Logo

What to do if Google Drive Unable to Connect

As you know, the Google Drive service is a Backup and Synchronization service provided by Google. It was launched way back in April 2012 which provides users with the options to synchronize, store and share files by uploading them to Google’s servers where they stay until they are deleted personally by the users and can be accessed anywhere using the Google Account that’s used to upload them.

Recently, a lot of users reported that they were unable to connect to Google Drive from their Windows 10 computers. This kind of problem has been noticed in the middle of the upload process and can be seen at times after the app launches. If you also experience the same issue, then you’ve come to the right place as this post will guide you in fixing it.

There are a lot of possible reasons why this kind of problem occurs. It could be that the app was not able to launch properly or the internet got disconnected when the app was about to launch. It is also possible that the Firewall has blocked the app from connecting to the internet or that the antivirus program is preventing the app from making contact with its database. Aside from that, it is possible that the account you are using on your computer is preventing Google Drive from connecting to the internet due to some configuration errors.

Follow the suggestions provided below to fix the connection issue with Google Drive.

Option 1 – Configure the Firewall

As mentioned, the Windows Firewall might be blocking the app from contacting its database so, in this option, you have to allow Google Drive through the Firewall. To do so, follow these steps:

  • In the Windows Start Search, type “firewall” and click on the “Allow an app or feature through Windows Firewall” option from the search results.
  • After that, you will see a list of apps, and here, click on the “Change Settings” button.
  • Next, scroll down and make sure to check both the “Public” and “Private” options for Google Drive.
  • Now click on Ok to save the changes made and then try to launch Google Drive again.

Option 2 – Try to launch Google Drive again

Google Drive might have not launched properly that’s why it can’t connect to its servers so you can try to launch it again and see if it helps.

  • Tap the Ctrl + Shift + Esc keys to open the Task Manager.
  • Next, go to the Processes tab and click on the “View” option located at the top.
  • After that, uncheck the “Group by Type” option and click on the “Google Drive Sync” from the list of processes.
  • Then click on the “End Task” option and close the Task Manager.
  • Launch Google Drive again and see if the issue is now resolved.

Option 3 – Temporarily disable third-party antivirus

Aside from Firewall, antivirus programs, especially the third party ones, are also known to block files applications the instant it detects a threat to the system. Thus, your antivirus program might be the reason why you can’t download anything on your Windows 10 computer. To fix this, you can try to disable the antivirus program on your computer in the meantime and then try to launch Google Drive again. Do not forget to enable them again as disabling them can leave your computer vulnerable to cyber threats.

Option 4 – Try to create a new account

There are times when a certain configuration for a user account might be blocking some elements of the Google Drive app. In such cases, you can try to create a new account to fix the problem.

  • Click on the Windows key and then click on the icon for Settings.
  • From there, click on the Accounts button and select the “Family & Other People” option from the left pane.
  • Next, click the “Add someone else to this PC” option.
  • After that, click on the “I don’t have this person’s sign-in information” option and select the “Add a user without a Microsoft Account” setting.
  • Type in the credentials for the new account you are creating and click on Next.
  • After the account is created, click on the account and then select the “Change account type” option.
  • Click on the drop-down menu and select the “Administrator” option and then click on OK.
  • Now sign out of the current account and sign in to the new one and then open Google Drive again.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Computer gets stuck on Preparing to configure
If you suddenly find your Windows 10 computer stuck on the “Preparing to configure” screen for quite a long time now after you run Windows Update, read on as you will be guided on how you can fix that issue in this post. During an update process, there’s a lot of things that go on in the background which is why Windows Updates take quite a while before it finishes. It can be at 25%, 50%, or even 100% but the only message you’re going to see on your screen is the “Preparing to configure Windows, Don’t turn off your computer”. However, if you notice that the Windows Update is taking a longer time than it’s supposed to, the first option is to wait some more but if it’s still the same, then there’s definitely something wrong. This kind of issue occurs when Windows Update fails to configure in short correctly download and install the update. When this happens, it will revert all the changes which are why you were advised to wait for a couple of hours. There are two possibilities why your computer is stuck on the “Preparing to configure Windows, Don’t turn off your computer” screen. The first one is that the Windows 10 operating system is installing any updates. The second one is when the user profile takes time to load or encounters an error. There are several options you can try to fix the problem. You can try running System Restore or boot your computer in Safe Mode or repair the corrupted profile via Registry Editor. You might also want to try using installation media to boot and repair your computer if the other options didn’t work.

Option 1 – Perform System Restore

  • Tap the Win + R keys to open the Run dialog box.
  • After that, type in “sysdm.cpl” in the field and tap Enter.
  • Next, go to the System Protection tab then click the System Restore button. This will open a new window where you have to select your preferred System Restore point.
  • After that, follow the on-screen instructions to finish the process and then restart your computer and check if the problem is fixed or not.
Note: If you can’t boot into the desktop of your computer, you can run System Restore in the Advanced Startup Options by following these steps:
  • Boot your computer into the Advanced Startup Options screen.
  • From there, you will see some options to troubleshoot when you can’t log in to Windows in the usual way.
  • Now select Troubleshoot > Advanced Options > Command Prompt.
  • After that, type “rstrui” and hit Enter to execute the command which will start the System Restore process.
  • Once it’s done, restart your computer.

Option 2 – Boot your computer in Safe Mode

You can try to tap the F8 key if you have it enabled in your Windows 10 computer, as you start your system to boot into Safe Mode. Once your computer is in Safe Mode, you can access the Start Menu and the Mouse and Keyboard. Aside from that, you can also access your files and other built-in tools in Windows such as Command Prompt, PowerShell, Computer Manager, Device Manager, Event Log Viewer, and many more. On the other hand, if you haven’t enabled the F8 key, you can just go to the Advanced Startup options to boot your computer into Safe Mode. Once you’re there, select Troubleshoot > Advanced Options > Startup Settings > Restart > Tap the number 4 key. After that, your computer will restart in Safe Mode. If you want to reboot into Safe Mode with Networking instead, you can tap the number 5 key and for Safe Mode with Command Prompt, tap the number 6 key. Once your computer is in Safe Mode, you can use any of the built-in tools to restore your computer or troubleshoot the problem that’s causing your computer to get stuck at the “Preparing to configure” screen.

