How to Fix Error 0x8024a206 in Windows

When you upgrade or update your Windows 10 computer but you suddenly got Error 0x8024a206 while trying to install the updates, it is due to a rouge update that was downloaded or because of some corrupted component in Windows. In case you don’t know, any file downloaded by Windows is verified for its integrity and if the files don’t pass the integrity test, then Error 0x8024a206 will most likely pop up during the Windows update or upgrade.

Option 1 – Reset the Windows Update components to the default

You have to stop a couple of services such as BITS, Cryptographic, MSI Installer, and Windows Update Services. And to do that, you need to flush the contents in the SoftwareDistribution folder. The Software Distribution folder in the Windows operating system is a folder that can be found in the Windows directory and is used to store files temporarily which might be required to install the Windows Update on your PC. Thus, it is required by the Windows Update and maintained by WUAgent. Aside from that, it also contains all the Windows Update History files and once you delete them, you will most likely lose the Update history. As a result, the next time you run the Windows Update, it may result in a longer detection time.

  • Open the WinX Menu.
  • From there, open Command Prompt as admin.
  • Then type in the following command – don’t forget to hit Enter right after typing each one of them.

net stop wuauserv

net start cryptSvc

net start bits

net start msiserver

  • After entering these commands, it will stop the Windows Update Service, Background Intelligent Transfer Service (BITS), Cryptographic, and the MSI Installer
  • Next, go to the C:/Windows/SoftwareDistribution folder and get rid of all the folders and files thereby tapping the Ctrl + A keys to select them all and then click on Delete. Note that if the files are in use, you won’t be able to delete them.

After resetting the SoftwareDistribution folder, you need to reset the Catroot2 folder to restart the services you just stopped. To do that, follow these steps:

  • Type each one of the following commands.

net start wuauserv

net start cryptSvc

net start bits

net start msiserver

  • After that, exit Command Prompt and restart your computer, and then try to run Windows Update once more.

Option 2 – Re-register DLLs related to Windows Update

DLL files, also known as Dynamic Link Library, are parts of applications that are separated from the core program so that they can be used again as well as independently be updated. The DLL files are loaded into memory and then used. Note that they have to be registered with Windows so they can be loaded. So if they’re not, the main program will fail. And this is the same with the DLL files related to the Windows Update. Thus, you need to register them in order to resolve Error 0x8024a206.

  • In the Cortana search box, type “command prompt”.
  • From the search results that appear, right-click on Command Prompt and select the “Run as administrator” option.
  • After that execute the commands listed below one after the other and don’t forget to hit Enter right after you key in each one of them.
    • regsvr32 JSCRIPT.DLL
    • regsvr32 MSXML3.DLL
    • regsvr32 WUPS2.DLL
    • regsvr32 WUPS.DLL
    • regsvr32 WUAUENG.DLL
    • regsvr32 WUAPI.DLL
    • regsvr32 WUCLTUX.DLL
    • regsvr32 WUWEBV.DLL

Note: You also have the option to run the commands together via a batch file. Simply create a batch file by copying all the commands in a notepad and then save it as “WURegisterDLL.bat”. After that, run the batch file and it will execute the commands all at the same time. Then you have to restart your computer and see if it has fixed the Error 0x8024a206.

Option 3 – Run the System File Checker

The SFC or System File Checker scan could detect and automatically repair damaged system files that could be causing the Error 0x8024a206. SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files to good system files. To run the SFC command, follow the steps given below.

  • Tap Win + R to launch Run.
  • Type in cmd in the field and tap Enter.
  • After opening Command Prompt, type in sfc /scannow and hit Enter.

The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:

  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.

Option 4 – Run the Windows Update Troubleshooter

Running the built-in Windows Update troubleshooter could also help you resolve the Windows Update Error 0x8024a206. To run it, go to Settings and then select Troubleshoot from the options. From there, click on Windows Update and then click the “Run the troubleshooter” button. After that, follow the next on-screen instructions and you should be good to go.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Wallpapers by MyWay (wallpapers.myway.com) removal Guide

Wallpapers by MyWay is a browser hijacker, also known as Wallpaper Homepage adware. It was developed by Mindspark Interactive Network, Inc and it is widely promoted on the Internet as a genuine search engine powered by Google with an ability to customize homepage background and add some quick access links. This hijacker can be found in the most popular web browsers including Mozilla Firefox, Google Chrome, and IE. Generally Wallpaper by MyWay hijacker appears on the user’s computer without the user being fully aware of its modification.

While installed users will experience additional ads showing up in their search results, as well as sponsored content and pop-up ads. This extension has been flagged by several anti-virus scanners and it is recommended to remove it from your computer.

About Browser Hijackers

Browser hijack is a very common type of online fraud where your web browser settings are altered to allow it to do things you never intend. Browser hijacker malware is designed for many different reasons. These are generally used to force visitors to predetermined sites, manipulating web traffic to generate ad revenue. Nevertheless, it’s not that harmless. Your internet safety is jeopardized and it is also really irritating. Additionally, hijackers can make the entire infected system fragile – other harmful malware and viruses would take hold of these opportunities to get into your system very easily.

Signs of browser hijacker infection

Symptoms that your browser is hi-jacked include: 1. you see unauthorized modifications to your web browser’s home-page 2. you find yourself regularly directed to a different site than the one you meant 3. the default web engine and the default browser settings is modified 4. find new toolbars which you did not add 5. you notice lots of pop-up ads on your computer screen 6. your internet browser has instability issues or displays frequent errors 7. you’re blocked to access those sites of anti-malware solution providers.

Exactly how browser hijacker finds its way onto your computer

Browser hijackers can enter a computer by some means or other, for instance via file sharing, downloads, and e-mail also. Many internet browser hijackings come from add-on programs, i.e., browser helper objects (BHO), toolbars, or plug-ins added to web browsers to provide them additional functionality. A browser hijacker can be installed as a part of freeware, shareware, demoware and fake programs. An example of some popular browser hijackers includes Babylon, Anyprotect, Conduit, DefaultTab, SweetPage, RocketTab, and Delta Search, however, the names are often changing. Browser hijackers could record user keystrokes to collect potentially valuable information that leads to privacy issues, cause instability on systems, significantly disrupt user’s browsing experience, and finally slow down the system to a point where it will become unusable.

