to save all your work.
  • Tap the Win + R keys to open the Run dialog box and then type in “Regedit” in the field and tap Enter to open the Registry Editor.
  • From there, click on File > Connect Network Registry and input the details of the remote computer and then try to connect.
  • Navigate to the path below after you’re connected:
HKLM >SYSTEM > CurrentControlSet > Control >Terminal Server > WinStations > RDP-Tcp
  • After that, change the values given below to “0”
    • SecurityLayer
    • UserAuthentication
  • The navigate to PowerShell and execute this command – restart-computer

Option 3 – Disable NLA via PowerShell

PowerShell allows you to tap into the remote computer and once you’ve targeted the machine, you can execute the commands given below to disable NLA.
  • Tap the Win + S to open Search and then type in “PowerShell” in the field. Right-click on the related result and select the “Run as administrator” option.
  • After opening PowerShell, execute the command below:
  1. Once in the PowerShell, execute the following command:
$TargetMachine = “Target-Machine-Name” (Get-WmiObject -class “Win32_TSGeneralSetting” -Namespace rootcimv2terminalservices -ComputerName $TargetMachine -Filter “TerminalName=’RDP-tcp'”).SetUserAuthenticationRequired(0) Note: In the command given, the “Target-Machine-Name” is the name of the machine you are targeting.

Option 4 – Use the Group Policy Editor to disable NLA

Another option you can use to disable NLA is via the Group Policy Editor. This is ideal for you if you are blanket disabling. Just take note that the Group Policy Editor is a powerful tool and that if you make some mistakes by changing values you have no clue about, you can render your computer useless so make sure that you create a backup for all the values before you proceed.
  • Tap the Win + R keys to open the Run dialog box.
  • Then type in “gpedit.msc” and tap Enter to open the Group Policy Editor.
  • From there, go to this path – Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security
  • After that, search for “Require user authentication for remote connections by using Network Level Authentication” and set it to disabled.
  • Now check if the error is fixed or not.
Read More
What Is Phishing And How Can You Protect Yourself From It?

Ever gotten an e-mail offer that seemed just a little bit too good to be true? Might’ve been a phishing attempt! These are everywhere and can come in many different forms. 

So what’s phishing exactly, how can you detect it and how can you keep safe?

What is phishing?

Phishing (pronounced like fishing) is a type of cyberattack that tricks the user into trusting the source and revealing sensitive information. Fishing being the perfect analogy, the bait is a legitimate-looking site, e-mail or file and when you take a bite, your identity, banking information and much more can be revealed and stolen.

Phishing Illustration
Credit: Anne Nygård on Unsplash

Some phishing attempts are incredibly obvious, others are super elaborate. Like with most types of malware, cybercriminals have become extremely well-versed in phishing and anyone can fall for it. To help you recognize and avoid it, we’ll take you through a couple of phishing types and give you tips on what to do if faced with them.

Phishing techniques

E-mail phishing

This is actually the most common type of phishing. A cybercriminal creates an e-mail containing stuff like attractive offers, legitimate-looking attachments or links and makes it appear as though it’s coming from a trusted source.

Illustration of Email Phishing
Credit: Justin Morgan on Unsplash

For example, it looks like it’s coming from your bank or your favorite retailer. The logo looks legit and the structure of the e-mail seems familiar, so you might get tricked into clicking on whatever clickable content is in it.

Unfortunately this exposes your device to malware that hands your data off to the hacker, who can decide what to do with it further.

SMS and social media phishing

Like the above example, you could be approached with lucrative offers or links via text messages or social media messages. Typically, the messages seem relevant to the user as they will be made to look like they’re related to apps or services you’re using.

Voice phishing

Voice phishing attacks are schemes that appear as though they’re coming from a credible number. Normally, you’ll get a call about something related to credit cards or taxes to get you into a state of worry, leading you to disclose personal information on the phone.

Spear phishing, whaling and BEC

Spear phishing normally targets specific individuals within a company who are likely to have access to sensitive data. Spear phishers spend time collecting information they can use to reach out to the individual looking as trustworthy as possible. They’ll typically lead with something relevant, for example mentioning an upcoming company event, and make a seemingly legitimate request.

