Logo

Proton Drive, privacy-first cloud storage

In 2014 Proton mail started as an end-to-end encrypted email service offering secure and private email services. Proton mail is still live and going with the same dedication to privacy and security but the company has expanded its offering into cloud storage drive services.

Starting as a public beta at the end of 2020, Proton Drive is keeping its privacy and security policy philosophy with the new service. Proton Drive is the newest service besides Proton Calendar, Proton VPN, and Proton Mail.

proton drive

Drive has end-to-end encryption for everything on it including files themselves, filenames, folder structure, folder names, extensions, and file sizes. This means that you and only you can access your files. Servers are located in Geneva, Switzerland and they are under Swiss privacy laws making sure that your files are protected. Proton services in general are all open source so anyone can take a look at them to be sure that nothing is lurking under the hood. For now, sync is done either via the android app or web interface but the desktop client will come soon since currently, it is under development.

Sadly free plan of Proton Drive will give you only 1GB of storage which is much less than other services and sadly payments plans are also not so jaw-dropping going for $4 USD per month for a 200GB plan or with Proton ultimate subscription that will set you $10 behind but you will get 500GB of drive storage. Of course, if you value privacy for your files these options are good but if you do not mind that part other services have much better options.

All in all Proton Drive is a great cloud storage solution if you need privacy and well worth the investment. With the ultimate subscription, you will get enough space for most people and company needs with other services and guaranteed privacy and security, on the other hand, if you just need a large amount of cloud storage not caring too much about privacy other options are better.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

An Easy Guide to Fixing Error Code 800b0100

Error Code 800b0100 - What is it?

800b0100 is a typical Windows Update error. This error message occurs when you try to install the latest updates from Microsoft Updates and Windows Updates. The error message is displayed in the following format:
“Code 800B0100 Windows Update encountered an unknown error.”

Solution

Restoro box imageError Causes

Error code 800b0100 may pop up on your computer screen due to different reasons. However, some of the common causes include:
  • The file needed by Windows Update is corrupt or missing
  • Security software conflict such as Firewall
  • Incorrect Registry keys
  • Windows security .dll files are registered incorrectly

Further Information and Manual Repair

To resolve error code 800b0100 on your system, you don’t have to hire a professional. This error is quite easy to repair and requires no technical expertise. In other words, you don’t need to be a computer programmer or technically sound to repair this issue. Here are some of the easy and effective DIY methods that you can try to resolve error code 800b0100 on your system:

Method 1

Download System Update Readiness Tool from Microsoft’s website on your PC. This tool can help you fix this problem that might prevent Windows Updates from installing. Typically it will take 15 minutes or less to scan your entire PC.  The System Update Readiness Tool will scan your computer for inconsistencies that may cause errors to occur.

Method 2

Disable Security Software on your PC for example if you use Windows Vista then you will have Firewall already built in. Disable it to resolve error 800b0100. To do this, simply go to the start menu and open the control panel and then select security. Now locate the option Windows Firewall and upon finding, simply choose the option Turn Windows Firewall on or off. Select off (not recommended) option, then click Apply and OK to reset and confirm changes. After that, go back to the Windows Update screen and then click the try again button. The download and installation would start. After the installation is complete, restart your PC to activate changes. Once the updates are successfully installed, not re-enable the Firewall, to ensure your PC is not exposed to potential security threats or viruses.

Method 3

Remove Invalid Keys from the Registry by downloading Restoro. This is a PC Fixer deployed with a registry cleaner. It scans your entire PC and removes all the obsolete and unnecessary files like cookies, bad and invalid registry keys. It cleans and repairs the registry in a few clicks. Click here to download Restoro.
Read More
A fast Guide to Fixing 2GB filesize Error

What exactly is the 2GB filesize Error?

The PST file could be around 2 gigabytes if you are using MS Outlook 2002 or any earlier versions for your own personal Folders. The 2GB filesize malfunction occurs when your PST memory both reaches or exceeds this limit. The 2GB size problem code is, in addition, referred to as an outsize PST file error. When this error happens you may be unable to deliver or receive e-mails via your Outlook account. Moreover, you'll likewise not be able to add any new data or even view your important calendar items, notes, and saved drafts. MS-Outlook shows several types of problem codes which indicate the 2GB file size dilemma. Listed below are some of the messages that can be displayed on your monitor:-
  • The file could not be added to the folder. The action could not be completed.
  • Task 'Microsoft Exchange Server - Receiving' reported error (0x8004060C): 'Unknown Error 0x8004060C'
  • Can't copy the item
  • Errors have been detected in the file xxxx.pst. Quit all mail-enabled applications.
  • Task 'Microsoft Exchange Server' reported error (0x00040820):'Errors in background synchronization. In most cases, further information is available in a synchronization log in the Deleted Items folder.'
  • xxxx.pst cannot be accessed - 0x80040116

Solution

Restoro box imageError Causes

The simple explanation for this malfunction is that you have maxed out the two gigabytes account limit. This happens in case you continue downloading fresh data and saving files and the old emails in your Outlook account. Over time, the space becomes limited and along with it the 2 GB file limit error. This error also presents a critical danger of data loss which is a possibility in your Outlook account, which hinders you as well from fully utilizing your email account. For regular Outlook customers, who utilize this program for practically all email communication within as well as outside the office, this error is annoying and frustrating as it causes a great deal of annoyance as well as decreases their performance and productivity.

What exactly are the Symptoms?

Below are a few signs that will help you recognize the 2GB file-size error:
  • Inability to fill and open the OST and PST files
  • Error messages pop-ups
  • Failure to send emails
  • Failure to make or edit new contacts
  • Inability to synchronize the file

Further Information and Manual Repair

It is desirable to fix this error code right away especially if this is the preferred strategy to carry out communication in your office. Fix it immediately or else you might not receive e-mails that are important from your colleagues. There are 3 ways to solve this issue.

Method 1

One is to remove the old e-mails and connections and replace them with new ones. This may not be the best option for you in case you don't wish to lose emails and your old contacts.

