Recently, a number of users reported getting an error code 0x8007025D-0x2000C while updating their Windows 10 computers using an ISO or the Media Creation tool. You will also see a detailed error message saying, “The installation failed in the SAFE_OS phase with an error during APPLY_IMAGE operation” together with the error code 0x8007025D-0x2000C.
This kind of issue usually occurs when there is some problem with the installation files and when Windows Update fails to apply upgrade using the Media Creation Tool or ISO. To resolve this issue, you can use the troubleshooting options given below as a reference.
Option 1 – Try recreating the Windows 10 installation USB
Recreating the Windows 10 installation USB might help in fixing the problem. You can use a USB drive to do so but make sure that it has a great read-write speed. Follow the steps below to recreate Windows 10 installation USB”
Click this link and then click the Download Tool Now button.
Next, click the “Use the tool to create installation media (USB flash drive, DVD, or ISO file)…” option and follow the next given instructions on the screen.
Now select the ISO file option in step 5.
After that, you should now have an ISO file.
Next, go to the location where you’ve downloaded the ISO file.
Then right-click on the Windows 10 ISO file and select the Open with option and then select File Explorer.
Now click on “setup.exe” and follow the next instructions that appear on the screen. When asked, you have to select either Nothing (clean install) or Keep personal files only option. Take note that you must not select the “Keep personal files, apps, and Windows settings since it doesn’t really work.
Option 2 – Try running the Windows Update troubleshooter
You might also want to run the Windows Update Troubleshooter as it could also help in fixing Windows Update error code 0x8007025D-0x2000C. To run it, go to Settings and then select Troubleshoot from the options. From there, click on Windows Update and then click the “Run the troubleshooter” button. After that, follow the next on-screen instructions and you should be good to go.
Option 3 – Update the BIOS
Take note that you have to be careful when modifying something in the BIOS. So if you don’t know much about it, it’s best if you skip on this option and try the other ones instead. However, if you are well-versed in navigating the BIOS, then follow the steps below.
Tap the Win + R keys to open the Run dialog box.
Next, type “msinfo32” in the field and press Enter to open System Information.
From there, you should find a search field on the bottom where you have to search for the BIOS version and then press Enter.
After that, you should see the developer and version of the BIOS installed on your PC.
Go to your manufacturer’s website and then download the latest version of BIOS on your computer.
If you are using a laptop, make sure that you keep it plugged in until you have updated the BIOS.
Now double click on the downloaded file and install the new BIOS version on your computer.
Now restart your computer to apply the changes made.
Option 4 – Try restarting the Background Intelligent Transfer Service
The Background Intelligent Transfer Service or BITS is a part of the Windows Update service and is the one that manages the background download of Windows Update, as well as scans for new updates and so on. And if Windows Update is experiencing some problems, you can try restarting BITS but make sure that you have admin privileges to do so.
Tap the Win + R keys to open the Run dialog box.
Next, type “services.msc” in the field and hit Enter to open Windows Services.
From the list of Services, look for the Background Intelligent Transfer Service and double-click on it to open Properties.
After that, you need to set the Startup type to “Automatic (Delayed Start) and click on Apply.
Now click the Stop button to stop BITS and then click the Start button to restart the service.
Click OK to save the changes made and then restart your PC.
Option 5 – Try to update Windows after a couple of minutes or an hour
There are times when the issue is from Microsoft’s end. It could be that there’s some issue with Microsoft’s server so it would be better if you give it a couple of minutes or an hour or so before trying to run Windows Update again.
The Windows 10 operating system supports the logging in of multiple users at the same time. Aside from that, it also allows administrators to create a Guest Account that has limited rights. However, there are some instances when you could encounter an error when you use the Guest Account.
The error may state:
“Shell Infrastructure Host has stopped working. A problem caused the program to stop working correctly. Please close the program”.
This error indicates that the Shell Infrastructure Host or SiHost.exe process that is used for handling graphical elements, has crashed. And to fix this error, there are several options you can check out. You can try to reinstall the Microsoft Redistributable Packages or run a System File Checker scan. In addition, you can also use a new Guest Account or troubleshoot the problem in a Clean Boot State.