Whaling is a more elaborate form of spear phishing, which targets people in even stronger positions such as executives or high-value individuals. The ultimate goal is to get them to transfer financial or other sensitive information that can be used to compromise the entire business.

Spear Phishing Illustration
Credit: Azamat E on Unsplash

BEC, or Business e-mail compromise, is a specific spear phishing technique carried out via e-mail. While there are many ways this is done, most commonly you’ll see instances where the phisher poses as a CEO or similar executive, or as a lower-level employee in specific positions (e.g. sales managers or financial controllers).

In the first situation, the impersonator reaches out to employees requesting them to transfer certain files or pay invoices. In the second situation, the phisher takes control of the employee’s e-mail account and sends false instructions to other employees in order to obtain data and information from them.

What can you do?

There are many ways you can be aware and spot a phishing attempt. Here are some tips:

  • Always check the sender’s address in your e-mails, even when they seem to come from a familiar source.
  • In any instance where payment information is requested, be very, very careful.
  • If you are receiving attachments you never asked for and definitely didn’t expect, better not click on them. 
  • Beware of content that transmits a sense of urgency (sales deals, urgent updates to login credentials, etc.).
  • Bad spelling and grammar are usually a telltale sign of phishing.
  • Links that look shortened (e.g. Bit.ly) or just suspicious in general - if you have a bad feeling, do not click on them.
  • If you are receiving threats, you probably shouldn’t be clicking on anything in that message.
  • Always examine first-time senders in detail.
  • Block suspicious e-mail addresses, numbers and social media accounts.
  • If you are receiving a coupon for free stuff… You aren’t.
  • If you’re being asked to update your payment details by a service you use, such as Netflix, chances are it’s an impersonator.

Those are some of the ways to identify and prevent phishing attacks. However, sometimes phishers disguise themselves a little too well or a misclick happens and there you go - you’ve been exposed to malware.

Illustration of a Lock on Keyboard Keys
Credit: FLY:D on Unsplash

This won’t happen if you invest in powerful protection software from the get-go, though. A good antivirus program like Bitdefender will keep you safe from becoming a victim of phishing scams. In fact, it will protect you from malicious attacks overall.

Be it your household or your business you’re concerned about, there are a bunch of different packages and options available, providing different kinds of cybersecurity services. That’s the only way you can ever really be sure you aren’t at risk of a digital attack.

Summary

Have you ever been targeted by phishers and didn’t know that’s what it was until you read this article? Many can relate. Protect yourself before it’s too late!

Read More
The task image is corrupt/tampered 0x80041321
If you suddenly encountered an error that says, “The Task image is corrupt or has been tampered with”, along with an error code of 0x80041321, read on as this post will guide you on what you can do to resolve this problem in your Windows 10 computer. According to security experts, this kind of error has something to do with a corrupt scheduled backup task wherein each time the task service plans to execute a task, it validates a few things. And if it finds any issue with the integrity or corruption in the registry, it will mark those tasks as corrupt and throws the error 0x80041321. There are several options you can check out to fix the problem. You can try using the Registry Editor to edit and fix the corrupted tasks or you could also delete the schedule keys or the WindowsBackup file, as well as try deleting the task from the Task Scheduler or refresh the User_Feed_Synchronization. But before you of these potential fixes, make sure that you check every option and verify if it’s not associated or trying to run a file which it should not. In addition, make sure that you create a System Restore point as well so that you can undo any changes you will be making if anything goes wrong. Once you have these things covered, refer to each one of the options provided below.