Method 2

The second alternative would be to install a fresh version of MS-Outlook like 2010. The file-size limits of OST and PST files in these editions are larger than in ms-outlook 2002. On the other hand, this is a good idea for the long run but may not be the best idea for today as you will not have the ability to recover your previous e-mails and contacts that are outdated.

Method 3

The third and maybe the method that is best to resolve the 2GB file size limit error while ensuring the restoration of your old e-mails and contacts as well as increasing the limit to 4GB, is Restoro program's installation. Here may be the best recovery program on the market. It is really easy to use, safe, exceptionally functional, secure, and especially can resolve this issue. Technical expertise isn't needed by you to perform your way around this device.

All you should do is:

Click here to download and install the Restoro repair tool on your computer. In your MS Outlook account, you can restore all your data in just a couple of clicks. Talking of data recovery, this software can also help you recover all those other e-mails before the PST malfunction happened, or that you may have deleted. So, if you have deleted any significant email that you want to recover, this will undoubtedly be of use for you. By installing it on your system you can double your Outlook account's quality to twice as much as the standard size.
Read More
A Guide to Fix Error Code 0x80070004 on Windows 10

Error Code 0x80070004 on Windows 10 – What Is It?

Some users trying to upgrade from Windows 7 or Windows 8/8.1 reported experiencing installation rollback with error code 0x80070004. This error normally appears when the Computer Name is set to names that can’t be used for the computer. It’s also possible this error occurs if users or program files folder were redirected to a different partition.

Solution

Restoro box imageError Causes

The Error code 0x80070004 on Windows 10 is normally caused if any of the following were used as the Computer Name and the user tried to upgrade to Windows 10:

  • System (or SYSTEM)
  • SELF
  • LOCAL
  • Network
Failure to fix this error message might result in others, including error code  0xc0000001

Further Information and Manual Repair

If you don’t solve this error, you won’t be able to upgrade from Windows 7 or Windows 8/8.1 to Windows 10. Note that this error will continuously bring you back to the original OS unless fixed.

Please note that if you’re not confident in doing these steps, you might want to consider seeking the help of an expert or using an automated tool that will help fix this.

Here are a few methods to try.

Method 1: Check and Change the Computer Name

The most common cause of this error is if your computer uses any of the following reserved names:

  • LOCAL
  • System (or SYSTEM)
  • Network
  • SELF

These reserved names are not meant to be used as computer names. If this is what your computer uses and you try to upgrade to Windows 10, you will surely get this error. Check your computer name and if you see any of the reserved names, change it right away.

Changing Computer Name in Windows 8.1

If you’re trying to upgrade from Windows 8.1, you can change the name of the computer by following these steps:

  • Step 1: Open the Start menu then simply type “rename computer”. After that, choose “Rename this computer”
  • Step 2: A dialog box will open. Just click the “Change” button
  • Step 3: A new dialog box will open. Type the new name. Click Apply then Ok.

Changing Computer Name in Windows 7

If you’re trying to upgrade from Windows, you can follow the steps below to change the name of your computer.

  • Step 1: Go to the Start menu then on the Computer section, right-click the mouse and choose “Properties”.
  • Step 2: A new dialog box will appear. Go to “Computer name, domain, and workgroup settings” then click “Change settings”. In case you’re asked for administrative access, make sure to grant it.
  • Step 3: Find the “Computer Name” tab then click “Change”
  • Step 4: Change the computer name and click Ok.

Method 2: Fix the “Users” directory issue

If the first method doesn't work, it probably means the computer name isn’t the cause of this error. Another reason why users experience Error code 0x80070004 when upgrading to Windows 10 is if the “Users” directory was relocated. So, when you try upgrading to Windows 10, the installer wasn’t able to find the user profiles on the “%systemdrive%”, where the current operating system is installed.

If you changed or moved any of the Users, Program Data, or Program Files folders, this will cause the error. Before you upgrade to Windows 10, you might be required to reset or reinstall your current operating system (Windows 7 or Windows 8.1).

If you haven’t made any changes or haven’t moved any of the mentioned folders, there’s a great chance that your users' profiles are corrupted. You can also reinstall your current operating system. However, you might want to check for the corrupter user profile first. To do this, follow the steps below:

  • Step 1: Go to the Start menu and type System
  • Step 2: Click System  then go to the Advanced tab
  • Step 3: Go to Settings, which you’ll find under User Profiles

On the Users Profiles, make a copy of all the accounts somewhere. Sign out from the current user account then try logging in back using the accounts you’ve copied. For each account, you get an error, delete it. However, make sure that you don’t delete the UpdateUser and Administrator account ever.

After this is done, try upgrading your operating system to windows 10 again.

Method 3: Try a trusted and secured Automated Tool

If the above methods still not useful, you might want to rely on an automated tool. Find a secured and trusted tool. It will help fix this issue.

Read More
How to remove Search Donkey

Search Donkey is a Potentially Unwanted Program for Windows developed by Western Web Applications, LLC. This program may inject ads into your browsing sessions, giving you false search results and advertisements.

As described by Western Web Applications: “Search Donkey is entirely free to use. To keep Search Donkey free, we’ve partnered with high-quality ad providers and you may see additional ads when Search Donkey is installed.

While installed, Search Donkey will keep track of your web search queries, allowing it to let you know what pages you already visited, however, this data is also used to better target personal unwanted ads.

Search Donkey has been flagged as a Potentially Unwanted Program (PUP) by several anti-virus scanners, and their website is blacklisted by Google, giving warning to whoever visits it, and due to the nature of this application, it is not recommended to keep on your computer.

About Adware

Exactly what is Adware? If you have ever owned a computer, then you’ve probably heard the word numerous times, but it is still beneficial to define it. The term “adware” is actually a short form of advertising-supported software and it includes programs that are solely designed to display ads on a computer. A kind of malware, it will come bundled right in with the software package that a user either installs or accesses. Shareware or freeware programs are often times packaged with adware. If adware penetrates your system without you knowing and sends information about you or your PC to 3rd parties, then it is spyware. Quite often, adware changes your web browser settings to open pop-up adverts or modifies browser homepage and default internet search engine to some unwanted website. Adware is a common problem that affects a large number of PCs around the globe. If your computer doesn’t have any anti-malware software then it’s very likely it could get infected with adware as well as other malware.