Browser hijacker removal methods

Certain types of browser hijackers can be quickly removed from your computer by deleting malicious programs or any other recently installed shareware. However, the majority of hijacking codes are certainly not easy to get rid of manually, as they go deeper into the operating system. Furthermore, manual removals require in-depth system knowledge and therefore can be a very difficult job for novices. Installing and running anti-malware programs on the affected computer can automatically delete browser hijackers and other malicious programs. One of the top tools for repairing browser hijacker infections is SafeBytes Anti-Malware. It helps you get rid of any pre-existing malicious software on your computer and gives you real-time monitoring and protection against new threats. Use a system optimizer (such as Total System Care) along with your anti-malware to fix various registry issues, remove computer vulnerabilities, and improve your computer overall performance.

How To Get Remove Malware That Is Preventing Antivirus Installation?

All malware is detrimental and the consequences of the damage will vary according to the specific type of malicious software. Some malware goes to great lengths to stop you from downloading or installing anything on your computer, especially anti-virus software programs. If you are reading this article, you may have infected by a virus that stops you from downloading a security software such as Safebytes Antimalware on your PC. Refer to the instructions below to remove malware in alternative ways.

Use Safe Mode to fix the issue

If the malware is set to run at Windows start-up, then booting in safe mode should avoid it. Only the minimum required applications and services are loaded when you boot your laptop or computer into Safe Mode. To launch your Windows XP, Vista, or 7 computers in Safe Mode with Networking, follow the instructions below. 1) After switching on the computer, press the F8 key before the Windows splash screen starts to load. This would conjure up the Advanced Boot Options menu. 2) Select Safe Mode with Networking with arrow keys and hit ENTER. 3) When this mode loads, you should have an internet connection. Now, make use of your web browser normally and navigate to https://safebytes.com/products/anti-malware/ to download and install Safebytes Anti-Malware. 4) After installation, do a complete scan and allow the program to remove the threats it discovers.

Switch to some other internet browser

Malicious code might exploit vulnerabilities in a specific internet browser and block access to all anti-malware software websites. When you suspect that your Internet Explorer happens to be hijacked by a trojan or otherwise compromised by online hackers, the most effective course of action would be to switch over to a different internet browser such as Google Chrome, Mozilla Firefox, or Apple Safari to download your chosen computer security software – Safebytes Anti-Malware.

Install anti-malware on a flash drive

Here’s another solution which is creating a portable USB anti-malware software package that can scan your computer for malware without needing installation. Adopt these measures to employ a flash drive to fix your corrupted PC. 1) On a clean PC, download and install Safebytes Anti-Malware. 2) Plug in the pen drive into the uninfected computer. 3) Run the setup program by double-clicking the executable file of the downloaded software, with a .exe file format. 4) Choose the flash drive as the destination for saving the software file. Follow the activation instructions. 5) Now, transfer the thumb drive to the infected computer. 6) Double-click the antivirus software EXE file on the thumb drive. 7) Click on the “Scan Now” button to start the malware scan.

How SafeBytes Anti-Malware Keep your Machine Virus Free

If you are looking to download an anti-malware application for your computer, there are plenty of tools on the market to consider but you just cannot trust blindly anyone, no matter whether it is a free or paid program. A few of them do a good job in eliminating threats while many will ruin your computer themselves. You must select one that is dependable, practical, and has a good reputation for its malware source protection. When considering commercial anti-malware application options, many people select well-known brands, like SafeBytes, and they are quite happy with it. SafeBytes is a powerful, real-time antivirus application that is designed to assist everyday computer user in safeguarding their PC from malicious threats. With its most advanced virus detection and repair technology, this software will help you protect your personal computer against infections caused by different types of malware and other internet threats, including adware, spyware, viruses, worms, trojans, keyloggers, ransomware, and potentially unwanted program (PUPs).

There are lots of wonderful features you’ll get with this security product. Some of them are listed as below:

Robust Anti-malware Protection: Using its advanced and sophisticated algorithm, this malware elimination tool can detect and remove the malware threats hiding within your computer system effectively. Active Protection: SafeBytes gives you round-the-clock protection for your PC limiting malware attacks in real-time. It will check your personal computer for suspicious activity at all times and safeguards your PC from unauthorized access. Fast Scan: This computer software has one of the fastest and most efficient virus scanning engines in the industry. The scans are very accurate and take a short amount of time to complete. Web Protection: Safebytes allots all sites a unique safety score that helps you to have an idea of whether the website you’re about to visit is safe to view or known to be a phishing site. Light-weight: SafeBytes gives complete protection from online threats at a fraction of the CPU load due to its enhanced detection engine and algorithms. 24/7 Customer Service: Expert technicians are at your disposal 24/7! They will quickly resolve any technical issues you may be experiencing with your security software. To conclude, SafeBytes Anti-Malware is really great for securing your PC against all kinds of malware threats. Malware problems will become a thing of the past once you put this software program to use. So if you’re looking for the best anti-malware subscription for your Windows-based PC, we highly recommend SafeBytes Anti-Malware software

Technical Details and Manual Removal (Advanced Users)