Option 3 – Try to repair your corrupted profile via Registry

In this third option, you can try to repair the corrupted profile using the Registry but before you proceed, take note that you can only try this if you can boot into your desktop and if you can, make sure to create a System Restore Point and then follow the steps below.
  • Tap the Win + R keys to open the Run dialog box.
  • Then type “Regedit” in the field and hit Enter or click OK to open the Registry Editor.
  • Next, go to this registry key: ComputerHKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionProfileList
  • Once you’ve opened the registry key, you should see a list of all the user profiles on your computer. Now click on each S-1-5 folder and look for the “ProfileImagePath” entry and double click on it to check which user account it is related to. You will see a path like “CUsersACK” where “ACK” is the username.
  • You should know which of the user account is corrupted. Just look for a key named “RefCount” and change its Value data to “0” and click OK. And if it isn’t available, simply right-click on the right pane and create it.
  • After that, double click on the key named “State” and make sure that the Value data is “0” and click OK.
  • Exit the Registry Editor and restart your computer to apply the changes made.

Option 4 – Try to use installation media to boot and repair your computer

Another thing you can try to resolve the issue is to use the Windows installation bootable media so you can boot and repair the operating system. To use it, follow these steps:
  • You need to first create an installation media which has the dame version of the operating system installed in your computer.
  • After that, once you reach the Install Windows screen, click on the “Repair your computer” link.
  • Wait until the repair is completed and then shut down your computer
  • Now once your computer has restarted, check if it can now boot properly.
Read More
How to fix the Javaw.exe Error Code

Javaw exe - What is it?

Javaw.exe is a type of executable file or a process used by Sun Microsystems. It is in charge of executing programs created with Java on Windows PC. It is a part of the Oracle Java Runtime Environment. The javaw exe error hampers your ability to run programs supported by Java. Common Javaw.exe error messages include:
  • "Javaw.exe Application Error."
  • "Javaw.exe is not a valid Win32 application."
  • “Cannot find javaw.exe.""Javaw.exe not found."
  • "Error starting program: javaw.exe."
  • "Javaw.exe is not running.""Javaw.exe failed."
  • "Javaw.exe has encountered a problem and needs to close. We are sorry for the inconvenience."

Solution

Restoro box imageError Causes

There can be many reasons for javaw.exe error code on your PC such as:
  • Viral infection
  • Malware attack
  • Invalid registry entries
Ignoring such error messages is not wise. You must resolve it right away as such errors can lead to serious PC threats like system failure and data security threats.

Further Information and Manual Repair

Scan the Javaw.Exe File For Malware

To fix Java Exe error on your system, first you need to find out the cause of the error. Is it triggered by malware or invalid registry entries? The best way to identify the cause is to check your system’s CPU usage. This can be done through assessing the Task Manager by pressing Ctrl+Alt+Del all at the same time. After that, click ‘Processes and locate the javaw.exe file. Remember this file does not require too much memory, so abnormal memory usage is a surefire sign that the java.exe file on your system is a virus. To resolve it, download an antivirus and run it to scan and remove viruses from your PC. However, running an antivirus may slow down your PC performance. On the other hand, if you find the memory usage is fine, then this means the error is not caused by malware but it occurred either due to old version system files on your PC or registry corruption.

Update the Javaw.Exe File

To remove the old version files, go to the start menu. Click Control Panel and then Add/Remove programs. Here find the Java program and uninstall it. Now after the program is completely uninstalled, go to Java’s official website and download the latest version of your desired program. Restart your PC after the installation is successfully complete.

Clean & Repair Registry

If the problem still persists, then the javaw exe error is mostly likely triggered due to registry corruption. The best way to resolve it is to clean and restore the registry. You can do it manually but you may find the manual procedure slightly time-consuming and complex especially you are not a computer programmer. Therefore we recommend you download Restoro.

Why Restoro?

Whether the javaw exe error occurs due to viral infection, invalid entries, or registry corruption, Restoro takes care of all. This is a new, cutting edge, and multi functional PC fixer deployed with multiple performance-boosting and system repair utilities including a powerful registry cleaner, an antivirus, a system optimizer, and Active X controls, and a Class ID detector. The registry cleaning utility wipes out all the unnecessary files, clearing up the cluttered disk. It cleans the registry and restores it. Simultaneously, the antivirus feature detects and scans all malicious software infecting your PC and removes them right away. The system optimizer module boosts the speed of your system and ensures your PC performs at its optimum pace. This is a safe, efficient, and bug-free tool. It has a user-friendly interface and easy navigation. Furthermore, it is compatible with all Windows versions. Click here to download Restoro and resolve Javaw exe error on your PC today!
Read More
A Quick Guide to Fixing Error C00D1199

What is Error C00D1199?

This is a typical Windows Media Player error code. Developed by Microsoft, Window Media Player is a media player and media library application that is used for playing audios and videos on the computer. Error C00D1199 appears when Windows Media Player is unable to play the file requested by you. The error code is displayed in the following format:
C00D1199: Cannot play the file

Solution

Restoro box imageError Causes

You might encounter an error C00D1199 message on your PC for one of the following reasons:
  • The file type you requested is not supported by the Windows Media Player
  • The file type was not compressed by using a codec that is not supported by the Player
  • Your sound card or controller is not configured properly or outdated
  • Registry corruption
The good news is that error C00D1199 is not fatal. But if this error code is generated due to registry problems, then it can lead to serious issues. Therefore it is advisable to fix it immediately.

Further Information and Manual Repair

Here are some of the best and easy do-it-yourself methods to resolve the error C00D1199 right away.

Method 1 - Ensure File Type is Supported by Windows Media Player.

If it is supported then make sure the codec used to compress the file is installed on your system. There are hundreds of audio and video Codecs in use today but the most popular Codecs used on Windows Media Player are Windows Media Audio, Windows Media Video, and MP3. If these Codecs are not installed on your PC, then it is advisable to download them from the web. But make sure you download these codecs from a reliable and a trusted website.