Adware and its effects on your PC:

Adware could generate and display plenty of ads of all sorts which in turn disrupt the functions of your personal computer while browsing the net. Pop-ups might also show up on your computer’s desktop even when you’re not online. Adware results in a reduction of available memory and processing power, or resources. It also causes a slow net connection because adware consumes bandwidth whenever it retrieves adverts from the internet. Adware was originally created to support companies to generate income when they offer the software away free of charge. However, adware nowadays displays hundreds of adverts which will cause your PC to slow down and even crash.

Adware prevention:

As we discussed, adware could potentially be harmful to your computer, generally not by itself, but by bringing other problems to you. A top-quality antivirus program has the capability of permanently removing adware. We recommend Safebytes Anti-Malware, one of the top-rated anti-malware programs by world-renowned industry experts. It will act either as a preventative tool stopping websites or software installations that contain adware or as a removal tool for an already infected computer. To prevent adware, download software from websites that you trust. Never download from websites that you have never been aware of or tried before; Always study the end-user license agreement (EULA) of any application you want to install; You need to avoid freeware and shareware where possible; Lastly, watch out for ActiveX, since many adware and spyware companies make use of the technology to install their wares onto your computer system

Malware Blocking Internet And All Anti-Malware Software? Do This!

All malware is bad and the consequences of the damage will vary based on the specific type of malware. Some malware variants alter browser settings by adding a proxy server or modify the PC’s DNS settings. In these instances, you will be unable to visit some or all internet sites, and thus not able to download or install the required security software to eliminate the malware. So what to do when malicious software prevents you from downloading or installing Anti-Malware? There are a few options you could try to get around with this problem.

Remove viruses in Safe Mode

In Safe Mode, you can actually change Windows settings, un-install or install some program, and eliminate hard-to-delete viruses and malware. If the malware is blocking access to the internet and affecting the computer, launching it in Safe Mode will let you download antivirus and run a diagnostic scan while limiting possible damage. To enter into Safe Mode or Safe Mode with Networking, press the F8 key while the PC is starting up or run MSConfig and look for the “Safe Boot” options under the “Boot” tab. Once you’re in safe mode, you can attempt to install your anti-malware program without the hindrance of the malicious software. At this point, you could run the anti-malware scan to eliminate viruses and malware without hindrance from another application.

Switch over to an alternate browser

Some malware only targets certain browsers. If this sounds like your case, use another web browser as it could circumvent the malware. If you suspect that your Internet Explorer has been hijacked by malware or otherwise compromised by hackers, the ideal approach is to switch over to a different internet browser like Firefox, Chrome, or Safari to download your chosen computer security software – Safebytes Anti-Malware.

Create a portable USB antivirus for eliminating malware

Another solution is to make a portable antivirus program on your USB flash drive. Adopt these measures to run the anti-malware on the affected computer system. 1) Download the anti-malware program on a virus-free PC. 2) Connect the flash drive to a USB slot on the clean computer. 3) Run the setup program by double-clicking the executable file of the downloaded software, which has a .exe file format. 4) Select the flash drive as the destination for saving the software file. Follow the directions to complete the installation process. 5) Transfer the pen drive from the clean computer to the infected computer. 6) Double-click the Safebytes Anti-malware icon on the thumb drive to run the software. 7) Hit the “Scan Now” button to start the virus scan.

Detect And Remove Viruses With SafeBytes Anti-Malware

Today an anti-malware tool can protect the computer from different types of online threats. But wait, how to decide on the best one amongst countless malware protection application that’s available out there? As you might be aware, there are many anti-malware companies and products for you to consider. A few are well worth your money, but many aren’t. You need to choose one that is reliable, practical, and has a strong reputation for its malware source protection. Amongst few good applications, SafeBytes Anti-Malware is the strongly recommended software for the security-conscious individual. SafeBytes anti-malware is a trustworthy tool that not only secures your PC permanently but is also very easy to use for people of all ability levels. With its outstanding protection system, this tool will easily detect and remove most of the security threats, including adware, viruses, browser hijackers, ransomware, trojans, worms, and PUPs.

SafeBytes has outstanding features when compared to other anti-malware programs. Below are some of the great ones:

Real-time Threat Response: SafeBytes provides 100 % hands-free real-time protection and is set to check, block, and eliminate all threats at its very first encounter. They’re very effective in screening and getting rid of different threats because they’re constantly revised with new updates and safety measures. Robust, Anti-malware Protection: With its enhanced and sophisticated algorithm, this malware removal tool can identify and get rid of the malware threats hiding in the PC effectively. Internet Security: SafeBytes gives an instant safety rating about the pages you’re about to visit, automatically blocking harmful sites and ensure that you’re certain of your safety while browsing the world wide web. “Fast Scan” Abilities: SafeBytes’s virus scan engine is one of the fastest and most efficient within the industry. It's targeted scanning seriously increases the catch rate for viruses which is embedded in various computer files. Low CPU and Memory Usage: This program is not “heavy” on your computer’s resources, so you’ll not see any overall performance issues when SafeBytes is working in the background. 24/7 Customer Support: You can obtain totally free 24/7 technical support from their computer experts on any product queries or computer security concerns. Overall, SafeBytes Anti-Malware is a solid program as it has lots of features and could identify and remove any potential threats. Malware problems will become a thing of the past once you put this software to use. So if you’re searching for the best malware removal application out there, and if you don’t mind paying out some money for it, opt for SafeBytes Anti-Malware.