Option 1 – Try to install or repair Microsoft Visual C++ Redistributable 2013
A corrupted Microsoft Visual C++ Redistributable package or the absence of it can trigger the “Shell Infrastructure Host has stopped working” error – so if you do not have this package yet, you have to install it but if you already have it, follow the steps below to repair it.
Open Control Panel and proceed to Program and Features.
Under Programs and Features, look for Microsoft Visual C++ Redistributable package among the list.
Then right-click on it and click the Change button.
Next, you should see the Repair option – click on it to repair the installation of the Microsoft Visual C++ Redistributable package.
The process may take a couple of minutes before it finishes so once it does, you have to restart your PC.
After doing all these steps and you still encounter the problem, you might have to uninstall this package and download it directly from Microsoft’s website. However, if you are using Windows 10, you might not be able to do so since it only supports Windows versions up to Windows 8.1 so just proceed to the next option below.
Option 2 – Try to run a System File Checker scan
In the Windows Start Search, type “command prompt” and right-click on Command Prompt from the search results, and then select the “Run as administrator” option.
After opening Command Prompt with admin privileges, type the “sfc /scannow” and tap Enter to execute it.
Once the scan is finished, restart your computer and see if the Windows Script Host error.
Option 3 – Try using a new Guest Account
You might want to use a new Guest Account as it could help get rid of the error. All you have to do is have your admin delete the old Guest Account and create a new one and see if it helps in fixing the error.
Option 4 – Try troubleshooting the problem in a Clean Boot State
Setting your computer in a Clean Boot State can help you diagnose and later troubleshoot the problems in your computer. During this state, the system will start with a minimal number of drivers and startup programs that help in isolating the problem with the interfering software. To put your computer in a Clean Boot State, follow the given steps below.
Log onto your computer as an administrator.
Type in MSConfig in the Start Search to open the System Configuration utility.
From there, go to the General tab and click “Selective startup”.
Clear the “Load Startup items” check box and make sure that the “Load System Services” and “Use Original boot configuration” options are checked.
Next, click the Services tab and select the “Hide All Microsoft Services” check box.
Click Disable all.
Click on Apply/OK and restart your PC. (This will put your PC into a Clean Boot State. And configure Windows to use the usual startup, just simply undo the changes.)
From there, start to isolate the problem by checking which one of the programs you installed recently is the root cause of the problem.
The error 103 may occur either due to issues in your Google Chrome browser or system issues. If error 103 occurs when using Chrome, this means there is a conflict between Google Chrome and the antivirus program running on your PC.
It is displayed in either of the following formats:
‘Chrome error 103 connection aborted’, ‘Chrome error 103 err_connection_aborted’ or ‘Error 103 (net: ERR_CONNECTION_ABORTED): Unknown error.
However, if this is a system error code, it may be displayed in the following format ‘The semaphore cannot be set again’ or as ‘ERROR_TOO_MANY_SEM_REQUESTS’ or as the value 0x67.
Solution
Error Causes
The error 103 is triggered due to multiple reasons such as:
The conflict between Google Chrome and anti-viruses arises because when the web browser attempts to update, the anti-virus programs on your PC may view the update as a threat.
Due to this, the connection to the internet is terminated and the error 103 message is displayed on your computer screen. And besides, this keeps you from upgrading your Google Chrome browser too.
Other causes include:
Viral infection
Missing Windows component called ‘expand.exe’
Registry overlaps
Incompatible drivers
Further Information and Manual Repair
Here are some of the easy and efficient ways to resolve error 103. Choose a method according to the error 103 messages displayed on your screen.
Method 1: Check for the ‘Expand.exe’ Windows component
This method is workable if the error 103 is triggered due to browser issues. To get started, follow these steps.
First, go to the start menu, and in the search bar type ‘expand.exe’. If you are able to find it, move it to the following directory C:\Windows\system32. However, if you are unable to locate it, then copy the file from Windows installation CD. Once you copy the file to the directory, reinstall the updated version of Google Chrome.