Method 2 - Check Sound Card Settings

Another method to resolve error C00D1199 is to check Sound card settings. Make sure it is configured properly. Improper configuration can also trigger the error. Nonetheless, if it is configured the right way but the error still persists then it is advisable to change update the driver. To do this, go to the Device Manager. Here use the Driver update wizard to make updates.

Method 3 - Check the Windows Registry

The registry is an important part of the PC. It stores all the activities performed on the PC and all files including both junk and important files. If unnecessary files like junk files, cookies, and bad registry entries are not removed frequently from the registry, it can corrupt and damage it and generate error codes like C00D1199. To clean the registry and resolve the error it is advisable to download Restoro. This is a user-friendly PC Fixer embedded with a registry cleaner. The registry cleaner wipes away all the clutter from the registry and cleans it instantly. It also repairs the damaged files and restores the registry. Click here to download Restoro and resolve error C00D1199 on your PC.
Read More
10 Worst Computer Viruses in history
Computers viruses, worms, ransomware, etc. are kinds of malicious software that no user should take lightly. On several occasions, we have touched upon security steps that each user should take in order to protect its identity and data. Sadly sometimes even when all precautions are taken some malware can still slip through and wreak havoc. Today we are looking at some of the worst or the best, depending on your view that has indeed wreaked plenty of havoc.

viruses10 worst computer viruses in history

In the list of the 10 most famous computer viruses below, we show the costs, dates, reach, and other key facts. First a note about terms: we use the words “virus” and “worm” interchangeably because most readers search for them that way. But there’s a subtle difference that we explain after the list.

1. Mydoom – $38 billion

The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent. Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server. Mydoom is still around today, generating 1% of all phishing emails. That’s no small feat considering the 3.4 billion phishing emails sent each day. By that figure, Mydoom has taken on a life of its own, infecting enough poorly-protected machines to send 1.2 billion copies of itself per year, 16 years after its creation. Though a $250,000 reward was offered, the developer of this dangerous computer worm was never caught. Wondering what makes the world’s most secure computers so safe? See the Tech@Work guide: Upgrade to the World's Most Secure and Manageable PC

2. Sobig – $30 billion

The 2003 Sobig computer virus is actually another worm. It is second only to the Mydoom virus in its scope. The $30 billion figure is a worldwide total, including Canada, the U.K., the U.S., mainland Europe, and Asia. Several versions of the worm were released in quick succession, named Sobig.A through Sobig.F, with Sobig.F being the most damaging. This cybercriminal program masqueraded as legitimate computer software attached to emails. It disrupted ticketing at Air Canada and interfered with countless other businesses. Despite its widespread damage, the creator of the successful bug was never caught.

3. Klez – $19.8 billion

Klez is a close third on the list of the worst computer viruses ever created. With nearly $20 billion in estimated damages, it infected about 7.2% of all computers in 2001, or 7 million PCs. The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses. As with other viruses and worms, Klez was released in several variants. It infected files, copied itself, and spread throughout each victim’s network. It hung around for years, with each version more destructive than the last. Windows has come a long way since most of the computer viruses on this list hit the web. Thankfully, built-in protection with Microsoft Defender is always on the watch.

4. ILOVEYOU – $15 billion

The year 2000’s ILOVEYOU virus worked by sending a bogus “love letter” that looked like a harmless text file. Like Mydoom, this attacker sent copies of itself to every email address in the infected machine’s contact list. Shortly after its May 4 release, it had spread to more than 10 million PCs. The virus was created by a college student in the Philippines named Onel de Guzman. Lacking funds, he wrote the virus to steal passwords so he could log into online services he wanted to use for free. He reportedly had no idea how far his creation would spread. This virus is also known as Loveletter. Need to up your remote work security game before there’s another entry on the list of most deadly computer viruses? See our guide: How to Work Remotely and Securely

5. WannaCry – $4 billion

The 2017 WannaCry computer virus is ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. The WannaCry ransomware ripped through computers in 150 countries, causing massive productivity losses as businesses, hospitals, and government organizations that didn’t pay were forced to rebuild systems from scratch. The malware raged like wildfire through 200,000 computers worldwide. It stopped when a 22-year-old security researcher in the U.K. found a way to turn it off. Computers with out-of-date operating systems were hit especially hard. That’s why security experts always recommend updating your systems frequently.

Ransomware strikes again

In September 2020, one of the potentially largest computer virus attacks in medical history hit Universal Health Services. The U.S. hospital chain, which has more than 400 locations, was reportedly struck by damaging ransomware. The attack forced the cancellation of surgeries and made healthcare workers switch to paper records.

6. Zeus – $3 billion

The Zeus computer virus is an online theft tool that hit the web in 2007. A whitepaper by Unisys three years later estimated that it was behind 44% of all banking malware attacks. By then, it had breached 88% of all Fortune 500 companies, 2,500 organizations total, and 76,000 computers in 196 countries. The Zeus botnet was a group of programs that worked together to take over machines for a remote “bot master.” It originated in Eastern Europe and was used to transfer money to secret bank accounts. More than 100 members of the crime ring behind the virus, mostly in the U.S., were arrested in 2010. It’s not as prominent today, but some of the virus’ source code lives on in newer botnet viruses and worms. Zeus caused documented damage of $100 million. But the real cost in terms of lost productivity, removal, and undocumented theft is undoubtedly much higher. A $3 billion estimate, adjusted for inflation, puts this virus at a cost of $3.7 billion in today’s dollars.

