New MS Surface coming in October

In the Windows ecosystem, MS Surface laptops are among the best laptops on the market, they are regarded as equivalent to Apple MAC laptops but for Windows. Microsoft Fall 2022 Event will be held on October 12th at 10 AM. The event itself will be held right before it kicks off its annual, developer-focused Ignite event in Seattle from that same day through October 14.

ms surface pro

This event is the first in-person event that Microsoft has held since the beginning of the pandemic. We expect the launch of the Surface Pro 9 and the Surface Laptop 5, and maybe Surface Studio 3 as well. There are also some rumors about products themselves like choices between an ARM or x86 CPU but nothing is confirmed so far, we can just wait and see.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

How to Fix the 0x800ccc92 Error Code

0x800ccc92 - What is it?

The 0x800ccc92 is a Microsoft Outlook error. The error restricts your ability to send and receive emails on your Outlook email address successfully. This error is very similar to 0x800cc90 and 0x800ccc91 Outlook error codes. The 0x800ccc92 error message is often displayed as:

‘Receiving reported error (0x800ccc92): Your email server rejected your login.’

This error is quite common and is faced by many Microsoft Outlook users. It is advisable to fix this error immediately because besides restricting you from sending and receiving emails via Outlook, due to this error the data on your Outlook also becomes inaccessible and unreadable, and sometimes Outlook also begins to freeze unexpectedly.

Error Causes

Some of the most common causes of the error code 0x800ccc92 are:
  • PST files get corrupt
  • Incorrect Outlook configuration settings
  • PST file crosses its fixed file size limit
  • Failure of POP3 and Protocol STMP in database server connection
  • Improper synchronization between Outlook and the server
  • Usage of invalid password or username
  • Virus Infection

Further Information and Manual Repair

Any of the above causes may result in the 0x800ccc92 error message display. If you encounter this Outlook error, you don’t need to panic and call the network personnel in your office to fix and repair the error. In fact, it is very easy to fix and you can repair it by yourself: Here are some of the best and easy ways to resolve this error in the shortest time:
  • If the error message 0x0800ccc92 is displayed as POP3: Invalid Password, then in this case it is advisable to cross-check your Outlook account ID and password. Sometimes this error message may pop up if you insert an incorrect password or ID. Therefore the best way to resolve it to check where you went wrong and then re-enter your ID and Password correctly.
If the error is not related to POP3 (Post Office Protocol) then you can try some other alternative to resolve this issue.
  • Another alternative is to install the latest available Server Service Pack for Exchange. This solution works best if compatibility is the issue.
  • However, when nothing works, then it is advisable to download PST repair tool. The PST repair software is designed to scan, detect, repair, and resolve Outlook errors like 0x800ccc92.  The PST repair software is built with special algorithms that help repair PST corrupt files in seconds. This tool works on all Windows Operating Systems including Windows 8, Windows 7, Windows Vista, Windows XP, Windows 2003, and Windows 2008.
  1. All you need to do is, download and install this software on your system.
  2. Once you download it, run it on your PC to detect errors.
  3. Press scan to get started
  4. The scanning may take about a couple of minutes to complete.
  5. Once it is complete, click on the repair tab to fix the errors.
  6. Now restart your Outlook again and now try sending emails. This solution is likely to work if the above-mentioned solutions don’t.
Read More
How to Fix the TWCU.EXE Failed to Load Library File Error in Windows 10
The TWCU.EXE or TP-LINK Wireless Client Utility is a configuration application required to run wireless adapters successfully. The TP-LINK Wireless Client Utility application only exists on computers that are using the TP-LINK adapters. Upon the installation of this application, the service will be automatically added to the Windows service list that will continuously run in the background. The Twcu.exe is placed at the C:\Program Files\TP-LINKTP-LINK\Wireless Utility folder and is used by TP-LINK to connect to the internet. The name of the main executable file is twcu.exe and can be viewed in the Services tab of the Task Manager. If you are one of the users who just upgraded to Windows 10 from the previous Windows versions, then you’ll most likely see an error saying, “Failed to load the library file!” that has something to do with twcu.exe or TWCU. This error pops up when you go to your desktop and every time you log into your Windows 10 PC. Like pointed out, this error is related to the TP-LINK Wireless Client Utility and every user who is using the TP-LINK Wireless Client Utility is experiencing this problem which may be due to some compatibility issues especially when you start getting this error right after you upgraded to Windows 10. To fix this problem, follow each one of the options given below.