Technical Details and Manual Removal (Advanced Users)

If you don’t want to use malware removal software and prefer to get rid of Search Donkey manually, you could do so by going to the Windows Add/Remove Programs menu in the control panel and deleting the offending program; in cases of web browser plug-ins, you may remove it by visiting the browsers Add-on/Extension manager. You’ll probably also want to reset your internet browser. To ensure the complete removal, manually examine your hard disk and registry for all of the following and remove or reset the values accordingly. But bear in mind, editing the Windows registry can be a complicated job that only experienced users and professionals should attempt to fix it. Furthermore, some malware keeps replicating which makes it tough to eliminate. It is advised that you do the removal procedure in Windows Safe Mode.
Files: % Program Files% \Search Donkey.exe %UserProfile%\Desktop\ Search Donkey.lnk %UserProfile%\Start Menu \ Search Donkey C:\Users\%CurrentUserName%\AppData\Local\Temp\nst2A8A.tmp\nsDialogs.dll (21 bytes) C:\ProgramData\SearchDonkey\Firefox\chrome\content\overlay.xul (391 bytes) C:\Users\%CurrentUserName%\AppData\Local\Temp\nst2A8A.tmp\System.dll (23 bytes) C:\ProgramData\SearchDonkey\IE\common.dll (11359 bytes) C:\ProgramData\SearchDonkey\Chrome\common.crx (5843 bytes) C:\Users\%CurrentUserName%\AppData\Local\Temp\nst2A8A.tmp\modern-wizard.bmp (4232 bytes) C:\Users\%CurrentUserName%\AppData\Local\Temp\nst2A8A.tmp\util_ex.dll (21609 bytes) C:\ProgramData\SearchDonkey\Firefox\chrome\content\main.js (17 bytes) C:\ProgramData\SearchDonkey\app.dat (172455 bytes) C:\Users\%CurrentUserName%\AppData\Local\Temp\nst2A8A.tmp\Helper.dll (27542 bytes) C:\Users\%CurrentUserName%\AppData\Local\Temp\nst2A8A.tmp\version.dll (14 bytes) C:\Users\%CurrentUserName%\AppData\Local\Temp\nst2A8A.tmp\Processes.dll (1772 bytes) C:\ProgramData\SearchDonkey\Firefox\chrome.manifest (196 bytes) C:\ProgramData\SearchDonkey\Uninstall.exe (12729 bytes) C:\ProgramData\SearchDonkey\Firefox\install.rdf (955 bytes) C:\ProgramData\SearchDonkey\SearchDonkey.ico C:\ProgramData\SearchDonkey\Chrome\common.crx C:\ProgramData\SearchDonkey\Firefox\chrome.manifest C:\ProgramData\SearchDonkey\Firefox\chrome\content\main.js C:\ProgramData\SearchDonkey\Firefox\chrome\content\overlay.xul C:\ProgramData\SearchDonkey\Firefox\install.rdf C:\ProgramData\SearchDonkey\IE\common.dll C:\ProgramData\SearchDonkey\SearchDonkey.ico C:\ProgramData\SearchDonkey\Uninstall.exe C:\ProgramData\SearchDonkey\app.dat Registry: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\SearchDonkey \DisplayIcon %AppData%\%RANDOM CHARACTERS%\%RANDOM CHARACTERS%.exe,0 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\SearchDonkey HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\SearchDonkey\UninstallString %AppData%%RANDOMCHARACTERS%\%RANDOM CHARACTERS%.exe
Read More
How to Fix TrayApp Error 1706
What is TrayApp Error 1706? A TrayApp Error 1706 is not something you want to see. It is generally caused by an error in hexadecimal formatting, which is a common format employed by software programmers for Windows OS-compatible hardware drivers, Windows system files, and software apps. Developers and manufacturers of hardware drivers and software apps employ different codes in order to indicate different types of errors. The TrayApp error 1706 occurs in a long numeric code with a technical explanation of the cause. In many cases, the TrayApp error 1706 can have different TrayApp error 1706 parameters. It will usually sport a message like:
  • Install Error 1706 Trayapp
  • Reinstall Error 1706 Trayapp
  • Error 1706 Trayapp crash
  • Error 1706 Trayapp is missing
  • Remove Error 1706 Trayapp
  • Download Error 1706 Trayapp
  • Error 1706 Trayapp virus

Solution

Restoro box imageError Causes

More often than not, the TrayApp error will occur because there are damaged files in your operating system. When the Windows system file entry gets corrupt, it means that there malfunctioning in your system and it can be exposed to major security threats. And if it’s not resolved, it can potentially result in complete and permanent data loss and can make your storage media or your system as a whole inoperable. There can be other triggers for the TrayApp error, the common of which include:
  • Incomplete installation of software
  • Incomplete un-installation of software
  • Improper deleting of hardware drivers
  • Improper deleting of software applications
If you have the TrayApp error, you realize how common it is when restarting your system followed an improper shutdown or a recent malware or virus recovery. These situations result in corruption or deletion of essential system files. When Windows system files get corrupted or go missing, the data that is needed to run software won’t be linked properly.

Further Information and Manual Repair

There are two common manual ways of fixing TrayApp error 1706. The manual solution is:

Boot Your System and Log in As Administrator.

  • Click on Start and select All Programs.
  • Go to Accessories, then System Tools, and select System Restore.
  • In the dialog box, select, ‘Restore computer to an earlier date’ and then click on Next.
Click next twice on the dialog boxes and then the Automatic System Restore will start and restart your device.

Reimage Plus Fix for Trayapp Error 1706

This is the easiest way to resolve TrayApp Error 1706. However, there are cases when the manual process may not really work, and this can be caused by improper maintenance of your system. For that, Restoro is your short and comprehensive answer. Restoro is a multi-functional PC Fixer that works as an antivirus, registry cleaner, system optimizer, and much more. It can not only help resolve TrayApp Error 1706, but can also resolve other errors that can hinder the performance of your system, programs, and applications. It can also clean your registry and optimize your system to make it faster and quick loading. The software is compatible with all Windows versions. Just click here and download Restoro and get rid of any issues in your system!
Read More
Almost complete List of Cortana commands
Cortana is your personal digital assistant fully integrated into Windows 10 designed to help you make your life easier. The more you use it, the more Cortana can learn about you, and the experience becomes more personalized and accurate. It can perform a variety of tasks, and it's full of handy tricks, but perhaps one of the best features is the advanced speech recognition that enables Cortana to understand the context of a natural voice conversation. On Windows 10, and across platforms with the Cortana app on iPhone and Android, the assistant can understand virtually any voice command and perform tasks. For example, by just speaking you can find facts, create reminders and manage your calendar, launch applications, change settings, and a lot more. Now, if you're looking for an official list of all the voice commands Cortana supports, you'll never find it because it doesn't exist. Cortana can understand natural language and context, there's no particular set of commands to make things happen. In a sort of way, you are speaking to Cortana as you would to any other person.