7. Code Red – $2.4 billion

First observed in 2001, the Code Red computer virus was yet another worm that penetrated 975,000 hosts. It displayed the words “Hacked by Chinese!” across infected web pages, and it ran entirely in each machine’s memory. In most cases it left no trace in hard drives or other storage. Financial costs are pegged at $2.4 billion. The virus attacked websites of infected computers and delivered a distributed denial of service (DDoS) attack on the U.S. White House’s website, www.whitehouse.gov. In fact, the White House had to change its IP address to defend against Cod Red. Can your printer get a virus? See our cool infographic: The State of Printer Security

8. Slammer – $1.2 billion

The SQL Slammer worm cost an estimated $750 million across 200,000 computer users in 2003. This computer virus randomly selected IP addresses, exploiting vulnerabilities and sending itself on to other machines. It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic. The Slammer worm hit banks in the U.S. and Canada especially hard, taking ATMs offline in many locations. Customers of Toronto’s Imperial Bank of Commerce found themselves unable to access funds. The attack reared its ugly head again in 2016, launching from IP addresses in Ukraine, China, and Mexico.

9. CryptoLocker – $665 million

Thankfully, ransomware attacks like the 2013 CryptoLocker virus have dipped since their 2017 peak. This malware attacked upwards of 250,000 machines by encrypting their files. It displayed a red ransom note informing users that “your important files encryption produced on this computer.” A payment window accompanied the note. The virus’ creators used a worm called the Gameover Zeus botnet to make and send copies of the CryptoLocker virus. According to a report by security firm Sophos, the average ransomware attack costs a business $133,000. If we estimate that CryptoLocker hit 5,000 companies, that would put its total cost at $665 million. Where will cybersecurity go next? See our guide: The Future of Cybersecurity

10. Sasser – $500 million

The Sasser worm was written by a 17-year-old German computer science student named Sven Jaschan. He was arrested at the age of 18 in 2004 after a $250,000 bounty was posted for the computer virus’ creator. A friend of Jaschan’s tipped authorities that the youth had penned not only the Sasser worm but also the damaging Netsky.AC attack. Jaschan was given a suspended sentence after it was found he was a minor when he wrote the malware. The Sasser worm crashed millions of PCs, and though some reports put damages at $18 billion, the relatively low infection rate suggests a more likely cost of $500 million. Other notable viruses The top 10 worst computer viruses above are just the ugly tip of a gargantuan digital iceberg. With a million new malware programs popping up every 3 years, we may miss the forest for a few outstanding trees. Here are just a few more viruses that have wreaked havoc over the years: Mimail: This worm tried to harvest data from infected machines to launch a string of DDoS attacks, but was relatively easy to remove. Yaha: Yet another worm with several variants, thought to be the result of a cyber-war between Pakistan and India. Swen: Written in C++, the Swen computer worm disguised itself to look like a 2003 OS update. Its financial cost has been pegged at $10.4 billion, but not reliably. Storm Worm: This worm showed up in 2007 and attacked millions of computers with an email about approaching bad weather. Tanatos/Bugbear: A 2002 keylogger virus that targeted financial institutions and spread to 150 countries. Sircam: A computer worm from 2001 that used counterfeit emails with the subject line, “I send you this file in order to have your advice.” Explorezip: This worm used fake emails to spread to every machine on thousands of local networks. Melissa: The most dangerous computer virus in 1999, Melissa sent copies of itself that looked like NSFW pics. The U.S. FBI estimated cleanup and repair costs at $80 million. Flashback: A Mac-only virus, Flashback infected over 600,000 Macs in 2012 and even infected Apple’s home base in Cupertino, Calif. In 2020, there’s now more malware on Macs than on PCs. Conficker: This 2009 virus still infects many legacy systems and could do significant damage if it ever activates. Stuxnet: This worm is reported to have destroyed Iranian nuclear centrifuges by sending damaging instructions.
Read More
Enable or Disable Automatic Encryption
You might be familiar with the Encryption File System or EFS algorithm if you rather keep your files and folders encrypted. Encryption File System is a built-in feature in Windows 10 which allows users to secure their important files. Although there is an alternative way for you to secure your data on your Windows 10 computer, you can’t ignore the fact that the main advantage of an Encryption File System over BitLocker is that the former can help you encrypt a particular folder rather than encrypting the whole hard drive partition. If you move a file inside a folder encrypted with the Encrypting File System it will automatically get encrypted. There are some users who like this feature but unsurprisingly, there are some that don’t. So if whether you want your files encrypted when you place them in an encrypted folder or if you want to keep it as it is, read on as to how you can do it either way. You can enable or disable automatic encryption of files moved to encrypted folders in Windows 10 using the Registry Editor or the Group Policy Editor. Before you proceed, make sure to create a System Restore Point first because the modifications you’re about to make in your computer might affect its overall functioning so if anything goes wrong, you can always undo the changes. Once you have that covered, refer to the options given below to enable or disable automatic encryption in Windows 10.

Option 1 – Enable or disable automatic encryption using Registry Editor

  • Press the Win key + R key at the same time to open the Run dialog box.
  • Then type “Regedit” in the field and press Enter to open the Registry Editor and if a User Account Control or UAC prompt appears, just click Yes to proceed.
  • After opening the Registry Editor, navigate to this key location: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorer
  • Next, right-click on Explorer and select New > DWORD (32-bit) Value and then name the newly create DWORD to “NoEncryptOnMove” and press Enter to save it.
  • After that, double click on the NoEncryptOnMove DWORD and set its value to the following preferences:
    • 1 – Disable Auto Encryption of files moved to encrypted folders.
    • 0 – Enable Auto Encryption of files moved to encrypted folders.
  • Now close the Registry Editor and restart your computer to successfully apply the changes made.