Method 2: Change the Location of the Temporary File
If the error still persists, try method 2.
Go to the start menu and open the Run window. Now type C: and press OK. Then go to File, then New, and then Folder. Now create a temporary folder and name it ‘test’. After that go back to the start menu and open the Run window again. Now enter the following text in the text field:cmd.exe then press OK. In the command prompt type set TMP=C:\test.
After that try reinstalling Google Chrome by typing the following in the command prompt: start ChromeSetup.exe.
Method 3: Update Drivers
If the error message 103 is generated due to system issues, then try updating drivers. Sometimes the error may occur due to incompatible drivers.
Method 4: Perform an Entire PC Scan for Viruses
To resolve error 103, perform an entire PC Scan for viruses. Sometimes the error may occur due to viral infection. Removing viruses may fix the error.
Method 5: Clean and Restore the Registry
If the error is triggered due to registry issues, then it is advisable to download Restoro.
This is a multi-functional PC repair tool integrated with powerful utilities including an anti-virus, a registry cleaner, Active X controls, and class scanner, and a system optimizer. The registry cleaner feature wipes out all the unnecessary files including cookies, junk files, and bad registry keys that corrupt the registry. It cleans and restores the registry instantly.
The anti-feature removes all viruses and spyware while the system optimizer utility ensures your system works at its optimum speed.
It can be downloaded on all Windows versions. It is safe and efficient. This software is a one-stop solution for all PC-related errors.
Click here to download Restoro.
It is officially confirmed, Windows 11 release date is October 5th. Windows 11 will be released as a free upgrade to all registered Windows 10 users that have supported hardware for it.
The rest of the users will be able to install it via ISO file as a clean installation if their computer supports Windows 10 hardware requirements. The official price for the license for Windows 11 has not yet been set but I assume after release it will be set.
Priority for W11 will have users who are upgrading from W10 as stated by Microsoft.
Also, it was officially confirmed that Android apps will not be running natively in this first release of Windows 11, that feature will come in a future update, official statement below:
"We look forward to continuing our journey to bring Android apps to Windows 11 and the Microsoft Store through our collaboration with Amazon and Intel; this will start with a preview for Windows Insiders over the coming months,"
The rest of the features will be all included inside Windows 11 on launch.
Hello and welcome to our Increasing Virtual Memory tutorial. Before trying to raise the quantity of virtual memory in your pc system, it's important to get a comprehension of its goal and use.
This leads to the constant use of high-performing tasks in addition to keeping multitasking capability.
The downside to this process is the fact that relatively, the HDD accesses information slower than a RAM module.
Taking into consideration its use in a computer program and how virtual memory works, there isn't any amount of virtual memory allocation.
The quantity of virtual memory to be defined for a unique computer program would be determined by the kinds of programs that are started and the quantity of multitasking done. The Microsoft Windows operating system yet does supply a recommended baseline memory based on the number of RAM installed and storage space of the HDD.
Virtual memory allocation really indicates the upsurge in how big the paging file is. This file provides the pc program with all the essential instructions on the best way to act once all the installed RAM has been allotted to the running applications. In both Microsoft Windows XP (all variants) and Windows Vista environments, the method to control the paging file size is basically the same. To increase the quantity of virtual memory:
Click on the Start menu and choose the "Control Panel" alternative. When the Control Panel window is started, choose the "Operation and Maintenance" class.
Click on the "System" choice to create the Device Properties Window.
Click the "Advanced" tab and choose the "Settings" button under Operation. In the Operation alternative window, select the "Change" button under the Virtual Memory class.
Choose the hard disk where the Windows operating system is now installed. That can be the same place where in fact the paging file will be saved.
Test on the checkbox for the "Custom Size" to enable you to determine the number of virtual memory you need to use for your device.
Click the "OK" button thrice to shut all of the windows. Click the Start button and restart your machine to enable the upsurge in the number of virtual memory to be finished.
In establishing the number of virtual memory, you'll have to place a maximum value along with an initial. It is suggested that both values be equivalent in order to achieve the finest performance on your pc system.