Option 1 – Try running in Compatibility Mode

The best thing you can do is to run the TP-LINK Wireless Client Utility in the compatibility mode since the problem is due to some compatibility issue. To run this utility in the compatibility mode, here’s what you have to do:
  • Look for the TP-LINK Wireless Client Utility which should be located on your desktop.
  • Once you find it, right-click on it and select Properties from the context menu.
  • After that, go to the Compatibility tab and mark the checkbox for “Run this program in compatibility mode for:” and from the drop-down list, select either Windows 7 or Windows 8.
  • Click the Apply button and then click OK to save the changes made and check if it has resolved the issue or not.

Option 2 – Try troubleshooting compatibility

This option is almost the same as the first one except it is an alternative way of fixing the TP-LINK Wireless Client Utility in case the first one didn’t work. In this option, you will troubleshoot the compatibility issue of the TP-LINK Wireless Client Utility.
  • Look for the TP-LINK Wireless Client Utility which as mentioned, is on your desktop.
  • Then right-click on it and select the “Troubleshoot compatibility” from the context menu.
  • After that, click on the “Try recommended setting” option. Once the process is done, the error message should be gone.
Read More
Steam proton to run Windows games on Linux
Steam protonDespite popular belief, there are a lot of users running Linux OS. Linux offers great security and working environment and 96.3% of the world's top 1 million servers run on Linux. 90% of all cloud infrastructure operates on Linux and practically all the best cloud hosts use it. But gaming on Linux is limited, enter Steam proton a Valve’s gaming solution.

What is Steam proton?

Proton is a WINE fork with some extra capabilities, to play games and run applications not native and not made to run natively under Linux OS. It is supposed to bridge the Gaming issues for PC users and let them more freedom in choosing an operating system to game on.

Find out if your game supports Proton

Although there are a lot of titles that nowadays run natively on Linux some will still need proton in order to run at all and sadly some of them will not be able to run on Linux even via proton but seeing how Valve is busy and it is trying to push its ideas and technology slowly this gap is closing. In order to see how the game you want to play performs and behaves on Linux and proton environment visit https://www.protondb.com/ and find out. As soon as the site loads you will be greeted with statistics and a search option to find out the status of the desired game with one of the given statuses: Borked, Bronze, Silver, Gold, Platinum, and Native. As you probably guessed native means that the game will work on Linux out of the box and borked will probably not work at all. Platinum and gold status means that game will run on proton without any input or tweaks from the user while silver and bronze means that it will work but might need some tweaks in order to make it work.

How to get Steam proton?

In order to run games under proton inside Linux, you will need firstly a Steam client which luckily works naturally on Linux. Unlocking/activating Steam Proton on your Linux-based system is easy. Just head over to Steam > Settings > Steam Play and toggle the option “Enable Steam Play for Supported Titles”. Valve has tested and fixed some Steam titles and you will now be able to play those titles. However, if you wish to go even further beyond, and play titles that even Valve has not tested, toggle the option “Enable Steam Play for all titles”.

Conclusion

Even we are not there yet, native gaming on Linux is gaining a foothold each day. Will Steam’s OS with proton technology be one that will turn the tide from Windows or some other tech we cannot tell but one thing is for sure, more choices mean better products so I am hopeful for a bright future.
Read More
How to Repair BSOD Stop Error code 0xc000021a in Windows 10

Error code 0xc000021a - What is it?

Error code 0xc000021a occurs when the system is unable to start or there’s a failure in critical system processes. Normally, it would take about several seconds for the system to boot and while on the startup process, error code 0xc000021a may take place to block the system to boot up. Users will get a blue screen of death (BOSD) when this error occurs. When upgrading to Windows 10, be careful; you might encounter other error messages such as error code 8007002c

Solution

Restoro box imageError Causes

There are several reasons why error code 0xc000021a occurs. It is important to have a full understanding of what caused the blue screen of death before attempting to fix the error by yourself. See below for a few common causes:

Computer malware has infiltrated your device.

• Important files such as Winlogon.exe and Csrss.exe are damaged. Winlogon.exe file is responsible for handling the login and logout processes while Csrss.exe is a vital part of Microsoft Client or Server ‘Runtime Server Subsystem’. Once one of these files is damaged or deleted, a stop error will occur.

• When there are mismatched system files installed or system upgrading process failed or still incomplete.

• Premature unloading of Wbemprox.dll

• Newly installed third-party software is not compatible with the operating system.

• There are corrupted, outdated, or incorrectly configured device drivers.

• There’s insufficient space in the system partition. Once the system partition is full, certain errors such as error code 0xc000021a will manifest.

• Windows registry is corrupted or damaged due to a software or system change. This means there are registry entries that are not cleared after uninstalling an application.