Invoking Cortana

Before using voice commands, it's important to know the ways in which you can invoke Cortana using natural language:
  • You can click the microphone icon in the taskbar next to the Start menu.
  • You can use the Shift + ⊞ Windows + C keyboard shortcut to open Cortana in listening mode.
  • You can use the Hey Cortana feature, which lets you invoke the assistant by simply saying Hey Cortana followed by the command. For example, Hey Cortana: How's the weather?.
  • On Windows 10 Mobile devices, you can press and hold the search button to open Cortana in listening mode.

Comprehensive list of Cortana voice commands

The following list of commands are examples you can use to learn how to control Cortana with voice commands. Keep in mind that there isn't a specific way to speak the commands. For example, Hey Cortana: Let me listen to some tunes is the same as asking for a more systematic command like Hey Cortana: Play music.

Cortana basic voice commands:

Getting the time for any location:

  • "What time is it?"
  • "What time is in New York?" or "What time is in Greece?"

Getting weather information for any location:

  • "What's the weather like?"
  • "What's the weather in Madrid?" or "What's the weather in Slovakia?"
  • "When does the sun set?"
  • "Is it hot in Hawaii?"
  • "How's the weather looking for tomorrow/next week?"

Opening (Store and desktop) apps and websites:

  • "Open Photoshop" or "Go to Firefox"
  • "Open errortools.com."

Getting news information:

  • "Show me top headlines."
  • "Show me the latest news."
  • "Show me weather news."
  • "Show me Blizzard stock."
  • "Show me bitcoin exchange rate."
  • "What was the score of the last Brazil football game."

Creating a note:

  • "Create a note."
  • "Create Shopping note."
  • "Create Shopping note: Buy a basket of eggs"
  • "Take a note."
  • "Draft a note."
  • "Write a note."

Translating to a different language:

  • "Translate."
  • "Translate Hello to German"
  • "Translate Where is the nearest park? to Spain"

Doing math:

  • "What's 34% or $764.89?"
  • "What's 43 times 59?"
  • "What the square root of 26509?"
  • "What's 29 times 6 divided by 12?"
  • "Convert 6.9 cups to fluid ounces."
  • "How many miles are in 89 Kilometers?"

Defining a word:

  • "Define Space."

Tracking packages:

  • "Where is my package?"
  • "Show me my packages."

Cortana search voice commands:

Finding documents, photos, videos:

  • "Find photos from August 1998."
  • "Find cat videos."
  • "Find document called Collection of poems."

Searching the web:

  • "Search the web for Heroes of Might and magic."

Finding facts:

  • "How tall is Mount Everest?"
  • "Who is Steve Jobs?"
  • "When Arnold Schwarzenegger was born?"
  • "Who is Mercedes CEO?"
  • "When does spring begin?"
  • "What's the capital of Zimbabwe?"
  • "When is Thanksgiving?"
It's important to note that Cortana is capable of conversational understanding, which means that you can also ask follow-up questions without having to be very specific. For example, if you ask Cortana: "Who is the president of the United States", you can then ask a follow-up question, such as "Who is his wife?" or "When was he born?" and the assistant should be able to answer those questions accurately.

Discovering food places nearby:

  • "Find food places near me."
  • "Find restaurants near me."
  • "Find bars near me."
  • "What's a good restaurant near me?"
  • "What's interesting nearby?"
  • "Show me Chinese restaurants near me."
  • "Show me Italians restaurants in Los Angeles."

Cortana health and fitness voice commands:

  • "How was my sleep last night?"
  • "What was my step count yesterday?"
  • "How many calories did I burn today?"
These commands require a tracking device, such as the Microsoft Band 2 to enable your fitness and health activities, and you need to connect Cortana with the Microsoft Health (Microsoft Band) service.

Cortana settings voice commands:

Opening the Settings app:

  • "Open Settings."
  • "Open Action Center."

Controlling settings:

  • "Turn on/off Bluetooth"
  • "Turn on/off Wi-Fi"
  • "Turn on/off Airplane Mode"

Cortana reminders voice commands:

Creating reminders:

  • "Remind me to wash the car."

Creating location-based reminders:

  • "Remind me to buy CDs next time I go to Walmart."

Creating person-based reminders:

  • "Remind me to ask for vacation time next time I talk to Goran."

Creating time-based reminders:

  • "Remind me to watch the basketball game at 6 PM."
  • "Remind me to buy the food for the d&d session on Sunday at 3 PM."

Viewing reminders:

  • "Show me my reminders."

Cortana calendar voice commands:

Viewing calendar events:

  • "How's my schedule looking today?"
  • "Show me my appointments for next week."
  • "When is my dentist appointment?"

Adding new calendar events:

  • "Add dental appointment for Monday at 2 PM."

Moving calendar events:

  • "Move dental appointment to Friday at 5 PM."

Cortana alarms voice commands:

Creating alarms:

  • "Set an alarm for next Monday at 5:30 AM."
  • "Set an alarm for Saturdays at 9 AM."

Viewing alarms:

  • "Show my alarms"

Removing alarms:

  • "Cancel alarm for Saturdays at 9 AM."

Cortana timer voice commands:

Creating a timer:

  • "Set a timer for 5 minutes."
You can only start a one-timer at one point in time. If there is a timer already running, Cortana will ask you to restart it at a new time.

Viewing timer:

  • "Show timer."
  • "How much time is left on the timer?"

Canceling timer:

  • "Stop timer."

Cortana location voice commands:

Knowing your exact location:

  • "Tell me where am I?"