If you’d like to manually remove Wallpapers by MyWay without using an automated tool, it may be possible to do so by removing the application from the Microsoft Windows Add/Remove Programs menu, or in cases of web browser extensions, going to the browsers AddOn/Extension manager and removing it. You will probably also want to reset your internet browser to its default configuration settings. If you opt to manually delete the system files and registry entries, use the following checklist to make sure you know exactly what files to remove before performing any actions. Please keep in mind that this is for professional users only and might be difficult, with wrong file removal leading to additional system errors. In addition, some malware is capable of replicating or preventing deletion. Carrying out this malware-removal process in Safe Mode is recommended.
Files: %UserProfile%\Local Settings\Application Data\WallpapersMyWayTooltab %LOCALAPPDATA%\WallpapersMyWayTooltab %LOCALAPPDATA%\Google\Chrome\User Data\Default\Extensions\glhahjphgpghoefihgllamaapanabkmp %UserProfile%\Local Settings\Application Data\Google\Chrome\User Data\Default\Extensions\glhahjphgpghoefihgllamaapanabkmp Registry: HKEY_CURRENT_USER\Software\WallpapersMyWay
Read More
How to Get Rid of Email Access Online

Email Access Online is a browser extension published by Polarity Technologies Ltd. That offers users quick and easy access to emails and weather reports. While this might sound interesting and useful, there is nothing this extension offers that cannot be solved with a few simple bookmarks.

While installed Email Access Online monitors the user's browser activity and records visited websites, clicked links, and bought products, this data is later used to serve partner ads if the user looks for the covered categories, additionally, it will hijack your new tab page, changing your search engine to Yahoo to allow easier ad placement.

Browsing the internet with this extension enabled will result in additional ad placement, pop-up ads, and sponsored links throughout your browsing sessions.

Upon further investigation, it was discovered that this extension is a repack of MyEmailXP, which was a repack of Fast Email Checker. Due to its suspicious delivery methods and information gathering, several anti-virus scanners have marked this extension as a browser hijacker and it is recommended to remove it from your computer.

About Browser Hijackers

Browser hijacking means that a malicious code has taken control over and modified the settings of your web browser, without your consent. Browser hijacker malware is designed for many different reasons. The idea is to force users to visit specific websites which are aiming to increase their visitor traffic and generate higher advertisement income. It may appear naive, but the majority of such websites are not legitimate and can present a significant risk to your online safety. In a worst-case scenario, your internet browser could be hi-jacked to download malicious software that can do a lot of damage to your PC.

Major signs that your internet browser has been highjacked

There are many signs that could indicate a browser hijacking: 1. the home page of the web browser is changed suddenly 2. you observe new unwanted bookmarks or favorites added, usually directed to ad-filled or porn websites 3. the default search engine is changed and the web browser security settings have been brought down without your knowledge 4. you see unwanted new toolbars added 5. your internet browser will display constant pop-up windows 6. your web browser starts running sluggishly or presents frequent errors 7. Inability to navigate to particular sites, especially anti-malware and other computer security software websites.

So how does a computer get infected with a browser hijacker

There are a number of ways your computer can get infected by a browser hijacker. They usually arrive through spam e-mail, via file sharing websites, or by a drive-by-download. They could also come from add-on software, also referred to as browser helper objects (BHO), web browser extensions, or toolbars. Browser hijackers sneak to your computer in addition to free software application downloads that you unintentionally install along with the original. The presence of any browser hijacker on your system could substantially diminish the web browsing experience, monitor your internet activities that lead to critical privacy concerns, create system stability problems and finally cause your PC to slow down or to a practically unusable condition.

How to repair a browser hijack

Certain kinds of browser hijackers can be effortlessly removed from your PC by deleting malicious software programs or any other recently installed shareware. However, most hijacking codes are certainly not very easy to remove manually, as they go deeper into your operating system. And there’s no denying the very fact that manual repairs and removal methods can certainly be a difficult job for an inexperienced PC user. Besides, there are several risks connected with fiddling around with the system registry files. Anti-malware program is incredibly effective when it comes to discovering and removing browser hijackers that regular anti-virus application has missed. To get rid of any kind of browser hijacker from your computer, you can download the following certified malware removal application – SafeBytes Anti-Malware.

What you can do if Virus Stops You From Downloading Antivirus?

Practically all malware is bad, but certain kinds of malicious software do much more damage to your PC than others. Some malware goes to great lengths to stop you from downloading or installing anything on your personal computer, especially anti-malware software. If you are reading this right now, you’ve probably realized that virus infection is the reason behind your blocked net traffic. So what to do when you want to install an anti-malware application such as Safebytes? There are a few actions you can take to circumvent this issue.

Make use of Safe Mode to fix the issue

If the malware is set to run automatically when Windows starts, getting into safe mode may block this attempt. Since only the bare minimum programs and services start-up in “Safe Mode”, there are rarely any reasons for conflicts to happen. You will need to do the following to remove malware in Safe mode. 1) At power on/start-up, tap the F8 key in one-second intervals. This will bring up the Advanced Boot Options menu. 2) Use the arrow keys to choose Safe Mode with Networking and press ENTER. 3) When you are into this mode, you will have access to the internet again. Now, use your internet browser normally and navigate to https://safebytes.com/products/anti-malware/ to download Safebytes Anti-Malware. 4) Once the software is installed, let the diagnostic scan run to remove viruses and other threats automatically.

Obtain the antivirus software in an alternate browser

Certain viruses may target vulnerabilities of a particular web browser that obstruct the downloading process. If you seem to have a virus attached to Internet Explorer, then switch to an alternate browser with built-in safety features, such as Firefox or Chrome, to download your favorite antivirus program – Safebytes.

Run anti-virus from a pen drive

Here’s yet another solution which is using a portable USB anti-malware software package that can scan your computer for viruses without needing installation. Follow these steps to run the anti-malware on the infected PC. 1) Make use of another virus-free computer to download Safebytes Anti-Malware. 2) Plug the Flash drive into the uninfected computer. 3) Double-click on the downloaded file to run the installation wizard. 4) Choose the drive letter of the USB drive as the location when the wizard asks you exactly where you want to install the anti-virus. Follow activation instructions. 5) Now, insert the USB drive into the infected system. 6) Double click the Safebytes Anti-malware icon on the thumb drive to run the software. 7) Click on “Scan Now” to run a complete scan on the infected computer for malware.

Let's Talk About SafeBytes Anti-Malware!