Further Information and Manual Repair

In fixing error code 0xc000021a, you might want to try and manually do so. Manual repair methods can give users effective and efficient solutions, addressing the root problems in relation to Windows error codes. Once the manual repair method is correctly implemented, users will be able to resolve issues immediately. However, there might be instances when a Windows professional is needed. In such cases, seek help from a certified Windows expert or you might want to consider using an automated tool whenever necessary.

Method One: Convert the Drive or Partition from NTFS to GPT

In order to fix Error code 0xc000021a in Windows 10, you might need to convert the partition or drive from NTFS to GPT. See below for the procedure: 1. Shut down your device then put in the Windows installation USB key or DVD. 2. Boot your device to the USB key or DVD in UEFI mode. 3. Inside the Windows Setup, open a Command Prompt window by pressing Shift + F10. 4. Type diskpart in the Command Prompt window to open the diskpart tool. 5. Type list disk to identify which drive to reformat. 6. Select which drive to reformat by typing select disk in the command prompt. Afterward, type clean then hit Enter. Once done, type convert gpt to be able to convert the drive from NTFS to GPT. Finally, type exit and press Enter. You can now close the Command Prompt window. 7. Once the partition or drive is converted from NTFS to GPT, the user can now continue the Windows Setup installation. NOTE: Select Custom in choosing which installation type to use. The drive will then appear as a single area of unallocated space. Choose that unallocated space then select Next. At this point, Windows will now begin the installation.

Method Two: Fix System File Errors

There are times when system files get corrupted or damaged which will result in system failure. If this is the case, you can use a Windows free tool to repair corrupted or damaged system files. 1. Right-click on the Start button then selects Command Prompt (Admin) from the list to open a Command Prompt window. 2. Once the Command Prompt appears, type sfc /scannow then hit Enter. Wait until the process completes. If the process is completed and it doesn’t report any error or issues that remain unsolved, you might want to employ the next method.

Method Three: Reset Windows 10

Resetting Windows will delete all software and user accounts installed in the operating system and will reinstall a fresh Windows. 1. Boot your device using a Windows installation USB key or DVD. Select Repair your computer to locate the Troubleshoot option. Afterward, choose Reset this PC. NOTE: If the device is able to boot the system, you can reset Windows without using a Windows installation USB key or DVD. You just have to boot the device then navigate to Settings in the Start button. Choose Update & Recovery then select Recovery found on the left pane. Choose Reset this PC option then select Go back to an earlier build and Advanced startup. Select Get Started button found in the Reset this PC tab. 2. Depending on your device’s condition, you can either select Keep my files or Remove everything. Both options will remove all applications installed in the device and will revert to default settings. 3. Choose either Just remove my files or Remove files and clean the drive depending on the situation. If you choose the Remove files and clean the drive option, the procedure will take longer as it will erase all the files permanently. In this case, deleted files cannot be recovered. However, if you don’t want to remove files permanently, select Just remove my files. 4. Once you’ve decided how to reset your system, click on Next once the Warning screen appears. Afterward, choose Reset once prompted. When the process completed, click on Continue.

Method Four: Download an Automated Tool

Can’t seem to put up with the long and technical manual repair process? You can still fix this error by downloading and installing a powerful automated tool that will surely get the job done in a jiffy!
Read More
Attempt was made to reference a token
If you were trying to open File Explorer but it suddenly stopped working and you encounter an error message that states, “An attempt was made to reference a token that does not exist”, read on as this post will guide you in fixing this problem. This problem was initially reported after the April Update and Microsoft was able to fix it right after correcting the build. However, this effort seems futile for some users as recently, some reported getting the same error when they try to open not just Windows File Explorer but also with utilities like Microsoft Management Console or MMC, Visual Studio, Task Manager, Printer, Recycle Bin, etc. Two of the most likely causes of this error are a troublesome Windows Update and corrupted system files. Whatever the cause is, here are some suggestions you can follow to fix the “An attempt was made to reference a token that does not exist” error.

Option 1 – Try to re-register the problematic DLL file

You may have to re-register the ntdll.dll file using the regsvr32.exe before you can successfully install the program and fix the ntdll.dll file crash error. The Regsvr32 tool is a command-line utility that can be used to register and unregister OLE controls like DLL and ActiveX (OCX) control in the Windows operating system. Follow the steps below to use it.
  • Open Command Prompt as admin from the WinX menu.
  • Next, type the following commands in the elevated Command Prompt and hit Enter to execute the command. This will re-register the affected DLL file using the Windows operating system tool, regsvr32.exe.
    • exe /[DLL file]
    • exe [DLL file]
Note: Replace “[DLL file]” with the name of the DLL file that was pointed out in the error.
  • After you execute the given commands, you should see a message saying, “DllRegisterServer in vbscript.dll succeeded” if the Regsvr32 tool was able to run successfully. After that, try to install the program again and see if it now works.