Cortana messaging voice commands:

Sending text messages:

  • "Send a text to Milan: I'll be late for lunch today."

Sending quick emails:

  • "Send email to Milena: See you later tonight."
  • "Send email to John and Claudia: How is the project coming along?"

Cortana location voice commands:

Getting directions:

  • "What's the traffic like on the way home?"
  • "How do I get home."
  • "How long would it take to drive to Madison Square Garden?"
  • "Get me directions to Port Authority."
  • "How do I get from my location to Long Beach, New York?"
  • "How far away is the moon?"
  • "Show me walking directions to the nearest gas station."
  • "Show me public transit to 11 Times Sq, New York, NY 10036."
  • "Show me the map of San Francisco."

Tracking flights:

  • "Track flight 1056."
  • "Is my flight delayed?"
  • "Is my flight on time?"

Cortana entertainment voice commands:

Controlling music:

  • "Play Metallica."
  • "Put some Symphonic music."
  • "Shuffle music."
  • "Play and Justice for all by Metallica."
  • "Stop music"
  • "Pause music"
  • "Pause song."
  • "Play next"
  • "Next track"
  • "Skip track."

Identifying what's playing:

  • "What is this song?"
  • "What's playing?"

Movies & TV:

  • "What's Blade Runner run time?"
  • "Who was the director of Gladiator?"
  • "What movies are playing near me?"
  • "What are the showtimes for Star Trek lower decks?"

Cortana technical support voice commands:

  • "How do I install a printer?"
  • "How do I project my screen?"
  • "How do I change my background?"
  • "How do I update Windows?"
  • "How do I make a backup?"
  • "How do I change default apps?"
  • "How do I change Privacy?"
  • "How do I connect a wireless device?"
Sometimes asking a "How to do I" question will result in a web search response.

Cortana phone voice commands:

  • "Call wife on speakerphone."
  • "Call David at home."
  • "Call Goran."
  • "Redial."
  • "Send a photo to my PC."

Cortana random voice commands:

  • "Tell me a joke."
  • "Tell me a riddle."
  • "Tell me something interesting."
  • "Tell me something funny."
  • "Tell me a scary story."
  • "Sing me a song."
  • "Surprise me."
  • "Do an impression."
  • "What do you look like?"
  • "Which is the best smartphone?"
  • "What is love?"
  • "Which is better, Google or Bing?"
  • "Why should I buy this phone?"
  • "What do you think about Google?"
  • "Do you like Google?"
  • "What do you think about Yahoo?"
  • "Do you like Windows 10?"
  • "Play the movie game."
  • "Are you better than Siri?"
  • "Where is Clippy?"
  • "What do you think about Clippy?"
  • "Heads or tails?"
  • "Rock, paper, scissors."
  • "Roll a dice."
Read More
How to remove GoodShop Landing

GoodShopLanding is a browser extension for Google Chrome, Mozilla Firefox, and Safari. This extension offers the latest coupons from a range of variety stores. While this may seem useful, this extension only offers coupons from sponsored stores, not all coupons available, so the only coupons that you will get are from the Extensions Ad network. You may see additional new tabs opening randomly while browsing the internet, these tabs are opened by GoodShopLanding and usually contain last-minute store deals.

As it is often distributed via potentially unwanted advertising, and impacts browser performance in a way that many users do not want, it is classified as a Browser Hijacker and thus flagged for optional removal. From the Author:
Shop online? Here’s your free automatic coupon finder, Gumdrop. Never miss a coupon again Gumdrop automatically applies the best coupons for you at checkout. Get the best deals anywhere With over 500,000 coupons, Gumdrop finds deals for thousands of stores, including Amazon, Expedia, and Papa John’s.

About Browser Hijackers

Browser hijackers (sometimes called hijackware) are a kind of malicious software that alters internet browser configurations without the computer owner’s knowledge or consent. These hijacks appear to be increasing at an astonishing rate around the globe, and it could be truly nefarious and sometimes harmful too. There are numerous reasons why you may have a browser hijack; but commercial, marketing, and advertising are definitely the primary purposes for their creation. Often, hijackers will force hits to sites of their choice either to increase traffic generating higher advertisement revenue, or to gain a commission for every user visiting there. However, it isn’t that harmless. Your web safety is jeopardized and it is extremely irritating. They not only mess up your web browsers, but browser hijackers can also modify the system registry, leaving your computer vulnerable to various other attacks.

Indications of browser hijack

There are many symptoms that indicate the browser is highjacked: your homepage is reset to some mysterious site; bookmark and the new tab are likewise changed; The default search page of web browser is changed; unwanted new toolbars are added to your web browser; you may see never-ending pop-up ads on your computer screen; web pages load very slowly and sometimes incomplete; you’re disallowed access to certain webpages, such as the site of an antimalware software developer like SafeBytes.

How they get into the computer

A browser hijacker can be installed on your computer if you go to an infected website, click an e-mail attachment, or download something from a file-sharing website. They can also be deployed via the installation of an internet browser toolbar, add-on, or extension. Browser hijackers sneak into your pc along with free software application downloads that you unknowingly install along with the original. A good example of some well-known browser hijackers includes Babylon, Anyprotect, Conduit, DefaultTab, SweetPage, RocketTab, and Delta Search, but the names are often changing. Browser hijackers may record user keystrokes to collect potentially invaluable information that leads to privacy issues, cause instability on computers, significantly disrupt user’s browsing experience, and finally slow down the computer to a stage where it will become unusable.

How you can get rid of browser hijackers

Certain browser hijacking can be simply corrected by identifying and removing the corresponding malware program from your control panel. Unfortunately, most of the software programs utilized to hijack a web browser are intentionally designed to be hard to remove or detect. Moreover, manual removal requires you to carry out many time-consuming and intricate steps which are tough to conduct for new computer users. Installing and running anti-malware software on the affected computer can automatically delete browser hijackers as well as other malicious applications. If you want to remove persistent browser hijackers quickly and effectively, install the top-rated Anti-Malware program Safebytes Anti-Malware. Along with anti-virus software, a system optimizer program can help you fix registry errors, get rid of unwanted toolbars, secure internet privacy, and enhance overall computer performance.