0x800ccc79 error is an error message that you may come across when sending emails through Outlook Express from Microsoft. This error message is accompanied by a notification that is displayed as ‘email was not delivered’ or ‘the server doesn’t support SSL connection’.
Solution
Download Available to Recover all Lost Outlook data
Error Causes
This error code 0x900ccc79 is triggered due to the following causes:
Problems related to email servers
Changes in the configuration settings
Corrupted Windows Registry
Further Information and Manual Repair
When you receive the error 0x800ccc79 it may hamper your ability to send emails. Therefore it is advisable to fix it to ensure your emails are sent and received without any difficulty.
This Outlook error 0x800ccc79 is quite easy to repair. By following the quick fix 0x800ccc79 error code solutions given below you can resolve this error in just a couple of minutes.
Here’s what you need to do to fix this error right away:
Cause: Configuration issues
Solution: If the error occurs due to Outlook Express being configured to use the SSL protocol while sending and receiving emails via the web, then to resolve it, you need to allow Outlook Express to bypass the Secure Socket Layer settings.
To do so, click on ‘tools’ and then on ‘Accounts’. Now select the email account that you want to modify.
Now select the ‘Properties’ tab and then click on ‘Advanced Settings’.
Here search for the following text message ‘This server requires a secure connection’. Once you locate it, uncheck all the checkboxes given next to this option. After that save the changes and restart Outlook Express to see bring the changes into effect.
Cause: Missing or Corrupt Registry Entries
Solution: If the error 0x800ccc79 occurs due to missing or corrupt registry entries, then the best way to fix this error is to download and install a good registry cleaner on your PC.
The registry cleaner will help you clean your corrupt and damaged Windows registry entries and get rid of this error right away. It is suggested you download the registry cleaner tool from a reliable website to avoid any malware or virus downloads simultaneously.
Once you download the registry cleaner on your system, click on scan. The cleaner will scan your computer completely for registry errors and show you the results in a list form.
After the scanning is complete, click on repair to fix the errors.
So, next time, if you or anyone at your office comes across the Outlook Express error 0x800ccc79, you can try these solutions and fix the error immediately without waiting for the network personnel to come and resolve it.
Sometimes we need and want some apps that are not part of the official Amazon Appstore but having their Fire TV stick prevents us from installing anything that's not in their store, or does it?
You can quickly "jailbreak" given stick and unlock additional installations via different providers. Although the term jailbreaking is associated with illegal and hacker activities rest assured that in this case there is nothing illegal about this procedure and that you are entirely safe.
Jailbreaking process
In order to do this procedure firstly you will have to allow the installation of apps obtained from outside the Amazon Appstore. To do this open the settings menu on your Fire TV Stick and inside settings choose My Fire TV. On the My Fire TV page select Developer Options and inside select Apps From Unknown Sources. The prompt screen will open, choose Turn On to activate the option.
APK installation is enabled now and the next step is to download an app like Downloader that will allow you to get your favorite apps. Downloader is free to download manager fully available on the Amazon Appstore and with it, you can download any kind of file to your device including APKs.
Once installed open the Downloader app and type in the URL or search term in order to find your application of choice but please do get all of your APK from trusted sources in order to avoid exploits and getting malware.
In today's IT world, if you want a computer for typical day-to-day actions and gaming, there are 3 primary ways you can go. An Apple computer with its proprietary hardware and operating system or a typical machine with Windows or Linux operating system.
Each system has both advantages and disadvantages and picking the right one might be difficult for some users. From hardware differences to specific software and operating system, each system is aimed at a different type of work, and in this article, we will explore each one and help you in choosing the right one for you.
Apple ecosystem
Apple has managed to create a unique ecosystem of its own devices, from its iMac desktop computers to more professional MAC studio and power MAC and all the way to tablet iPad and iPhone are powered by Apple's own operating system that connects all of these devices into one large system. So if you really need one singular ecosystem this is a huge advantage.