Option 2 – Replace the DLL file from a trusted source

  • First, you need to get the new DLL file from another computer with preferably the same file version number.
  • After that, you need to boot your PC into Safe Mode and navigate to the paths listed below and then replace the file using a USB drive or other external storage devices.
    • x86: This PC > C:/Windows/System32
    • x64: This PC > C:/Windows/SysWOW64
  • Next, type “cmd” in the Cortana search box and right-click on Command Prompt, and select “Run as administrator” to open it with administrator privileges.
  • Now type the “regsvr32 ntdll.dll” command and hit Enter.
  • Restart your PC and check if the error is now fixed.

Option 3 – Perform a System File Checker scan

The System File Checker or SFC scan could detect and automatically repair damaged system files that could be causing the “An attempt was made to reference a token that does not exist” error to pop up. SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files with good system files. To run the SFC command, follow the steps given below.
  • Tap Win + R to launch Run.
  • Type in cmd in the field and tap Enter.
  • After opening Command Prompt, type in sfc /scannow and hit Enter.
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.

Option 4 – Try reverting back to the previous build of Windows

This kind of error might have something to do with a Feature Update so you can try to revert your computer to a previous build of Windows 10 as it could help you fix the problem. In this case, it would better if you refrain from updating your Windows 10 computer until this problem is completely resolved by Microsoft.
Read More
Disable or Enable App Launch Tracking
The Windows 10 operating system utilizes a variety of measures in order to track your app launches so that it can boost both your start and search results. It can personalize the start menu based on the apps that you use the most on the Start menu as well as the search results. This way, the App Launch Tracking is definitely useful especially when you want to access your favorite and frequently used apps quickly in the Start menu and search results on your Windows 10 computer. On the other hand, Windows 10 provides users with the ability to control their privacy settings in order to protect the privacy of users. Windows 10 users can either opt to enable the app launch tracking to improve the start menu and search menu or opt to disable the app launch tracking in order to prevent the Windows operating system from tracking that you open if you really value your privacy that much. Whichever setting you prefer, you need to change the privacy control settings as well as make some tweaks in the Windows Registry in order to turn on or turn off the app launch tracking feature.

Option 1 – Turn off or turn on app launch tracking via Settings

  • Go to Settings and click on Privacy.
  • After that, toggle On the “Let Windows track app launches to improve Start and search results” option on the right side of the page under the General Settings to enable the app launch tracking feature.
  • And of course, if you wish to disable the app launch tracking feature, simply toggle Off the “Let Windows track app launches to improve Start and search results” option on the very same page under General Settings.
  • After that, close the Settings window.
Note: Keep in mind that when you disable the app launch tracking feature, the “Show most used app” setting will either be grayed out or labeled as “Disable” on your Windows 10 computer. Thus, if you want to keep viewing the most used apps, just re-enable the app launch tracking feature if you have disabled it.

Option 2 – Turn off or turn on app launch tracking via Windows Registry

Before you proceed, make sure to create a System Restore point
  • Tap the Win + R keys to open the Run dialog box.
  • Then type “Regedit” in the field and hit Enter or click OK to open the Registry Editor.
  • Next, navigate to the following path:
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionExplorerAdvanced
  • After that, right-click on the Advanced folder and then click on New to create a new 32-bit DWORD value.
  • Name the newly created DWORD as “Start TrackProgs” and set its value to “1” to enable the app launch tracking feature.
  • If you want to disable the app launch feature, set “0” as the value instead of 1.
  • Now click OK and restart your computer.
Take note that you still have to create a 32-bit DWORD value even if you are using a 64-bit Windows computer.
Read More
How to Fix Windows Activation Error Code 0xc004f050

Error Code 0xc004f050 – What is it?

Error code 0xc004f050 refers to a problem with activating the Windows key. The problem appears when you try to activate a copy of Windows by using Windows Activation wizard. This happens when the system becomes unstable and critical system files start missing. Though Windows 10 is a free upgrade for Windows 7/Windows 8/Windows 8.1 users, the activation error is still an issue. If you already had Windows 7/Windows 8/Windows 8.1 activated and did an upgrade successfully, then there should be no problem. This Problem Occurs only when you do a clean install.