What you can do if Malware Stops You From Downloading Anti-virus?

Malware could cause all kinds of damage when they invade your system, from stealing your private information to deleting data files on your computer. Some malware sits in between the computer and the internet connection and blocks some or all sites that you really want to visit. It could also block you from adding anything to your machine, especially antivirus applications. If you are reading this, you may have got infected by malware that stops you from installing a computer security application like Safebytes Anti-Malware. Do as instructed below to get rid of the malware in alternate ways.

Download the application in Safe Mode with Networking

If the malware is set to load immediately when Microsoft Windows starts, entering Safe Mode could very well block the attempt. Since only the bare minimum applications and services start-up in safe mode, there are seldom any reasons for issues to take place. Here are the steps you should follow to boot into the Safe Mode of your Windows XP, Vista, or 7 computers (go to Microsoft site for instructions on Windows 8 and 10 computers). 1) At power-on/startup, press the F8 key in 1-second intervals. This will conjure up the “Advanced Boot Options” menu. 2) Use the arrow keys to select Safe Mode with Networking and hit ENTER. 3) When this mode loads, you should have internet access. Now, use your internet browser normally and navigate to https://safebytes.com/products/anti-malware/ to download Safebytes Anti-Malware. 4) Immediately after installation, do a full scan and allow the program to delete the threats it discovers.

Switch over to an alternate browser

Malicious program code could exploit vulnerabilities in a particular internet browser and block access to all anti-virus software sites. If you seem to have a virus attached to Internet Explorer, then switch over to an alternate web browser with built-in safety features, such as Firefox or Chrome, to download your favorite antivirus program – Safebytes.

Create a portable antivirus for removing malware

Another solution is to make a portable antivirus program on your USB stick. Adopt these measures to use a USB flash drive to fix your corrupted computer system. 1) Download Safebytes Anti-Malware or MS Windows Defender Offline onto a virus-free computer system. 2) Plug the USB drive into the clean PC. 3) Double-click the Setup icon of the antivirus software package to run the Installation Wizard. 4) Pick a USB flash drive as the location when the wizard asks you where you intend to install the software. Follow the directions to complete the installation process. 5) Remove the USB drive. You may now utilize this portable antivirus on the infected computer system. 6) Double click the Safebytes Anti-malware icon on the thumb drive to run the program. 7) Click the “Scan Now” button to begin the virus scan.

Let's Talk About SafeBytes Anti-Malware!

If you’re looking to download anti-malware software for your PC, there are numerous tools in the market to consider nonetheless, you cannot trust blindly anyone, regardless of whether it is paid or free program. Some of them are good but there are several scamware applications that pretend as legit anti-malware programs waiting to wreak havoc on your personal computer. When looking for antimalware software, pick one that provides solid, efficient, and total protection against all known computer viruses and malware. When thinking about reliable software programs, Safebytes AntiMalware is undoubtedly the highly recommended one. SafeBytes anti-malware is a powerful, highly effective protection tool made to help users of all levels of IT literacy in identifying and eliminating harmful threats from their personal computers. Once you’ve got installed this tool, SafeBytes superior protection system will ensure that no viruses or malicious software can seep through your PC. SafeBytes carries a variety of amazing features which can help you protect your PC from malware attack and damage. Listed below are some of the good ones: Real-time Threat Response: SafeBytes delivers complete and real-time security for your PC. It’ll monitor your personal computer for suspicious activity at all times and safeguards your PC from unauthorized access. Robust, Anti-malware Protection: With a critically acclaimed malware engine, SafeBytes gives multilayered protection which is made to catch and eliminate viruses and malware that are hidden deep inside your computer’s operating system. Fast Scan: Safebytes Anti-Malware, using its enhanced scanning engine, offers extremely fast scanning which can promptly target any active online threat. Safe Browsing: SafeBytes inspects the links present on a webpage for possible threats and alerts you if the site is safe to visit or not, through its unique safety rating system. Light-weight Tool: This software program is not “heavy” on the computer’s resources, so you’ll not see any performance troubles when SafeBytes is working in the background. 24/7 Online Technical Support: For any technical issues or product guidance, you could get 24/7 professional assistance through chat and email. To sum it up, SafeBytes Anti-Malware provides excellent protection combined with very low system resource usage with both great malware detection and prevention. You can be sure that your computer system will be protected in real-time once you put this software program to use. So if you’re searching for the absolute best malware removal application out there, and when you don’t mind shelling out some money for it, go for SafeBytes Anti-Malware.

Technical Details and Manual Removal (Advanced Users)

If you wish to do the removal of GoodShop Landing manually instead of employing an automated tool, you can follow these measures: Navigate to the Windows Control Panel, click the “Add or Remove Programs” and there, select the offending program to remove. In cases of suspicious versions of browser extensions, you can actually get rid of it through your browser’s extension manager. You will likely also want to reset your browser. To be certain of complete removal, find the following registry entries on your computer and remove them or reset the values appropriately. Please note that this is for professional users only and might be difficult, with wrong file removal leading to additional system errors. Additionally, certain malicious programs are capable to defend against its deletion. Doing this malware-removal process in Safe Mode is suggested.
Read More
A Quick Guide to Resolving Photoviewer.dll Error

Photoviewer.dll Error - What is it?

Photoviewer.dll is a shared library for SampleRes.dll and x3daudio1_1.dll in computers installed with Microsoft Windows 7, 8, Vista, and XP including 32 bit and 64 bit operating systems. Photoviewer.dll is associated with 1728000 system files. The Photoviewer.dll error occurs when you upgrade your Windows operating system to a new version like Windows 7 or 8 on which this shared library is used. Once you upgrade the Windows and you right-click on JPG images, the Photoviewer.dll error pops up. This error message is displayed as the following:
  1. Photoviewer.dll missing/not found
  2. Photovewer.dll entry point not found/application can’t initiate

Solution

Restoro box imageError Causes

Photoviewer.dll error can pop up due to several reasons. These include:
  • Modification of .dll files during Windows installation
  • Infection of Trojan virus
  • Photoviewer.dll missing /broken
  • Photo Gallery was earlier your default image editor before you upgraded your system
It is advisable to repair this issue timely to avoid inconvenience and serious PC threats especially if the cause of this issue is viral infection or registry damage.