Nowadays, anti-malware software can protect your PC from different forms of internet threats. But wait, how to select the right one among plenty of malware protection application that is available on the market? As you may be aware, there are numerous anti-malware companies and tools for you to consider. Some of them are good, some are ok types, while some will affect your computer themselves! When looking for an antivirus program, select one which gives solid, efficient, and full protection against all known computer viruses and malware. On the list of the recommended tool by industry experts is SafeBytes Anti-Malware, well-known security software for Microsoft Windows. SafeBytes anti-malware is really a powerful, highly effective protection software intended to help end-users of all levels of IT literacy in identifying and removing malicious threats from their computers. Once you have installed this tool, SafeBytes advanced protection system will ensure that absolutely no viruses or malware can seep through your personal computer.

SafeBytes possesses a plethora of amazing features that can help you protect your computer from malware attacks and damage. The following are some of the great features included in the application.

Real-time Active Protection: SafeBytes offers a totally hands-free active protection and is set to observe, prevent and wipe out all threats at its first encounter. It’ll constantly monitor your pc for hacker activity and also gives users superior firewall protection. Anti-Malware Protection: Using its advanced and sophisticated algorithm, this malware removal tool can detect and remove the malware threats hiding in your PC effectively. High-Speed Malware Scanning Engine: This computer software has got one of the fastest and most efficient virus scanning engines in the industry. The scans are extremely accurate and take a short amount of time to complete. Web Security: SafeBytes gives an instant safety rating on the pages you are about to check out, automatically blocking risky sites and making sure that you’re certain of your online safety while browsing the web. Lowest Memory/CPU Usage: SafeBytes gives you complete protection from online threats at a fraction of the CPU load due to its enhanced detection engine and algorithms. Fantastic Tech Support Team: For any technical inquiries or product guidance, you could get 24/7 expert assistance through chat and email. SafeBytes will keep your personal computer protected from most advanced malware threats automatically, thus keeping your online experience safe and secure. You now may know that this particular software does more than just scan and delete threats on your computer. If you want advanced forms of protection features and threat detections, buying SafeBytes Anti-Malware could be well worth the dollars!

Technical Details and Manual Removal (Advanced Users)

To remove Email Access Online manually, navigate to the Add/Remove programs list in the Windows Control Panel and choose the program you want to remove. For browser plug-ins, go to your browser’s Addon/Extension manager and choose the plug-in you want to remove or disable. You will probably also want to reset your internet browser. To make sure of complete removal, find the following Windows registry entries on your system and eliminate it or reset the values accordingly. However, this is a difficult task and only computer professionals can perform it safely. Additionally, certain malware is capable of replicating itself or preventing deletion. You’re suggested to do this process in Windows Safe Mode.
Registry: HKEY LOCAL MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\675942D5-E956-4670-9ADE-6982CF23558F
Read More
Windows 10 Power Toys detailed guide
Hello and welcome everyone, today we will be talking about power toys, a great, completely free, open-source, Microsoft-supported Windows project which aims to provide Windows itself with powerful features not found natively in it. We will explore power toys completely here and explain each module and its features. The first thing is of course to download power toys themselves. You can find them here. After you download them, double click on the downloaded file and install. Start power toys, you will find them at the bottom of the taskbar, note that power toys need to be active in order to use their features. power toysWhen opened you will be greeted with general settings window. These are settings for power toys themselves, Here you can check for updates, change the looks of power toys, run it on system startup and run them as administrator. Set them up so they best suit your needs.

Color Picker

Moving down next tab we have is Color picker. power toys colorpicker hex editorThe color picker will let you as the name suggests pick colors, it will sample colors from running applications and windows, snap their values, and place them in the clipboard. A useful application if you are working as a graphic designer, want to create some cool word document, or just want to compare the difference between colors. After the Color Picker is activated, hover your mouse cursor over the color you would like to copy and left-click the mouse button to select a color. If you want to see the area around your cursor in more detail, scroll up to zoom in. The copied color will be stored in your clipboard in the format that is configured in the settings (HEX by default). The editor lets you see the history of picked colors (up to 20) and copy their representation in any predefined string format. You can configure what color formats are visible in the editor, along with the order that they appear. This configuration can be found in PowerToys settings. The editor also allows you to fine-tune any picked color or get a new similar color. Editor previews different shades of currently selected color - 2 lighter and 2 darker ones. Clicking on any of those alternative color shades will add the selection to the history of picked colors (appears on the top of the colors history list). Color in the middle represents your currently selected color from the history of the colors. By clicking on it, the fine-tuning configuration control will appear, which will let you change the HUE or RGB values of the current color. Pressing OK will add newly configured color into the history of the colors.

Fancy Zones

Moving down, we have fancy zones. power toys fancy zonesFancyZones is a window manager utility for arranging and snapping windows into efficient layouts to improve the speed of your workflow and restore layouts quickly. FancyZones allows the user to define a set of window locations for a desktop that are drag targets for windows. When the user drags a window into a zone, the window is resized and repositioned to fill that zone. When first launched, the zones editor presents a list of layouts that can be adjusted by how many windows are on the monitor. Choosing a layout shows a preview of that layout on the monitor. The selected layout is applied automatically.

File Explorer

Next, File Explorer. power toys settings file explorerOnly 3 options here but maybe some are important to you. This extension lets you enable SVG file preview in File Explorer, enable Markdown preview, and enable SVG thumbnails. Turn on each one you might need.

Image Resize

Next down the line, we have Image resize. power toys image resizeImage Resizer is a Windows shell extension for bulk image-resizing. After installing PowerToys, right-click on one or more selected image files in File Explorer, and then select Resize pictures from the menu. You can specify your own sizes if you want, you can resize when dragging files, you can overwrite files or make new copies of new sizes, and many more options. A very useful tool I am sure plenty of users can use since this eliminates the need for pictures or any other image application for common resizing tasks.