Symptoms

When you try to activate a copy of Windows Vista or Windows 7 by using the Windows Activation wizard, you receive an error similar to the one below:
An error has occurred Code: 0xC004F050 Description: The Software Licensing Service reported that the product key is invalid

Solution

Restoro box imageError Causes

  • This causes due to an invalid product key.
  • This problem may occur if the license validity interval has expired, or if the license is not signed correctly.
  • Error Code 0xc004f050 occurs when the system becomes unstable and critical system files start missing.
  • Improper way of installing, deletion of some very important system files, misconfigured system files, etc. may also cause this error.
  • When you do a clean install, it wipes everything from the Primary Drive and after the install, windows can't find the Hardware ID which is used to verify your license.
  • For Windows 7, Windows Server 2008, and Windows Vista-based computers, this error may occur if you have entered the key for a beta version of the operating system while using the released version of the operating system.

Further Information and Manual Repair

This error is not something that can be fixed in seconds but will require some time and technical knowledge.

Method 1:

Re-insert the product key by using the Change Product Key tool:
  1. Click Start, click Computer, and then click System properties on the toolbar.
  2. In the Windows activation section, click Change product key.
  3. If you are prompted for an administrator password, type the password or click Continue.
  4. In the Product key box, type the product key, and then click Next.
  5. Follow the steps in the Windows Activation Wizard to complete the activation process.

Method 2:

Activate Windows by using the automated telephone system:
  1. Click Start, and then click Computer.
  2. Click System properties on the toolbar, and then click Click here to activate Windows now in the Windows activation
  3. If you are prompted for an administrative password, type it and click Continue.
  4. Click Show me other ways to Activate.
  5. Click Use the automated phone system and follow the instructions.

Method 3:

  1. Clean install Windows 7/Windows 8/Windows 8.1 using the installation disk and activate your copy.
  2. Now, download all the updates to see the Windows 10 Upgrade notification or download Windows Media Creation Tool and use the option Upgrade this PC to get Windows 10 right away.
  3. Once the upgrade is done, check the Activation Status. It will be fully activated as it should be. The Error code 0xc004f050 should not appear anymore.
If you want to get rid of the old Windows installation folder, then use the Windows Media Creation Tool to create a Flash Drive. Clean Install Windows 10. Now, every time when it asks for a product key, skip it. After installation is complete, Windows will automatically identify and activate your Copy. NOTE: Clean Install will make Sure you cannot roll back to your previous Windows 7 or Windows 8. So do it only if you are confident of using Windows 10 from here on. To verify the Windows activation status, follow these steps:
  • Click the Start button, and then click Computer.
  • Click System properties on the toolbar, and then view the activation status in the Windows activation section.
Read More
10 Worst Computer Viruses in history
Computers viruses, worms, ransomware, etc. are kinds of malicious software that no user should take lightly. On several occasions, we have touched upon security steps that each user should take in order to protect its identity and data. Sadly sometimes even when all precautions are taken some malware can still slip through and wreak havoc. Today we are looking at some of the worst or the best, depending on your view that has indeed wreaked plenty of havoc.

viruses10 worst computer viruses in history

In the list of the 10 most famous computer viruses below, we show the costs, dates, reach, and other key facts. First a note about terms: we use the words “virus” and “worm” interchangeably because most readers search for them that way. But there’s a subtle difference that we explain after the list.

1. Mydoom – $38 billion

The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent. Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server. Mydoom is still around today, generating 1% of all phishing emails. That’s no small feat considering the 3.4 billion phishing emails sent each day. By that figure, Mydoom has taken on a life of its own, infecting enough poorly-protected machines to send 1.2 billion copies of itself per year, 16 years after its creation. Though a $250,000 reward was offered, the developer of this dangerous computer worm was never caught. Wondering what makes the world’s most secure computers so safe? See the Tech@Work guide: Upgrade to the World's Most Secure and Manageable PC

2. Sobig – $30 billion

The 2003 Sobig computer virus is actually another worm. It is second only to the Mydoom virus in its scope. The $30 billion figure is a worldwide total, including Canada, the U.K., the U.S., mainland Europe, and Asia. Several versions of the worm were released in quick succession, named Sobig.A through Sobig.F, with Sobig.F being the most damaging. This cybercriminal program masqueraded as legitimate computer software attached to emails. It disrupted ticketing at Air Canada and interfered with countless other businesses. Despite its widespread damage, the creator of the successful bug was never caught.

3. Klez – $19.8 billion

Klez is a close third on the list of the worst computer viruses ever created. With nearly $20 billion in estimated damages, it infected about 7.2% of all computers in 2001, or 7 million PCs. The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses. As with other viruses and worms, Klez was released in several variants. It infected files, copied itself, and spread throughout each victim’s network. It hung around for years, with each version more destructive than the last. Windows has come a long way since most of the computer viruses on this list hit the web. Thankfully, built-in protection with Microsoft Defender is always on the watch.