Option 2 – Enable or disable automatic encryption using the Group Policy Editor

  • Press the Win + R keys to open the Run box and type “gpedit.msc” in the field and press Enter to open the Group Policy Editor.
  • After that, navigate to this path: Computer ConfigurationAdministrative TemplatesSystem
  • Next, look for the “Do not automatically encrypt files moved to encrypted folders” option and double click on it to set the policy. From there, you will see the following description:
“This policy setting prevents File Explorer from encrypting files that are moved to an encrypted folder. If you enable this policy setting, File Explorer will not automatically encrypt files that are moved to an encrypted folder. If you disable or do not configure this policy setting, File Explorer automatically encrypts files that are moved to an encrypted folder. This setting applies only to files moved within a volume. When files are moved to other volumes, or if you create a new file in an encrypted folder, File Explorer encrypts those files automatically.”
  • Now select one of the radio buttons below depending on your preference:
    • Not Configured or Disabled: Enable Auto Encrypt of files moved to EFS Encrypted folders.
    • Enabled: Disable Auto Encrypt of files moved to EFS Encrypted folders.
  • Then click on the Apply and OK buttons to save the changes made.
  • Exit the Group Policy Editor and restart your computer.
Read More
Configure Windows 10 to create Dump Files on Blue Screen of Death
If your Windows PC encounters an error, it will display a Blue Screen of Death or BSOD error which usually comes up for a fraction of second and creates some logs or Dumps Files as what other user prefers to call it and then boots your PC suddenly. This process usually takes place quickly that most users find it hard to get the error code and won’t probably be able to check what really went wrong with their PCs. This is where the dump files come in. They are stored internally in your computer and can only be accessed by an administrator. They are classified into 4 main types and in Windows 10 they are either:
  1. Complete Memory Dump
  2. Kernel Memory Dump
  3. Small Memory Dump (256 KB)
  4. Active Memory Dumps
Dump Files are useful as they could help you in resolving the problem and so you need to configure your Windows 10 PC to create them but first, you need to make a system restore point. This is essential as you are about to modify some system files as well as critical Windows 10 settings. There are two ways you can create Dump files – first is by modifying the settings in the Startup and Recovery and lastly is via the WMIC command line. Refer to the instructions prepared below to be guided on how you can create Dump files after any BSOD error using these options.

Option 1 – via Startup and Recovery

  • Type in “control panel” in the Cortana Search box and then click on Control Panel from the search results to open it.
  • After opening Control Panel, you need to make sure that you view the contents by their Category then click on the header link which is labeled “System and Security” or you could also right-click on the This PC icon and then click on Properties.
  • Next, select the Advanced system settings from the left panel. Once you do, a new and small window will pop up.
  • Under the newly opened window, look for the section called Startup and Recovery and then click on the Settings button.
  • And from the System Failure section, you can choose any option from the drop-down for Write debugging information such as:
    • None – this means that there is no dump file created by Windows
    • Small Memory Dump – this means that Windows will create a Minidump file on BSOD
    • Complete Memory Dump – this means that Windows will create a Complete Memory Dump file on BSOD
    • Automatic Memory Dump – this means that Windows will create an Automatic Memory Dump file on BSOD
    • Active Memory Dump – this means that Windows will create an Active Memory Dump file on BSOD
Note: The complete dump needs a page file that is allowed to be the size of the physical memory installed in your PC with a dedicated 1 MB of space for just the page header.
  • Now once you have selected the most suitable option for you, just click on OK/Apply and then exit.
  • Restart your PC to successfully apply the changes made.

Option 2 – via the WMIC command line

  • The first thing you need to do to create Dump files via the WMIC command line is to tap the Win + X keys combination or simply right-click on the Start button and then select the Command Prompt (Admin) option. You could also type in “cmd” in the Cortana search box and then right-click on Command Prompt from the results and select Run as administrator.
  • After that, type in any of the commands given below depending on your preferences so that your Windows 10 PC will be configured to create Dump Files:
    • No dump file: wmic RECOVEROS set DebugInfoType = 0
    • Small Memory Dump: wmic RECOVEROS set DebugInfoType = 3
    • Kernel Memory Dump: wmic RECOVEROS set DebugInfoType = 2
    • Complete Memory Dump: wmic RECOVEROS set DebugInfoType = 1
    • Automatic Memory Dump: wmic RECOVEROS set DebugInfoType = 7
    • Active Memory Dump: wmic RECOVEROS set DebugInfoType = 1
Note: A complete dump has to have a Page file which is allowed to be the size of the physical memory installed on your PC accompanied by a 1 MB space for just the page header.
  • Now type in “exit” in the Command Prompt to exit it.
  • Restart your PC to apply the changes made successfully.
Read More
Motitags Browser Hijacker Removal Guide

The Motitags toolbar browser add-on was created by Mindspark Inc. and is compatible with Internet Explorer and Mozilla Firefox. It claims to enhance users’ Internet browsing experience by enabling smileys within popular email clients such as Gmail, Yahoo!, AOL, and Outlook Live. While such added functionality may seem useful, Internet users should be aware that this browser plugin is categorized as a Browser Hijacker due to its behavior.

When installed this extension changes your default search engine, the home page, and new tab to MyWay.com, and while installed it gathers user browsing data and sends it back to Mindspark servers. This data is later used to inject additional unwanted ads into the user’s browser search results.

About Browser Hijackers

Browser hijacking is actually a type of unwanted software program, often a web browser add-on or extension, which then causes modifications in the web browser’s settings. Browser hijacker malware is developed for a number of reasons. These are generally used to force hits to a specific website, manipulating web traffic to generate ad revenue. It could seem harmless, but the majority of these websites aren’t legitimate and could pose a serious threat to your online safety. In a much worst case, your internet browser could be hi-jacked to open up your computer to a host of additional computer infections.

How one can identify a browser hijack

There are several signs of browser hijacking. Here are a few of them: the home page of your browser is changed unexpectedly; you get re-directed to websites you never intended to visit; the essential web browser settings are altered and unwanted or unsafe resources are added to the trusted websites list; discover new toolbars that you didn’t add; endless pop-up adverts show up and/or your web browser popup blocker is disabled; your browser gets sluggish, buggy, crashes frequently; you can’t navigate to certain internet pages, for example, security software related websites.

So how does a browser hijacker infect a computer?

Browser hijackers infect computers via malicious email attachments, downloaded infected files, or by going to infected sites. Many internet browser hijackings come from add-on software, i.e., toolbars, browser helper objects (BHO), or plug-ins added to browsers to provide them extra capabilities. Browser hijackers sneak into your pc in addition to free software application downloads that you unwittingly install along with the original. An example of some infamous browser hijacker includes Babylon, Anyprotect, Conduit, SweetPage, DefaultTab, RocketTab, and Delta Search, but the names are often changing. Browser hijacking can bring about severe privacy problems and also identity theft, affect your browsing experience by taking control over outgoing traffic, drastically slows down your PC by consuming lots of resources, and result in system instability also.