Keyboard Manager

The keyboard manager is the next tab in power toys. power toys keyboard shortcutsThe PowerToys Keyboard Manager enables you to redefine keys on your keyboard. For example, you can exchange the letter A for the letter D on your keyboard. When you select the A key, a D will display. You can also exchange shortcut key combinations. For example, the shortcut key, Ctrl+C, will copy the text in Microsoft Word. With the PowerToys Keyboard Manager utility, you can exchange that shortcut for ⊞ Win+C). Now, ⊞ Win+C) will copy text. If you do not specify a targeted application in PowerToys Keyboard Manager, the shortcut exchange will be applied globally across Windows. PowerToys Keyboard Manager must be enabled (with PowerToys running in the background) for remapped keys and shortcuts to be applied. If PowerToys is not running, key remapping will no longer be applied.

Power Rename

Nex we have a very cool and powerful Power Rename power toys power renamePowerRename is a bulk renaming tool that enables you to:
  • Modify the file names of a large number of files (without renaming all of the files with the same name).
  • Perform a search and replace on a targeted section of file names.
  • Perform a regular expression rename on multiple files.
  • Check expected rename results in a preview window before finalizing a bulk rename.
  • Undo a rename operation after it is completed.

Run Utility

Power Toys Run utility follows next. power toys run warningPowerToys Run is a quick launcher for power users that contains some additional features without sacrificing performance. PowerToys Run features include:
  • Search for applications, folders, or files
  • Search for running processes (previously known as WindowWalker)
  • Clickable buttons with keyboard shortcuts (such as Open as the administrator or Open containing folder)
  • Invoke Shell Plugin using > (for example, > Shell:startup will open the Windows startup folder)
  • Do a simple calculation using the calculator

Shortcut Guide

Last but not least we have a Shortcut guide. power toys shortcut guide largeThis guide uses PowerToys to display common keyboard shortcuts that use the Windows ⊞ key. Windows key keyboard shortcuts can be used while the guide is being shown and the result of those shortcuts (active window moved, arrow shortcut behavior changes, etc) will be displayed in the guide. Releasing the Windows ⊞ key will make the overlay disappear. Tapping the Windows ⊞ key will display the Windows Start menu. Hey, you made it till the end, thank you for reading and I hope to see you soon.
Read More
How to clear cache inside Windows 11
Cache files are temporary files that have been created by various applications and services when used.  As temporary files, they are safe to be removed and deleted from the system since the application or service will create new ones when needed but sadly will not remove old ones, this task is left to OS itself. windows 11 cacheAutomatic Windows cleanups can mostly take care of these things but for top-notch performance clearing cache manually is a far better option. We will here explore various cache temporary files, where they are, and how to clean them. Sit back and let’s do some cleaning!

Clear cache using Disk Cleanup

  1. Open Start menu and search Disk Cleanup
  2. Click on it in search results
  3. Click on the drives drop-down menu and select the drive where is Windows 11 installed
  4. In the Files to Delete section enable all boxes and click on OK
  5. Click on delete Files to confirm

Clear Microsoft store cache

  1. Press ⊞ WINDOWS + R to open the run dialog
  2. Type in WSReset.exe and press ENTER
  3. Black blank windows will appear, wait for the window to close itself and you are done

Clearing location cache

  1. Press ⊞ WINDOWS + I to open location history
  2. Select Privacy & Security
  3. In the App Permissions section click on Location
  4. On-Location page click on Clear

Clear and flush DNS

  1. Press Start and search for Windows Terminal
  2. Click on Terminal in search results
  3. Type in: ipconfig /flushdns and press ENTER
And that is that!
Read More
Mozilla VPN is here

The new thing from Mozilla is not a browser, it is a VPN!

Besides Firefox, Mozilla offers now Firefox Relay, an app helping you to mask your email and phone number, and a new Mozilla VPN.

mozilla vpn

Mozilla has recently announced a new subscription model that will let you use all products together for $6.99 per month. Although this is a little more expensive than the competition that goes around for $5 per month note that with this subscription you are having access to all services, not just VPN.

VPN will not only hide your IP address but will also make sure websites cannot access your real location and it encrypts all of your network activity. Relay will give you protection against spam, serving as a shield for your email and limiting spammers from access to your real email address and phone number. With Mozilla subscription will let you use both services.

Read More
Error: 0x80070035. Network path was not found
As you know, Windows allows you to share files between systems that are on the same network even though they are not connected physically. All you have to do is to make sure that the folder administrator allows access to the intended use and that your computer should be connected to the internet. Once you meet these conditions, you can share files between systems. However, recently a number of users reported that despite fulfilling these conditions, they end up getting errors instead when they try to access the shared drive. The error states:
“Error code: 0x80070035. The network path was not found.”
One of the common causes of this error is the antivirus program or the Firewall installed on your computer. It could also be that the drive is not shared in the first place or there are some issues with your network drivers. Whichever the case is, here are some potential fixes you need to check out to fix the Error code: 0x80070035.

Option 1 – Try to temporarily disable anti-virus and Windows Defender Firewall

As mentioned, the error could be due to the antivirus program or the Windows Defender Firewall installed on your computer. Thus, disabling them or any security software installed in your computer is always a good idea you can try when you’re not able to access the shared drive on your computer. There are times when you encounter problems like Error code: 0x80070035 due to interference of antivirus or security programs. Thus, you have to disable both your antivirus program and Windows Defender Firewall for the meantime and check if it fixes the error or not.

Option 2 – Check if the drive is shared

Before you further troubleshoot the problem, make sure that the drive you are trying to access is shared first. To do so, follow these steps:
  • Right-click on the folder and select Properties.
  • Go to the Sharing tab and check the status of the Network File and Folder Sharing.
  • And if the status is “Not Shared”, you need to select Share.
  • Next, select the intended Network User for sharing the file and choose the permission level for the user.
  • After that, click on the Apply and OK buttons to save the changes made. You or the intended user should now be able to access the shared folder or file.