4. ILOVEYOU – $15 billion

The year 2000’s ILOVEYOU virus worked by sending a bogus “love letter” that looked like a harmless text file. Like Mydoom, this attacker sent copies of itself to every email address in the infected machine’s contact list. Shortly after its May 4 release, it had spread to more than 10 million PCs. The virus was created by a college student in the Philippines named Onel de Guzman. Lacking funds, he wrote the virus to steal passwords so he could log into online services he wanted to use for free. He reportedly had no idea how far his creation would spread. This virus is also known as Loveletter. Need to up your remote work security game before there’s another entry on the list of most deadly computer viruses? See our guide: How to Work Remotely and Securely

5. WannaCry – $4 billion

The 2017 WannaCry computer virus is ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. The WannaCry ransomware ripped through computers in 150 countries, causing massive productivity losses as businesses, hospitals, and government organizations that didn’t pay were forced to rebuild systems from scratch. The malware raged like wildfire through 200,000 computers worldwide. It stopped when a 22-year-old security researcher in the U.K. found a way to turn it off. Computers with out-of-date operating systems were hit especially hard. That’s why security experts always recommend updating your systems frequently.

Ransomware strikes again

In September 2020, one of the potentially largest computer virus attacks in medical history hit Universal Health Services. The U.S. hospital chain, which has more than 400 locations, was reportedly struck by damaging ransomware. The attack forced the cancellation of surgeries and made healthcare workers switch to paper records.

6. Zeus – $3 billion

The Zeus computer virus is an online theft tool that hit the web in 2007. A whitepaper by Unisys three years later estimated that it was behind 44% of all banking malware attacks. By then, it had breached 88% of all Fortune 500 companies, 2,500 organizations total, and 76,000 computers in 196 countries. The Zeus botnet was a group of programs that worked together to take over machines for a remote “bot master.” It originated in Eastern Europe and was used to transfer money to secret bank accounts. More than 100 members of the crime ring behind the virus, mostly in the U.S., were arrested in 2010. It’s not as prominent today, but some of the virus’ source code lives on in newer botnet viruses and worms. Zeus caused documented damage of $100 million. But the real cost in terms of lost productivity, removal, and undocumented theft is undoubtedly much higher. A $3 billion estimate, adjusted for inflation, puts this virus at a cost of $3.7 billion in today’s dollars.

7. Code Red – $2.4 billion

First observed in 2001, the Code Red computer virus was yet another worm that penetrated 975,000 hosts. It displayed the words “Hacked by Chinese!” across infected web pages, and it ran entirely in each machine’s memory. In most cases it left no trace in hard drives or other storage. Financial costs are pegged at $2.4 billion. The virus attacked websites of infected computers and delivered a distributed denial of service (DDoS) attack on the U.S. White House’s website, www.whitehouse.gov. In fact, the White House had to change its IP address to defend against Cod Red. Can your printer get a virus? See our cool infographic: The State of Printer Security

8. Slammer – $1.2 billion

The SQL Slammer worm cost an estimated $750 million across 200,000 computer users in 2003. This computer virus randomly selected IP addresses, exploiting vulnerabilities and sending itself on to other machines. It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic. The Slammer worm hit banks in the U.S. and Canada especially hard, taking ATMs offline in many locations. Customers of Toronto’s Imperial Bank of Commerce found themselves unable to access funds. The attack reared its ugly head again in 2016, launching from IP addresses in Ukraine, China, and Mexico.

9. CryptoLocker – $665 million

Thankfully, ransomware attacks like the 2013 CryptoLocker virus have dipped since their 2017 peak. This malware attacked upwards of 250,000 machines by encrypting their files. It displayed a red ransom note informing users that “your important files encryption produced on this computer.” A payment window accompanied the note. The virus’ creators used a worm called the Gameover Zeus botnet to make and send copies of the CryptoLocker virus. According to a report by security firm Sophos, the average ransomware attack costs a business $133,000. If we estimate that CryptoLocker hit 5,000 companies, that would put its total cost at $665 million. Where will cybersecurity go next? See our guide: The Future of Cybersecurity