The ecosystem on the side, MAC computer systems are great, some would argue best for coding, design, video work, and sound editing. MAC M2 chip is optimized for all of these tasks and a specially tailored operating system is just the icing on the cake. Specific Apple-made software like a logic pro or final cut also helps a lot to position MAC systems on top of the line.
Reading all of this you might think hey this is the computer for me, it does everything! Sadly the truth is not like that. The first thing that is difficult on MAC systems and a maybe big reason that it is not so adopted outside professional working environment is lack of games. If you are a gamer or plan on using MAC for gaming, well I have some bad news. The second big turn-off is that MAC systems tend to be more expensive than PC systems, yes components are of higher quality but rest assured that you will pay for also for branding.
Get MAC as your workstation for serious work and for good tech support, if you need a plain home computer keep reading.
Windows PC machine
There is no better feeling than assembling your own computer, tweaking hardware to make a monster and despite haters hating, Windows is the best all-around operating system on the market. It is supporting the largest variety of hardware and the largest variety of software.
The best platform for serious gaming and streaming Windows machine has cemented itself as a multimedia powerhouse. But, this kind of computer is not alien to being also a professional machine, you can practically do everything that you can do on Apple or Linux machine inside Windows, yes some things might require extra steps or will be slightly slower but in the end, being able to do anything is the greatest strength of Windows machine.
Of course, every system has its flaws and Windows is not immune to that. One of the biggest is being the operating system for every hardware ever made and every software as well while keeping legacy support for old software and hardware, basically, its biggest strength is in the same time its biggest weakness leading to sometimes stability issues. Also being able to place any kind of hardware can also lead to the same stability issues. Executing something a little slower than other systems and having some extra steps can also be looked upon as weaknesses.
Linux system
First and perhaps for some people, the biggest advantage of the Linux operating system is its price, it is completely free! Other advantages include the great server and networking included in the OS itself, the large amount of customization, and unmatched stability. The ability to write scripts inside the OS terminal is also a great thing and coding is much more streamlined and friendlier than on other machines.
The power of Linux is the ability to change anything, even on the system layer, no other operating system will let you change the basic functionality of the OS itself while Linux will let you do this. It is also the only operating system you can fully use by booting it up from a USB stick and having the same experience as it was installed on a local hard drive. Among other OS mentioned earlier, Linux is by far the lightest one, taking the smallest amount of memory among the three.
The bad side of the Linux machine is the steep learning curve, among the three mentioned operating systems rest assured Linux is the most difficult to learn and be comfortable in it. The operating system will require you to know the hardware and how computers work in order to fully use its potential. Other things that place it behind are not so wide hardware support compared to Windows and the somewhat confusing distro model.
Linux versions come in form of different distro packages and first-time users will face many of them being left in awe of which one to choose. Also installing drivers and software via a package system can also be a tedious task as well, often being that some version of the driver will not work on the newer version of the Linux distro.
Get a Linux machine if you are well versed in computer technology, if you want great customization of the OS itself or if you do not want to spend money on OS and software since almost entire Linux software is open source.
Ever gotten an e-mail offer that seemed just a little bit too good to be true? Might’ve been a phishing attempt! These are everywhere and can come in many different forms.
So what’s phishing exactly, how can you detect it and how can you keep safe?
What is phishing?
Phishing (pronounced like fishing) is a type of cyberattack that tricks the user into trusting the source and revealing sensitive information. Fishing being the perfect analogy, the bait is a legitimate-looking site, e-mail or file and when you take a bite, your identity, banking information and much more can be revealed and stolen.
Credit: Anne Nygård on Unsplash
Some phishing attempts are incredibly obvious, others are super elaborate. Like with most types of malware, cybercriminals have become extremely well-versed in phishing and anyone can fall for it. To help you recognize and avoid it, we’ll take you through a couple of phishing types and give you tips on what to do if faced with them.
Phishing techniques
E-mail phishing
This is actually the most common type of phishing. A cybercriminal creates an e-mail containing stuff like attractive offers, legitimate-looking attachments or links and makes it appear as though it’s coming from a trusted source.