Option 3 – Try to ping the IP address of the targeted computer

Even though the shared folder or file is shared correctly, it is possible that the network channel is not connected properly which is why you have to test it by pinging the IP address of the targeted computer from the primary computer.
  • Tap the Win + R keys to launch the Run dialog box.
  • Type “cmd” in the field and tap Enter to open Command Prompt.
  • Next, type the “ipconfig/all” command and tap Enter to execute it. This will populate various details.
  • From the given details, take note of the IPv4 address.
  • Afterward, open Command Prompt on the primary computer and then type the “ping <IPv4 address of the target computer>” command and hit Enter.
  • Now check if you get 4 confirmation replies or not. If not, you can try to access the Network Adapter Troubleshooter.
To run the Network Troubleshooter, refer to these steps:
  • Open the Search bar on your computer and type in “troubleshoot” to open the Troubleshoot settings.
  • Next, scroll down and select the “Network Adapter” option from the right pane.
  • Then click on the Run Troubleshooter” button.
  • After that, your computer will check for any possible errors and will pinpoint the root cause of the problem if possible.
  • Restart your computer.

Option 4 – Verify if Network Discovery is enabled

All you have to do is go to Start > Settings > Network & Internet and from there, click on the “Change connection properties” option and shift the radio button for Network profile to Private. After that, check if folder sharing is now working.

Option 5 – Try to modify the Network Security settings

There are times when the Network Security settings interfere with the folder or file sharing process. And if that’s the case, you can modify it to resolve the problem. How? Refer to these steps:
  • Tap the Win + R keys to open the Run dialog box.
  • Then type “secpol.msc” in the field and tap Enter to open the Local Security Policy manager window.
  • After that, go to Local Policies > Security Options located on the left pane.
  • Next, double click on Network security: LAN Manager authentication level in the right pane to open its Properties.
  • And then select the “Send LM & NTLM-use NTLMv2 session security if negotiated” option from the drop-down menu.
  • Now click on Apply and OK buttons to save the changes made.
  • Reboot your computer.

Option 6 – Try to enable NetBIOS over TCP/IP

  • Tap the Win + R keys to open the Run dialog box.
  • Then type “ncpa.cpl” in the field and tap Enter to open the Network Connections window.
  • After that, right-click on your network and select Properties.
  • Next, double click on Internet Protocol Version 4 and click on the Advanced button.
  • From there, go to the WINS tab and shift the radio button to Enable NetBIOS over TCP/IP.
  • Now click OK to save the changes made and then restart your computer.

Option 7 – Update the Network Adapter drivers

You might also want to update the Network Adapter drivers by following these steps:
  • Tap the Win + R keys to launch the Run window and then type in the “MSC” command and hit Enter to open the Device Manager window.
  • Under the Device Manager, you will see a list of drivers. From there, look for the Network Adapters and expand it.
  • Then right-click on each one of the Network drivers and update them all.
  • Restart your PC and see if it helped in fixing the BSOD error.
Note: If updating the network drivers didn’t help in fixing Error code: 0x80070035, you can also try to uninstall the very same drivers and restart your Windows 10 PC. After that, the system itself will reinstall the drivers you just uninstalled. Alternatively, you can also download and install the drivers from the manufacturer’s website directly. To reinstall the network adapter driver, refer to these steps:
  • Open the Devices Manager from the Win X Menu.
  • Then locate the device drivers and right-click on them to open the Properties.
  • After that, switch to the Driver tab and click on the Uninstall Device button.
  • Follow the screen option to completely uninstall it.
  • Finally, restart your computer. It will just reinstall the device drivers automatically.
Read More
Nostalgic gaming with Retroid pocket 2
We have talked about gaming on old computers and have covered new and upcoming Steam deck handheld console. Today we are combining old gaming with a handheld console and our target of talk is Retroid pocket 2. This product is packed with really high-quality plastic and with some great features in it. retroid pocket 2So let's dive into this cool handheld in more detail and find out why we like it so much.

Good manufacturing quality

Plastic and overall manufacturing quality are really, really good. The battery is great, packing 4000mAh that can hold over 3 hours of nonstop gaming, and all buttons and joysticks are great. The screen is a 640 x 480 60Hz 3.5″ IPS screen (4:3 aspect ratio) that performs really great for its purpose, retro gaming. There is a Digital D-Pad and dual analog joysticks. The right joystick is the lower profile to avoid being accidentally moved when pressing the four gaming buttons. There are three buttons at the bottom which are Home, Start, and Select. On either side are good-quality stereo speakers. On the bottom of the device are a Micro SD Card slot and a 3.5mm headphone port. On the top of the device are Left and Right shoulder and trigger buttons. There are the power button and volume adjustments. There are a USB Type-C OTG port and a Micro HDMI output for connection to a TV.

Good technical statistics

Good, not great but then again since this is retro handheld you cannot really expect some crazy stuff like alder lake inside. So the console is punching ARM Cortex A7 CPU with 2 cores and a clock of 1.5GHz paired with ARM Mali 400-MP2 500MHz GPU. The console has 1GB LPDDR3 RAM memory and 8GB eMMC Storage where 5GB is freely available, the rest is taken for OS. As mentioned before the display is 640x480 resolution with a size of 3.5″. The battery is Lithium-Ion with a power of 4000mAh and on the handheld, there is a USB Type-C connector, 3.5mm headphone jack, and Micro-HDMI. It also has Wifi/Bluetooth 4.0

Retroid Pocket 2 OS and support

Pocket 2 comes with Android 6 but you can update its firmware to the 8.1 version on the official site that I would highly recommend. New versions of the handheld will come with 8.1 on it from the box. Having Android as OS opens many possibilities like you can download Android apps such as Steam Link, allowing you to play actual PC games on your Retroid Pocket 2. Not just that, if it does get a newer version of Android it could even have the ability to use xCloud, Xbox’s cloud gaming service. Of course, hardware will not be able to handle modern games but the option is still there and for some old PC titles available on steam like Commander Keen, for example, this is a great option. The console can emulate basically everything up to Dreamcast, including N64, PSP, and Playstation 1. It can emulate Nintendo DS also, but it can only do so with one screen. The only problem with this console is you will need to install and update Apps. You’ll need to learn about RetroArch, an app that lets you download emulators or cores to play games.