Getting rid of browser hijackers

Some browser hijacking could be easily stopped by discovering and eliminating the corresponding malware program through your control panel. But, most browser hijackers are difficult to eliminate manually. No matter how much you try to eliminate it, it can return over and over. Rookie PC users should not try for the manual form of removal, since it needs thorough computer knowledge to perform fixes on the system registry and HOSTS file. Professionals always recommend users to remove any malware including browser hijacker with an automatic removal tool, which is easier, safer, and quicker than the manual removal technique. Safebytes Anti-Malware has a state-of-the-art anti-malware engine that will help you stop browser hijacking in the first place, and clean up any existing issues.

What To Do If You Cannot Download Safebytes Anti-Malware?

Malware could potentially cause all sorts of damage once they invade your computer, starting from stealing your private details to erasing data files on your computer system. Some malware sits in between your computer and your internet connection and blocks some or all sites that you would like to visit. It might also prevent you from installing anything on your PC, particularly anti-virus programs. If you’re reading this, you probably have infected by malware that prevents you from downloading a computer security program such as Safebytes Antimalware on your PC. There are a few options you could try to get around with this particular obstacle.

Install in Safe Mode

If the malware is set to load automatically when Windows starts, entering Safe Mode could block this attempt. Only minimal required programs and services are loaded whenever you start your personal computer in Safe Mode. To start your Windows XP, Vista, or 7 computers in Safe Mode with Networking, please do as instructed below. 1) At power on/start-up, press the F8 key in 1-second intervals. This would conjure up the Advanced Boot Options menu. 2) Choose Safe Mode with Networking with arrow keys and press Enter. 3) When you are into this mode, you will have online access again. Now, get the virus removal application you want by using the web browser. To install the program, follow the directions within the setup wizard. 4) Right after the software is installed, allow the scan run to eliminate viruses and other threats automatically.

Use an alternate web browser to download security software

Malicious code could exploit vulnerabilities on a particular internet browser and block access to all anti-virus software sites. The most effective way to avoid this issue is to choose a web browser that is renowned for its security features. Firefox contains built-in Malware and Phishing Protection to keep you safe online.

Install security software on a USB drive

To effectively eliminate the malware, you need to approach the problem of installing an anti-virus software program on the infected PC from a different angle. Follow these steps to run the antivirus on the affected computer. 1) Download Safebytes Anti-Malware or Microsoft Windows Defender Offline onto a virus-free computer system. 2) Plug the pen drive into the uninfected computer. 3) Double click on the downloaded file to open the installation wizard. 4) Choose the USB stick as the destination for saving the software file. Follow the instructions on the screen to finish up the installation process. 5) Disconnect the flash drive. You may now use this portable anti-malware on the infected computer. 6) Double-click the anti-malware program EXE file on the USB flash drive. 7) Run Full System Scan to detect and get rid of all sorts of malware.

Benefits and Features of SafeBytes Security Suite

To protect your laptop or computer from many different internet-based threats, it is very important to install an anti-malware program on your PC. However, with so many anti-malware companies in the marketplace, nowadays it’s difficult to decide which one you should obtain for your laptop. A few are very good ones, some are ok types, and some are simply just fake anti-malware applications that could damage your computer themselves! When looking for an anti-malware program, pick one which gives reliable, efficient, and total protection against all known viruses and malware. One of the highly recommended software by industry analysts is SafeBytes Anti-Malware, a popular security application for Microsoft Windows. Safebytes is one of the well-established computer solutions companies, which provide this complete anti-malware software. Using its cutting-edge technology, this application can assist you to eliminate multiples types of malware such as viruses, PUPs, trojans, worms, ransomware, adware, and browser hijackers.

SafeBytes possesses a variety of wonderful features that can help you protect your laptop or computer from malware attack and damage. Below are some typical features found in this application:

World-class AntiMalware Protection: Built upon a greatly acclaimed anti-virus engine, this malware removal application can find and remove numerous stubborn malware threats like browser hijackers, PUPs, and ransomware that other typical anti-virus applications will miss. Real-time Threat Response: SafeBytes gives complete and real-time security for your computer. They’re extremely effective in screening and getting rid of numerous threats since they’re regularly improved with the latest updates and alerts. “Fast Scan” Features: Safebytes Anti-Malware, using its enhanced scanning engine, provides ultra-fast scanning which can quickly target any active online threat. Website Filtering: Through its unique safety ranking, SafeBytes notifies you whether a site is safe or not to visit it. This will ensure that you’re always certain of your online safety when browsing the internet. Light-weight: The program is lightweight and can run silently in the background, and will not have an effect on your PC efficiency. 24/7 Premium Support: SafeBytes provides you with 24/7 technical support, automatic maintenance, and software upgrades for the best user experience. Simply put, SafeBytes has developed a meaningful anti-malware solution that is aimed to protect you against various malware. Malware issues can become a thing of the past when you put this tool to use. So if you’re seeking the very best malware removal application out there, and when you don’t mind shelling out a few bucks for it, go for SafeBytes Anti-Malware.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove Motitags without using an automated tool, it may be possible to do so by removing the application from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. Additionally, it is advised to factory reset your web browser to its default state to fix corrupt settings. Finally, check your hard drive for all of the following and clean your computer registry manually to get rid of leftover application entries after uninstalls. Please remember that only advanced users should try to manually edit the system files simply because removing any single vital registry entry leads to a serious issue or even a PC crash. Moreover, certain malicious programs have the capability to defend against its removal. Carrying out this in Safe Mode is recommended.
Folders: C:\Program Files\Motitags_94 C:\Program Files\Motitags_94EI C:\Users\(username)\AppData\Local\Motitags_94 C:\Users\(username)\AppData\LocalLow\Motitags_94 C:\Users\(username)\AppData\LocalLow\Motitags_94EI C:\Users\(username)\AppData\Roaming\Mozilla\Firefox\Profiles\g75s8p2u.default\extensionsffxtbr-bs@Motitags_94.com C:\Users\(username)\AppData\Roaming\Mozilla\Firefox\Profiles\g75s8p2u.default\extensionsffxtbr@Motitags_94.com C:\Users\(username)\AppData\Roaming\Mozilla\Firefox\Profiles\g75s8p2u.default\Motitags_94 Files: Search and Delete: 94auxstb.dll 94auxstb64.dll 94bar.dll 94barsvc.exe 94bprtct.dll 94brmon.exe 94brmon64.exe 94brstub.dll 94brstub64.dll 94datact.dll 94dlghk.dll 94dlghk64.dll 94feedmg.dll 94highin.exe 94hkstub.dll 94htmlmu.dll 94httpct.dll 94idle.dll 94ieovr.dll 94medint.exe 94mlbtn.dll 94Plugin.dll 94radio.dll 94regfft.dll 94reghk.dll 94regiet.dll 94script.dll 94skin.dll 94skplay.exe 94SrcAs.dll 94SrchMn.exe 94srchmr.dll 94tpinst.dll AppIntegrator64.exe AppIntegratorStub64.dll BOOTSTRAP.JS chromeffxtbr.jar CHROME.MANIFEST CREXT.DLL CrExtP94.exe DPNMNGR.DLL EXEMANAGER.DLL FF-NativeMessagingDispatcher.dll Hpg64.dll INSTALL.RDF installKeys.js LOGO.BMP NP94Stub.dll T8EPMSUP.DLL T8EXTEX.DLL T8EXTPEX.DLL T8HTML.DLL T8RES.DLL T8TICKER.DLL UNIFIEDLOGGING.DLL VERIFY.DLL 94EIPlug.dll 94EZSETP.dll NP94EISb.dll Registry: Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Value: Motitags_94 Browser Plugin Loader Data: 94brmon.exe Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Value: Motitags Search Scope Monitor Data: C:\PROGRA~1\MOTITA~2\bar.binsrchmn.exe” /m=2 /w /h Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Value: Motitags Home Page Guard 32 bit Data: C:\PROGRA~1\MOTITA~2\bar.bin\AppIntegrator.exe Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Value: Motitags EPM Support Data: C:\PROGRA~1\MOTITA~2\bar.binmedint.exe” T8EPMSUP.DLL,S Key HKCU\Software\AppDataLow\Software\Motitags_94 Key HKLM\SOFTWARE\Motitags_94 Key HKLM\SOFTWARE\MozillaPlugins\@Motitags_94.com/Plugin Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Motitags_94bar Uninstall Firefox Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\6df8a038-1b03-41eb-a92b-0e82de08ee4a Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\598f4e85-2ee6-43a8-bf43-c75c82b925fe Key HKLM\SOFTWARE\Classes\Motitags_94.ToolbarProtector.1 Key HKLM\SOFTWARE\Classes\Motitags_94.ToolbarProtector Key HKLM\SOFTWARE\Classes\Motitags_94.ThirdPartyInstaller.1 Key HKLM\SOFTWARE\Classes\Motitags_94.ThirdPartyInstaller Key HKLM\SOFTWARE\Classes\Motitags_94.SettingsPlugin.1 Key HKLM\SOFTWARE\Classes\Motitags_94.SettingsPlugin Key HKLM\SOFTWARE\Classes\Motitags_94.ScriptButton.1 Key HKLM\SOFTWARE\Classes\Motitags_94.ScriptButton Key HKLM\SOFTWARE\Classes\Motitags_94.RadioSettings.1 Key HKLM\SOFTWARE\Classes\Motitags_94.RadioSettings Key HKLM\SOFTWARE\Classes\Motitags_94.Radio.1 Key HKLM\SOFTWARE\Classes\Motitags_94.Radio Key HKLM\SOFTWARE\Classes\Motitags_94.PseudoTransparentPlugin.1 Key HKLM\SOFTWARE\Classes\Motitags_94.PseudoTransparentPlugin Key HKLM\SOFTWARE\Classes\Motitags_94.MultipleButton.1 Key HKLM\SOFTWARE\Classes\Motitags_94.MultipleButton Key HKLM\SOFTWARE\Classes\Motitags_94.HTMLPanel.1 Key HKLM\SOFTWARE\Classes\Motitags_94.HTMLPanel Key HKLM\SOFTWARE\Classes\Motitags_94.HTMLMenu.1 Key HKLM\SOFTWARE\Classes\Motitags_94.HTMLMenu Key HKLM\SOFTWARE\Classes\Motitags_94.FeedManager.1 Key HKLM\SOFTWARE\Classes\Motitags_94.FeedManager
Read More
How to fix Windows 10 Error 0x803f7000

Error code 0x803f7000 -What is it?

Error code 0x803f7000 refers to an issue in Windows 10 with downloading apps through Windows Store. When you choose the app or game to download, it heads to Downloads in the Store app. Then it says it is acquiring a license but then fails. When you click the “See details” link, you see the error code 0x803F7000. It could mean that the date and time or region settings in your Windows 10 are incorrect or there are some problems with the Windows Store Cache.

Symptoms

  • This error appears when you are running Windows 10 and trying to download an app through the Microsoft store. The error code may appear with this message: Something went wrong. The error code is 0x803f7000, in case you need it
  • You might also see this message along with the error code: "It looks like you've reached your device limit for installing apps and games from the Store on your Windows 10 device. If you want to install apps and games from the Store on another Windows 10 device, remove a device from the device list."

Solution

Restoro box imageError Causes

There may be several reasons for this error:
  1. This problem may arise if the date and time in Windows 10 are incorrect.
  2. If the region has been set incorrectly.
  3. Problems with Windows store cache.
  4. Windows store server overloaded.
  5. The Windows version you are using is pirated.

Further Information and Manual Repair

Method 1:

Correcting date and time:
  • Open up Control Panel > Clock, Language, and Region.
  • Then click on Date & Time.
  • Now click on Change date & time to correct your time.

Method 2:

Correcting region:
  • Navigate to Control Panel > Clock, Language, and Region.
  • Then click on Region.
  • Then click on the Location tab.
  • Now set your actual region from Home location section.
  • Click Apply & OK.