Credit: Justin Morgan on Unsplash
For example, it looks like it’s coming from your bank or your favorite retailer. The logo looks legit and the structure of the e-mail seems familiar, so you might get tricked into clicking on whatever clickable content is in it.
Unfortunately this exposes your device to malware that hands your data off to the hacker, who can decide what to do with it further.
SMS and social media phishing
Like the above example, you could be approached with lucrative offers or links via text messages or social media messages. Typically, the messages seem relevant to the user as they will be made to look like they’re related to apps or services you’re using.
Voice phishing
Voice phishing attacks are schemes that appear as though they’re coming from a credible number. Normally, you’ll get a call about something related to credit cards or taxes to get you into a state of worry, leading you to disclose personal information on the phone.
Spear phishing, whaling and BEC
Spear phishing normally targets specific individuals within a company who are likely to have access to sensitive data. Spear phishers spend time collecting information they can use to reach out to the individual looking as trustworthy as possible. They’ll typically lead with something relevant, for example mentioning an upcoming company event, and make a seemingly legitimate request.
Whaling is a more elaborate form of spear phishing, which targets people in even stronger positions such as executives or high-value individuals. The ultimate goal is to get them to transfer financial or other sensitive information that can be used to compromise the entire business.
Credit: Azamat E on Unsplash
BEC, or Business e-mail compromise, is a specific spear phishing technique carried out via e-mail. While there are many ways this is done, most commonly you’ll see instances where the phisher poses as a CEO or similar executive, or as a lower-level employee in specific positions (e.g. sales managers or financial controllers).
In the first situation, the impersonator reaches out to employees requesting them to transfer certain files or pay invoices. In the second situation, the phisher takes control of the employee’s e-mail account and sends false instructions to other employees in order to obtain data and information from them.
What can you do?
There are many ways you can be aware and spot a phishing attempt. Here are some tips:
Always check the sender’s address in your e-mails, even when they seem to come from a familiar source.
In any instance where payment information is requested, be very, very careful.
If you are receiving attachments you never asked for and definitely didn’t expect, better not click on them.
Beware of content that transmits a sense of urgency (sales deals, urgent updates to login credentials, etc.).
Bad spelling and grammar are usually a telltale sign of phishing.
Links that look shortened (e.g. Bit.ly) or just suspicious in general - if you have a bad feeling, do not click on them.
If you are receiving threats, you probably shouldn’t be clicking on anything in that message.
Always examine first-time senders in detail.
Block suspicious e-mail addresses, numbers and social media accounts.
If you are receiving a coupon for free stuff… You aren’t.
If you’re being asked to update your payment details by a service you use, such as Netflix, chances are it’s an impersonator.
Those are some of the ways to identify and prevent phishing attacks. However, sometimes phishers disguise themselves a little too well or a misclick happens and there you go - you’ve been exposed to malware.
Credit: FLY:D on Unsplash
This won’t happen if you invest in powerful protection software from the get-go, though. A good antivirus program like Bitdefender will keep you safe from becoming a victim of phishing scams. In fact, it will protect you from malicious attacks overall.
Be it your household or your business you’re concerned about, there are a bunch of different packages and options available, providing different kinds of cybersecurity services. That’s the only way you can ever really be sure you aren’t at risk of a digital attack.
Summary
Have you ever been targeted by phishers and didn’t know that’s what it was until you read this article? Many can relate. Protect yourself before it’s too late!
BIOS is software that is running in a chip located on your motherboard, you can enter BIOS usually by hitting DEL once the computer is turned ON but this sometimes varies and it depends solely on the motherboard manufacturer. Inside BIOS you can configure your computer components and set up some other important things including passwords for BIOS itself or for the entire system.
Password itself is meant to protect access to BIOS from other non-technical users or to prevent access to the system from other people if for example computer is in one household and you would like to be the only one having access to it. However, passwords can be forgotten, and sometimes you can even purchase a second-hand computer with a password on it.
In this guide, we will lead you through ways on how to remove your BIOS password so you can regain access to your BIOS settings.