Retroid price

The last thing on the list is the price of the console itself. Going just under the 100$ mark this really makes it an affordable option for plenty of people that would like to experience retro handheld gaming or for ones like me, nostalgic gamers wanting to relive some era of playing games on the road.

Conclusion

Among Chinese handheld devices for retro gaming, Retroid Pocket 2 is really on top of what the market can offer. If you are looking for a great handheld retro console and are not afraid of little dive-ins into the OS and various configurations, Pocket 2 will reward you with plenty and wide emulation support.
Read More
Some Steam tips and tricks for easy life
steamSteam has cemented itself as the largest digital game shop in the World. First, release all the way back on September 12th, 2003, it was meant to be a standalone software client aimed to deliver updates to Valve’s games. It was soon expanded to include titles from third parties. The greatest Steam expansion and its popularity started in 2004 with the release of Half-life 2. Steam allowed prepurchased editions to be downloaded before the official release of the game making it available for play the moment it was officially out. Very soon after Steam gained its popularity, Valve has opened doors to other developers and offered them to use Steam as means for a digital distribution platform. Today it hosts over 30000 different game titles, not including DLC or applications. And how soon Valve’s steam deck is coming out soon we would like to share some great tips and tricks about Steam itself for easy everyday gaming.

Steam guard account security

Security of any of your accounts should be something that you really take seriously. So as always use a strong password for Steam but if you want an extra layer of security for it, and you should, use the Steam built-in feature: Guard Account Security. In order to activate Security Guard go to Steam>Settings>Account>Manage Steam Guard Account Security. Once enabled you will be able to use the Steam mobile application for special code when opening Steam or your email address.

Use Steam beta feature

Once a Steam account is created by default you will download and install the client. In the client, you will have the latest features available but there are more Steam features than default ones, beta features that can offer some improved and new functionality, and do not worry, they are stable and bug-free. I have been in Steam beta for years and not even once have I had any issues with the client itself but I have always had the latest features that will come to regular users later. To enable beta participation to go to Steam>Settings>Account, open the drop-down Beta participation menu, and choose Steam Beta Update. Confirm on OK and restart the Steam client. You will now get all the latest features first.

Manage your library via Collections

The collection is a neat idea for organizing your large game library into different collections or sections easily expanded and contracted for easier navigation and organization. To add the game to a collection just right-click on it and select Add To>New Collection, make a name for a collection like action, RPG, or whatever rocks your boat, and you are done. Once the collection is created other games can be added to it simply just by dragging it into the desired collection.

Make shelves

Shelves are ways to see your collections in the larger areas of the Steam clients. By clicking Add Shelf>Choose a Shelf, you can now add your collection to a shelf on the larger part of the client as a horizontal scrolling container with your chosen games. There are also some predefined shelves like All Games, Recent friend activity, and more.

Hide Game from Library

By right-clicking on a game and selecting Manage>Hide This Game you will remove the game from the active view of your Steam library. Note that the game will still be owned and a part of your library, you will just not be able to see it. This is a great feature when for example you have some things that came as a part of the game pack you are not really interested in when you have 2 different versions of the same game as for example standard and deluxe edition or just by simply not wanting to have game visible in the library. You can find a hidden game by typing its name in the search box and from there you can unhide it.

Play game soundtracks inside Steam

Some games offer you to purchase their soundtracks if you like music from them and some even include OST with a regular purchase. Steam lets you play these soundtracks and even lets you import your own music library folder into it in order to play all of your music inside the client itself. It has even options to automatically stop music playing once the game is run and you can make playlists as well. Your purchased game soundtracks are automatically included, the rest you will need to add by pointing Steam to the folder where you keep music in.

Configure gamepad

Inside Steam, you can configure your gamepad’s general settings, big picture settings, desktop settings, etc. Steam embraced the idea that many OC users these days own and play with gamepads so it has implemented configuration options inside it. To configure your pad go to Steam>Settings>Controller.

Use big picture Steam mode

Big picture mode is Steam's idea of making Steam an entertainment center. Once it is activated it switches from the application into full-screen mode aimed at large TV screens or monitors. You can easily navigate through it via gamepad, mouse, keyboard, or other devices. You have access to the store, your game library, etc. Same as your typical steam app but a little different. You can easily activate it via View> Big Picture Mode and see for yourself is this something you prefer over a standard application layout.

Enable Steam Cloud

Steam Cloud is a great feature that uses cloud storage to save your game progress meaning that you can easily switch to another PC, install games there and continue where you have left off. Many games support this feature instead of keeping saves locally and it is a great feature worth turning it ON. To turn and use Steam Cloud service go to Steam>Settings>Cloud>Enable Steam Cloud Synchronization. Just remember to check does game you are playing supports this option.

Share your Games via Family sharing

Family sharing is a Steam feature allowing you to share your game library with up to 5 accounts on up to 10 different devices. This is a great way to let other members of your family or even close friends enjoy some games you have or vice versa. They will get as well their own save games so you can sleep safe knowing that your progress can not be changed or hindered. Family sharing can be turned ON by logging into PC Steam client where you would like to share your library and navigate to Steam>Settings>Family and then clicking on Authorize Library Sharing On This Computer.

Refund a game

Sometimes the game is not the same as advertised, sometimes it will not work on your PC, sometimes hardware specifications are too high making the game unplayable, etc. For whatever reason, you might have Steam offers you a full game price refund if you wish to do so, you only need to meet 2 criteria, the game must have been purchased within 2 weeks period, older purchases cannot be refunded, and your game playtime must not be over 2 hours of game time. If you fit into this category all you need to do in order to get the full money back is going to Help>Steam Support, pick a recent game from the eligible list, and ask for a refund.