10. Sasser – $500 million

The Sasser worm was written by a 17-year-old German computer science student named Sven Jaschan. He was arrested at the age of 18 in 2004 after a $250,000 bounty was posted for the computer virus’ creator. A friend of Jaschan’s tipped authorities that the youth had penned not only the Sasser worm but also the damaging Netsky.AC attack. Jaschan was given a suspended sentence after it was found he was a minor when he wrote the malware. The Sasser worm crashed millions of PCs, and though some reports put damages at $18 billion, the relatively low infection rate suggests a more likely cost of $500 million. Other notable viruses The top 10 worst computer viruses above are just the ugly tip of a gargantuan digital iceberg. With a million new malware programs popping up every 3 years, we may miss the forest for a few outstanding trees. Here are just a few more viruses that have wreaked havoc over the years: Mimail: This worm tried to harvest data from infected machines to launch a string of DDoS attacks, but was relatively easy to remove. Yaha: Yet another worm with several variants, thought to be the result of a cyber-war between Pakistan and India. Swen: Written in C++, the Swen computer worm disguised itself to look like a 2003 OS update. Its financial cost has been pegged at $10.4 billion, but not reliably. Storm Worm: This worm showed up in 2007 and attacked millions of computers with an email about approaching bad weather. Tanatos/Bugbear: A 2002 keylogger virus that targeted financial institutions and spread to 150 countries. Sircam: A computer worm from 2001 that used counterfeit emails with the subject line, “I send you this file in order to have your advice.” Explorezip: This worm used fake emails to spread to every machine on thousands of local networks. Melissa: The most dangerous computer virus in 1999, Melissa sent copies of itself that looked like NSFW pics. The U.S. FBI estimated cleanup and repair costs at $80 million. Flashback: A Mac-only virus, Flashback infected over 600,000 Macs in 2012 and even infected Apple’s home base in Cupertino, Calif. In 2020, there’s now more malware on Macs than on PCs. Conficker: This 2009 virus still infects many legacy systems and could do significant damage if it ever activates. Stuxnet: This worm is reported to have destroyed Iranian nuclear centrifuges by sending damaging instructions.
Read More
Ways to lose your Facebook account to hackers
Facebook graphicsToday most people have Facebook accounts where they keep in touch with friends and family. But large Facebook network of users is also very interesting to another party as well, hackers. There are many ways hackers can steal your data via direct hacks, trickery, and social engineering in order to get your credentials, emails, and many other things using them to wreak further havoc. Once a hacker has needed information it is very difficult to minimize impact and all of your information could be compromised from a list of friends to credit card numbers. Keep on reading to learn how can you protect yourself against these attacks and learn about common practices that hackers use in order to steal your data.

Stealing Facebook data via email

A couple of years ago there was a lot of talk about not opening suspicious emails. Well, it still holds today. The difference is that today’s fake emails have become very difficult to differentiate from official ones since hackers put the effort into creating them copying fonts and layout, making them identical to original ones. So if emails look and feel like original ones how do you know if it is fake? Very simple, you do not click anything in it. If Facebook or for that matter any company wants to contact you they will do via their platform. Clicking inside a hacker's email will lead you probably to a fake Facebook website replica where you will have to type in your username and password providing an attacker with your login credentials, etc. If you receive this kind of mail where there are threats about terminating an account, missing payments, etc. it is always the best thing to go directly to Facebook and see if you have any kind of notifications there. Do not trust any emails that ask for account information, request money, or threaten to suspend your account.

Phishing attacks

As stated previously if you click on the link inside fake mail it will probably lead you to a website replica of the original. Although hackers can pretty much copy all things from an original website like layout, fonts, colors, etc. There is one thing that he cannot, web address. Take a good look into your browser address bar to see if there is a typo or anything strange in the address of a website. Also, make sure to check for the secure icon in the web address before signing in.

Fake Facebook buttons

If by any chance and for whatever reason, you end up on a fake Facebook site be vary careful about like and other buttons since buttons themselves behave and act like links inside your browser. IF when you click on like you get a prompt to sign in, it is almost 100% that you ended up on a phishing fake website.

Password brute force attack

Having complex and long passwords is a must. If your Facebook password is 12345 there is a very high chance that if a hacker wants he can easily guess it via trying out the most used and simple passwords via simple guessing. To avoid being hacked just for having poor passwords try to think of something longer, combine letters and numerical characters, place special characters inside it or just simply as the best solution use a password manager and create passwords with it.

Password grab outside Facebook

If you use the same password for multiple accounts which is a big no-no and you should not do it then hackers can use passwords from other services and login into your Facebook in order to steal data. Avoid these situations by having different passwords for different accounts or use a password manager to keep everything in order.

Hacking via key logger

Some time ago we have made an article which explained in detail everything you need to know about key loggers here: https://errortools.com/windows/how-to-know-if-you-have-keylogger-in-windows/ Anyway, this is a more advanced hacking technique in order for hackers to steal your data and it includes placing malicious applications into your system that records your keystrokes and sends them directly to hackers. Since this is an application best protection against this type of attack is to have a security suite installed and active on your PC or device you use to go to Facebook.