Use Manufacturers master password
Most motherboard manufacturers have built-in a couple of master passwords for BIOS access. If your motherboard has one you can easily find it on the manufacturer's website. Use the master password and remove other passwords inside BIOS, save and exit.
Remove CMOS battery
If you could not find the manufacturer's master password or your motherboard model does not have one remove the CMOS battery to reset BIOS. Note that this method will reset the whole BIOS not only the password. Open on side of your computer casing and locate the round battery on it, do not worry, there is only one battery so you can not make mistake. Remove the battery and leave it outside for around 20 to 30 minutes then place it back as it was, CMOS is reset now and you can access BIOS.
Reset BIOS via jumper
If you want to remove only the password and do not touch other BIOS setting you can locate the BIOS password reset jumper. How the location of this jumper and position is different from the motherboard to motherboard we can not cover them all here and it is advisable to read the manual or find information on the official manufacturer's website.
If you would like to read more helpful articles and tips about various software and hardware visit errortools.com daily.
As you know, a Virtual Private Network or VPN is used to access a particular network from another network which is why it is also referred to as a mini-internet. Moreover, you can use it in two ways. One, you can use it to get you access to a closed server which means that you would not be getting access to the internet. Second, you can also use it to access a set of resources while at the same time get access to the internet. However, what if you want to access your resources at home even when you’re away? And what if you want to use the private server at home or at your office even when you’re away? This is where the callout for a VPN server for yourself comes in. And so in this post, you will be guided in how you can create a public VPN server on your Windows 10 computer. Follow each one of the given steps below to get started.
Step 1: Find your IP address.
This step is rather simple since all you have to do is open Control Panel > Network and Internet > Network and Sharing Center. From there, click on “Local Area Connection” and then click on Details where you’ll see your IP address next to “Autoconfiguration IPv4 Address”.
Step 2: Next, set up port forwarding on your router.
In this step, you will have to configure port forwarding in your router so that you would be able to connect to the VPN server through a public network like the internet.
Log in to the Admin Panel of your router. You have to do this since your router will be the gateway for your access to the network.
After you’re logged in, look for the “Port Forwarding” or “Applications and Gaming” or “NAT/QoS” menu tab and other similar names.
Now you need to set the port number to 1723 for connections based on Point to Point Tunneling Protocol.
Then save the configuration and reboot your router.
Step 3: Set up a VPN server on Windows 10.
In the Cortana search box, type “ncpa.cpl” and click on the related entry from the search results.
After that, tap the Alt + F keys to bring down the File Menu and then select New Incoming Connection which will open a mini window where you can allow the user accounts on the particular machine to access the VPN connection.
On the other hand, you can also click the “Add someone” button so that you can add someone else to the whitelist that can access the connection.
Now click on Next and you’ll see an option to select how people will connect to the network. Check the checkbox for the “Through the Internet” option.
After that, you will see a page where you have to configure the network. Just select IPv4 and then click on Properties.
From there, you will be asked to continue some additional settings like letting users access your Local Area Network or how IP addresses will be allocated to these users. Click on OK to save the changes you’ve made.
Click on Allow Access after you configure the network. And if you want to, you have the option to print this information for future reference or for the client machine.
Now click on Close to exit the configuration process.
Step 4:Allow the VPN Connections through the firewall
In this step, you will have to allow the VPN connections through the firewall.
In the Cortana search box, type “Allow an app through Windows Firewall” and click on the related search result to open the intended Windows Firewall settings.
Next, click on Change Settings.
Then scroll down to check if Routing and Remote Access is Enabled for both the Public and Private networks and click on OK.
Step 5: Set up a VPN connection on Windows 10
Now all that’s left for you to do is to set up a VPN connection on Windows 10.
Go to Settings > Network and Internet.
From the list of options given, click on VPN located on the left pane to see the related settings.
After that, click on the “+” icon to add a VPN connection.
Next, select Windows Default under VPN Provider and under the Connection Name, input your VPN’s name, and then enter the IP address you got from the VPN service provider under the Server name or address section.
Now select PPTP under VPN type since it is the most commonly used protocol for VPNs.