Gift a game

As you can buy gifts for your friends or loved ones in real life, Valve made sure you can do it in digital as well. Gifting game via Steam is simple and straightforward. Choose a game you wish to gift, go to your shopping cart and instead of clicking Purchase for myself, click on Purchase As a Gift, from there you will be taken to your friend list to choose to whom you would like to gift a game along with the option to write a little note to the receiver like happy birthday, enjoy or whatever.

Stream games in Steam itself

Although Steam is not there yet in streaming as Twitch or Facebook gaming is, there is an option to stream your game sessions on it. Click on Steam>Settings>Broadcast to make all adjustments and start streaming. You can also watch streams from your friend list and Steam is now broadcasting popular streams directly to its client if you want to watch it.

Take a game screenshot

By pressing F12, you can take a screenshot from any game and save it inside your Steam cloud library. You can change of course this default screenshot key via Settings>In-Game and if you would like to see your screenshots you can always do it under View Screenshot Library on a game’s page. That’s it, our Steam tips and tricks for easy and good gaming life, I hope to see you soon on errortools.com for your daily articles, tips, and tricks.
Read More
How to Fix Sysdata.xml Error Code on Your PC

Sysdata.xml Error Code - What is it?

To develop a good understanding of the Sysdata.xml error code, it is first important to learn what is sysdata.xml file and its function. Sysdata.xml is a type of XML file. The .XML file extension is an Extensible Markup Language file. XML-based formats have now become the default for many office productivity tools including Microsoft Office and LibreOffice. Furthermore, it has also come into common use for the interchange of data over the internet. Sysdata.xml error code usually pops up when .XML based applications are unable to run and crash while loading. This is a type of BSoD (Blue Screen of Death) error code. Common symptoms include:
  • System freeze
  • The screen turns blue
  • Sudden system shut down

Solution

Restoro box imageError Causes

The Sysdata.xml error code is triggered due to multiple reasons such as:
  • Faulty hardware
  • Malware or viral infection
  • Registry issues
No matter what the reason may be, it is advisable to fix this error code right away without any delays. This is a fatal error and can result in a system crash and loss of data. And recovering valuable lost data is the hardest.

Further Information and Manual Repair

Here are some of the effective and easy do it yourself methods to resolve this error on your system:

Method 1: Fix Faulty Hardware

Hardware issues may arise due to many reasons like manufacturing issues or voltage fluctuations. Electrical storms can cause power surges which may affect the hardware causing it to fail. The best way to resolve this is to download the latest drivers for the problematic devices or alter the device configuration in the BIOS setup program.
  • To reconfigure the BIOS simply restart your PC and before Windows starts, press Del Key to access your BIOS.
  • Now find the factory reset option.
  • Select the option and press the button to load your factory defaults.
  • After that save changes and confirm your selection.
  • Reboot your PC to activate the changes.

Method 2: Scan for Viruses

Sometimes viruses and malware can disguise themselves in the .XML files which can cause them to get corrupted. To resolve the issue, it is advisable to download a powerful antivirus and scan your entire PC for viruses. Remove the detected viruses to resolve the Sysdata.xml error on your system.

Method 3: Repair the Registry

If the registry is not cleaned frequently, it loads with unnecessary and obsolete files like the junk files and cookies. These files clutter and damage the registry and eventually corrupt it and the important files like .XML files stored in it. To resolve the issue it is recommended to download Restoro. It is a user-friendly and powerful PC Fixer embedded with a registry cleaner. It scans your entire PC for registry-related errors and removes them immediately. It cleans the cluttered registry and restores the damaged files thereby repairing the issue right away. Click here to download Restoro.
Read More
File or directory is corrupted and unreadable
If you encounter an error message that says, “<Drive>: is not accessible, The File or directory is corrupted and unreadable” when you try to connect your USB or external device, then the File System could have been corrupted or the external device might be infected with malware. On the other hand, it is also possible that the device might have some physical damage. To fix the “The file or directory is corrupted and unreadable” error, you can try to run Check Disk or scan your computer for malware or you could also format the destination drive. For more details, refer to each one of the given options below.

Option 1 – Run the Check Disk utility

You can also run the Check Disk utility to fix the error when you connect your USB or external device.
  • In the Windows Search box, type “command prompt” and from the search results, right click on Command Prompt and select “Run as administrator”.
  • After opening Command Prompt, type this command and tap Enter: chkdsk <Partition Letter>: /f /r /x /b
  • The command you entered will start to check for errors and fix them automatically. Else, it will throw an error message saying, “Chkdsk cannot run because the volume is in use by another process. Would you like the schedule this volume to be checked the next time the system restarts? (Y/N)”.
  • Tap the Y key to schedule Disk Check the next time your computer restarts.

Option 2 – Try to format the destination drive

Formatting the drive can also help you resolve the error. To format it, follow these steps:
  • To get started formatting your drive, tap the Win + E keys and then go the access page of the drive.
  • Next, right click on the drive and select Format.
  • After that, uncheck the “Quick Format” option and then format your drive properly.
  • Now once the formatting process is finished, unplug the drive and plug it back in afterwards.
  • Check if the error is already fixed. If the drive is not initialized, tap the Win + R keys and hit Enter.
  • After opening the Run dialog box, type “diskmgmt.msc” and hit Enter to open Disk Management.
  • From there, right click on the drive volume and select initialize Disk.
  • Next, select the correct partition type and proceed.
Option 3 – Try scanning your computer for malware using Windows Defender Your computer could be infected with malware which might have triggered the “The file or directory is corrupted and unreadable” error. To fix this, you need to scan your computer using a reliable program like Windows Defender.
  • Tap the Win + I keys to open Update & Security.
  • Then click on the Windows Security option and open Windows Defender Security Center.
  • Next, click on Virus & threat protection > Run a new advanced scan.
  • Now make sure that Full Scan is selected from the menu and then click the Scan Now button to get started.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status