Connecting and surfing on an unsecured network

Using no password and unsecured WI FI or any other type of network is risky at least. You can have all protection installed on your device and have a strong password but hackers also logged in to the same network can track all outgoing stuff going through mentioned network leaving you again exposed to attacks. It is better to connect to your mobile operator network than on free WI FI, at least there is some level of security in your operator network while free WI FI is completely unsecured. Getting a virtual private network or VPN is also one thing you could think about for protection since almost all VPN services will encrypt your data thus providing you with a security layer even on unsecured Wi-FI.

Conclusion

Hacking and stealing have come a long way from their infant stages and in today’s world when we use a lot of gadgets and have plenty of online presence taking some steps for security is a must. I hope that you have found anything here informational and helpful so you can avoid getting your data compromised.
Read More
Fix SYSTEM_PTE_MISUSE Error in Windows
If you suddenly encounter the SYSTEM_PTE_MISUSE – 0x000000DA Blue Screen error while using your Windows 10 computer, read on as this post will provide you some potential fixes to resolve this kind of Blue Screen of Death (BSOD) error. There are many potential causes for the SYSTEM_PTE_MISUSE – 0x000000DA BSOD error. However, incompatible hardware detection and hardware recognition failure are some of the topmost culprits. Another thing that could trigger this kind of BSOD error is system file corruption which means that if a system driver for particular hardware ends up getting corrupted, it won’t be able to recognize the external device and will eventually crash the system with the SYSTEM_PTE_MISUSE – 0x000000DA Blue Screen error. The SYSTEM_PTE_MISUSE bug check has a value of 0x000000DA which indicates that a page table entry or PTE routine has been improperly used. To fix this error, here are some suggestions that might help but before you get started troubleshooting the problem, make sure that you create a System Restore Point first.

Option 1 – Try to disable PIT Security in the BIOS

If you are using a Dell computer and it throws up this kind of Blue Screen error, you need to go to the BIOS and uncheck the PIT Security and see if it helps in fixing the problem.
  • Tap the F2 key during the boot phase to enter the BIOS.
  • Once you’re in the BIOS, go to the Security tab and to the PIT Security section.
  • From there, uncheck the “PIT On” box to disable PIT Security.
  • Now restart your computer and check if the Blue Screen error is fixed or not.

Option 2 – Check for any incompatible devices

The next thing you can do to troubleshoot the SYSTEM_PTE_MISUSE Stop error is to plug in and out each one of the different hardware that is connected to your computer. Doing so will help you determine which one of the hardware is the one that’s triggering the error to pop up. You will also know what hardware drivers or anything else that could be causing this error which includes external devices like mouse, keyboard, printer, as well as internally attached components like the Graphics card and so on.

Option 3 – Try to update, rollback or disable device drivers

To fix the SYSTEM_PTE_MISUSE Stop error, you can also try to roll back, or update, or disable device drivers. It is most likely that after you updated your Windows computer that your driver also needs a refresh. On the other hand, if you have just updated your device drivers then you need to roll back the drivers to their previous versions. Whichever applies to you, refer to the steps below.
  • Open the Devices Manager from the Win X Menu.
  • Then locate the device drivers and right-click on them to open the Properties.
  • After that, switch to the Driver tab and click on the Uninstall Device button.
  • Follow the screen option to completely uninstall it.
  • Finally, restart your computer. It will just reinstall the device drivers automatically.
Note: You can install a dedicated driver on your computer in case you have it or you could also look for it directly from the website of the manufacturer.

Option 4 – Run the System File Checker Scan

System File Checker or SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files to good system files. Thus, you can try running it to resolve the SYSTEM_PTE_MISUSE Blue Screen error. To do so, follow the steps given below.
  • Tap Win + R to launch Run.
  • Type in cmd in the field and tap Enter.
  • After opening Command Prompt, type in sfc /scannow
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.
 Restart your computer.

Option 5 – Run the Blue Screen Troubleshooter

The Blue Screen troubleshooter is a built-in tool in Windows 10 that helps users in fixing BSOD errors like SYSTEM_PTE_MISUSE – 0x000000DA. It can be found in the Settings Troubleshooters page. To use it, refer to these steps:
  • Tap the Win + I keys to open the Settings panel.
  • Then go to Update & Security > Troubleshoot.
  • From there, look for the option called “Blue Screen” on your right-hand side and then click the “Run the troubleshooter” button to run the Blue Screen Troubleshooter and then follow the next on-screen options. Note that you might have to boot your PC into Safe Mode.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status