Option 1 – Try to use the Registry Editor to edit and fix corrupted tasks

The first thing you can do to fix the problem is to edit those tasks via Registry Editor, as well as fix the corrupted ones in System32. Before you proceed, keep in mind that since you are dealing with the Backup triggered by the Task Scheduler, you can find the entries for the tasks in different locations. You can find the Task Scheduler at Task Scheduler Library > Microsoft > Windows > Windows Backup, whereas, you can find it in this path in the Registry Editor, HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows NT CurrentVersion Schedule WindowsBackup AutomaticBackup. On the other hand, you can find the Windows System folder at C:/Windows/System32/Tasks/MicrosoftWindows/WindowsBackup. You need to ensure that the name of the task name is the same as everywhere and take note of the name. Once you have these covered, follow the steps below.
  • Tap the Win + R keys to open Run and type “Regedit” in the field and hit Enter to open the Registry Editor.
  • Next, navigate to this key: ComputerHKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionScheduleTaskCacheTreeMicrosoftWindowsWindowsBackup
  • From there, take note of the GUID value in the ID entry of the task under the AutomaticBackup and Windows Backup Monitor folder.
  • After that, you have to remove the task registry entries related to the ID from these locations
    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionScheduleTaskCachePlain
    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionScheduleTaskCacheLogon
    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionScheduleTaskCacheBoot
  • Once done, you have to create a temporary copy of the corrupted task file by going to this location: C:/Windows/System32/Tasks/MicrosoftWindows/WindowsBackup
  • From there, look for the AutomaticBackup and Windows Backup Monitor tasks and copy them to a location where you can keep them safe.
  • Next, you have to fix the corrupted task by deleting it from this location: C:/Windows/System32/Tasks/MicrosoftWindows/WindowsBackup
  • After that, you have to recreate the task by going to Task Scheduler > Microsoft > Windows> Windows Backup.
  • Now click on the Action menu and on Import task and navigate to the backup files and import them.
  • Once you’ve created the tasks, run them manually and see if the error is now fixed.

Option 2 – Try to delete the Schedule keys in the Registry

  • Launch the Registry Editor and go to this key: HKLMSOFTWAREMicrosoftWindows NTCurrent VersionSchedule
  • From there, delete all of its sub-keys.
  • Once done, exit the Registry Editor and check if the Backup Tasks are now working.

Option 3 – Try to remove the WindowsBackup file

The next thing you can do to fix the problem is to remove the WindowsBackup file if the first two options didn’t work. It is possible that the problem has something to do with corrupted Task files. The task files are XML files that include parameters, programs to use, and many more. If any of these files end up getting corrupted, the task scheduler will have trouble running it and will throw the “The Task image is corrupt or has been tampered with” error.
  • To delete it, go to C:WindowsSystem32TasksMicrosoftWindowsWindowsBackup.
  • From this location, get rid of all the files. You could also these files via Command Prompt using the DEL command.
  • Once done, go to the Backup and Restore in the Control Panel and set up the Windows Backup again.

Option 4 – Try to delete the task from the Task Scheduler

If you don’t want to delete the files from Windows Explorer, you can delete them instead via Task Scheduler.
  • Open the Task Scheduler and go to Task Schedule LibraryMicrosoftWindowsWindowsBackup.
  • From there, delete both of the tasks and set up Windows Backup again.
  • Once done, go to the Task Manager and run the AutomaticBackup task again and see if it works.

Option 5 – Try to restart the Task Scheduler service

As mentioned, it is possible that the Task Scheduler service could be disabled. You could have disabled it when trying to enhance your computer’s performance and whatnot. Thus, you need to verify if it’s running or not and then restart it.
  • First, you need to tap the Win + R keys on your keyboard to open the Run dialog box.
  • Next, type “services.msc” in the field and click OK or tap Enter to open the Windows Services Manager.
  • You will see a list of Services and from there, look for the Task Scheduler service and double click on it.
  • After that, go to the General tab and click on the Startup Type options and then select “Automatically” from the given list.
  • Click on the “RUN” option and select the “Restart the Service” option.
  • And click on the “After Second Failure” option and then select the “Restart-Service” option again.
  • Now click on the “After Subsequent Failures” tab and select the “Restart the Service” option.
  • Finally, click on the Apply and OK buttons and then run the Task Scheduler and see if the issue is now fixed.

Option 6 – Try refreshing the User_Feed_Synchronization

According to security experts, enabling and disabling the User Feed sync also known as the User_Feed_Synchronization task can help resolve the problem.
  • Tap the Win + X keys and select the PowerShell (admin) option from the menu.
  • Next, type the “msfeedssync disable” command and tap Enter.
  • Repeat the same process but this time run the “msfeedssync enable” command.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status