Method 3:

Resetting Windows Store:
  • Press Windows Flag Key + X from your keyboard. Then select Command Prompt (Admin). It will launch Command prompt as administrator.
  • Then type wsreset and hit Enter.
  • Wait for a few seconds. It will automatically open Windows Store.
  • Then try to download any apps.

Method 4:

  1. Open Command prompt in local machine and type in the Windows Store reset tool exe
  2. Activate Windows by going to Settings>Updates and Security
  3. Run the Modern UI/metro app troubleshooter from Microsoft
  4. Keep trying it several times.
  5. Try changing locale and time zone to the United States as shown below
  6. Go to control panel, Language settings
  7. Select location to the United States
  8. This will reset the language to US English. After this try downloading the apps again.
  9. Try restarting the Windows Updater service or restart the machine once.
You must make sure that you have a good internet connection. You need that for the updates and downloads complete without disruption.

Method 5:

Make sure the app isn’t blocked by the Windows firewall: To make your PC more secure, some apps are blocked by Windows Firewall by default. For proper functioning, you might need to enable an app to receive info through the firewall. For more info, see the "Allow an app to receive info through the firewall," and follow the procedure from start to finish.

Method 6:

Check with your system admin: If your PC is part of a network in an organization, like a business, school, or government agency, your system administrator might have turned off the use of certain apps using the Group Policy. Contact your system admin if you believe that Group Policy is preventing you from using an app.

Method 7:

Make sure your apps are up-to-date: To make the apps working properly, you must keep your apps up-to-date. This could be done by turning on automatic updates in the Windows Store.

Method 8:

Contact the app publisher To view the publisher’s app support info, follow these steps:
  1. On the Start screen, tap or click Store to open the Windows Store.
  2. Search or browse for the app, and then tap or click it.
  3. Scroll to the Details section of the app's description page, and then tap or click the support link for the app under Learn more. The link will open an email message for you to contact support or will take you to a support website.
If you do not possess the technical expertise required to accomplish this yourself or do not feel comfortable doing so, download and install a powerful automated tool to get the job done.
Read More
How to Fix the Blue Screen Locale ID 1033 Error Code

What is the Blue Screen Locale ID 1033 Error?

Blue screen locale id 1033 error as the name suggests, is a type of BSoD error. This error may occur during Windows startup, program load, or while the program is running. The error indicates poor PC maintenance and occurs without any warning. The error message is prompted in the following format:
Problem signature: Problem Event Name: BlueScreen OS Version: 6.0.6002.2.2.0.16.7 Locale ID: 1033
When the error occurs, the computer screen turns blue and the user is unable to view or access the program. It is advisable to fix the error right away, virtually because BSoD is a critical PC error, it can pose serious threats to your system.

Error Causes

The two most common causes of the occurrence of the Blue Screen Locale ID1033 error code are:
  • Registry issues
  • Viral infection

Further Information and Manual Repair

You don’t need to hire a technician or be a computer whiz to resolve Blue Screen Locale ID1033 error code. Here are some methods that you can try to resolve this error on your PC. These methods are easy to perform and result-driven.

Method 1: Perform a PC Scan by Downloading an Anti-Virus

Since this error is indicative of a viral infection, it is suggested you perform a PC scan by installing an antivirus on your system. Make sure you download an antivirus that is powerful and has the ability to scan all kinds of viruses.

Method 2: Clean and Repair the Registry

Another alternative method is to clean and repair the registry. The Registry is a component of the PC that stores all information and activities performed on the PC. This includes both important and unnecessary files like junk files, cookies, internet history, temporary files, invalid entries, bad registry keys, and more. These files not only accumulate in the registry but also damage and corrupt it thereby generating error codes like the Blue Screen Locale ID1033 error code.
Read More
File or directory is corrupted and unreadable
If you encounter an error message that says, “<Drive>: is not accessible, The File or directory is corrupted and unreadable” when you try to connect your USB or external device, then the File System could have been corrupted or the external device might be infected with malware. On the other hand, it is also possible that the device might have some physical damage. To fix the “The file or directory is corrupted and unreadable” error, you can try to run Check Disk or scan your computer for malware or you could also format the destination drive. For more details, refer to each one of the given options below.

Option 1 – Run the Check Disk utility

You can also run the Check Disk utility to fix the error when you connect your USB or external device.
  • In the Windows Search box, type “command prompt” and from the search results, right click on Command Prompt and select “Run as administrator”.
  • After opening Command Prompt, type this command and tap Enter: chkdsk <Partition Letter>: /f /r /x /b
  • The command you entered will start to check for errors and fix them automatically. Else, it will throw an error message saying, “Chkdsk cannot run because the volume is in use by another process. Would you like the schedule this volume to be checked the next time the system restarts? (Y/N)”.
  • Tap the Y key to schedule Disk Check the next time your computer restarts.

Option 2 – Try to format the destination drive

Formatting the drive can also help you resolve the error. To format it, follow these steps:
  • To get started formatting your drive, tap the Win + E keys and then go the access page of the drive.
  • Next, right click on the drive and select Format.
  • After that, uncheck the “Quick Format” option and then format your drive properly.
  • Now once the formatting process is finished, unplug the drive and plug it back in afterwards.
  • Check if the error is already fixed. If the drive is not initialized, tap the Win + R keys and hit Enter.
  • After opening the Run dialog box, type “diskmgmt.msc” and hit Enter to open Disk Management.
  • From there, right click on the drive volume and select initialize Disk.
  • Next, select the correct partition type and proceed.
Option 3 – Try scanning your computer for malware using Windows Defender Your computer could be infected with malware which might have triggered the “The file or directory is corrupted and unreadable” error. To fix this, you need to scan your computer using a reliable program like Windows Defender.
  • Tap the Win + I keys to open Update & Security.
  • Then click on the Windows Security option and open Windows Defender Security Center.
  • Next, click on Virus & threat protection > Run a new advanced scan.
  • Now make sure that Full Scan is selected from the menu and then click the Scan Now button to get started.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status