Further Information and Manual Repair

Here are some of the best ways to help you resolve Photoviewer.dll error on your system:

1. Rebuild the Windows Photo Gallery

If you were previously using Vista and then you upgraded your system to Windows 7, then try this:
  • Go to the Start menu, click on the control panel and go to the folder options.
  • Then select the view tab option. Here you’ll find the Advanced setting window, select the show hidden files and folders tab.
  • Now click Ok to continue. Navigate to the following folder( %user% is the name of the account with the problem) C:\Usersusername\AppData\Local\Microsoft\Windows\Photo Gallery.
  • Then copy files to another location as a backup and delete them from the Windows Photo directory. Once the files have been deleted, try to start Windows Photo Gallery again. If this seems difficult, install Windows Photo Gallery application from the internet on your system.

2. Repair Broken Photoviewer.dll files and Remove Malware

Another way to fix the photoviewer.dll error is to download Restoro. This is an advanced, user-friendly, and multi-functional PC fixer smoothly integrated with a registry cleaner. By running it on your system you can resolve all Photoviewer.dll error causes in seconds. Restoro has an easy-to-use interface and a neat layout. It is safe, efficient, and bug-free. In addition to this, it is compatible with all Windows versions. The registry cleaning utility is deployed with an automated algorithm that scans your entire PC and detects Photoviewer.dll file errors in seconds. It fixes damaged, misconfigured, and broken Photoviewer.dll files, clears up disk space from unnecessary and obsolete files like the files from the uninstalled Windows programs which could be generating Photoviewer.dll error on your system. It repairs the registry and modifies the registry keys to their correct configuration thus repairing the Photoviewer.dll error on your PC. The powerful privacy error detector is integrated with all the properties and characteristics of an anti-virus. It scans for malware and viruses like Trojans and removes them from your system right away. Besides these utilities, other features integrated into this repair tool include a system stability scanner and Active X and class error detector. It resolves Photoviewer.dll error while optimizing your computer’s speed and performance. Click here to download Total System Care on your system to resolve the Photoviewer.dll file error today!
Read More
Should you buy used GPU in current market?
Things have stirred lately with Chinas ban on crypto mining and many used GPUs will flow the market probably. But should you buy a used GPU? Short answer: NO, long answer: keep on reading to find out why.

GPU 1080tiGPU shortage and its cause

As you all know by now, we live sadly in a world struck by a global Pandemic. Due to this awful disease and measures taken against it, many people are either working from home or are at home making the manufacturing of new chips problematic while demand on the market has raised. Throw into that mix crypto mining which has raised in popularity and you have, well today's market where we have GPU shortage. Now with the latest news that China has banned the mining of cryptocurrency, there is to be expected that at some point in time mining cards used there will fit the market in the whole world. Sadly even with a large quantity of GPUs that will become available, the overall price of cards will not be much lowered I am afraid since demand is still very high and many people would not want to purchase used mining cards and neither should you.

Be prepared for the worst scenario

Although this sounds very pessimistic and in most cases, it will not turn out to be true, you should always prepare yourself mentally that you might be in that lower percentage that will end up with a really bad GPU. What has come up to be absolutely true when considering GPU that were mining is that if anything at all can be done to GPU in order to increase performance, it has been done. Miners want to optimize and almost every GPU if could be overclocked, it was overclocked. Extensive mining also means that thermal paste has been dried and it is pretty useless at this point and there is a very high chance that fans and heat sinks will need much cleaning or even replacement raising the price of the card itself for mentioned paste, fans, and heat sinks. There's no way to tell what the previous owner might have done with a graphics card when you're shopping online, so our advice is to assume the worst. Don't trust the seller to give truthful information. Any listing that says it was "never used for mining" at this point is probably a lie.

Age of the GPU matters

Date when GPU itself has manufactured really matters. Newer cards even if used extensively have been used for a much shorter period of time and are not so damaged were ones produced a few years ago have seen a lot of action. Let’s say that you get RTX 3060, In the worst-case scenario it has been mining since late February of 2021 and basically, it is still under warranty so it should behave OK and put some good work in gaming even in that state. On another hand, if we take for example GTX 1080Ti which is 4 years old GPU things start to change drastically. 4 years GPU could be worn out even if it was used just for extensive gaming sessions let alone for mining.

No return policy and seller rating

Most of the time you will run into a product that cannot be returned or no refunds policy. This should bring a red flag right away and deter you from purchase. Sellers with the highest ratings are more trustworthy since many of them will not want to destroy their reputation but these will probably not even have these kinds of merchandise in their store. Buying with a poor rating seller and no return policy on a product is just asking for trouble. And although some stores do have arbitration and will stand on the customer side there is no guarantee for that and it will take too much time to process.

If you really must buy a second-hand GPU

Of course in these troubled times sometimes due to malfunction or any other reason, there would not be another choice than to buy a second-hand GPU. In this case, if there is no other option consider sellers with many positive ratings. If you can buy locally that would even be better or the best-case scenario would be if you could visually see and inspect GPU itself in order to see in what state it is. Look for warranty stickers to see if they are thorn and the card has been tampered with. Also take a good look at screws, if they have scratches card has been opened, probably to replace fan or heating sinks which means that it has worked a lot.

Conclusion

It is very difficult to give the best possible advice on this situation since of GPU shortage, but I would much prefer a new GPU with lower performance than a hi-performance one which was mining.
Read More
Mac advantages over Windows PC
apple iMac

Mac OS

A solid reason to switch to Mac from Windows PC is Mac OS. Based on Linux, offers more stability and better security than Windows but you will not be able to find a vast array of applications on it.

Even when Mac OS X (the first big one) was first introduced, it looked and felt like ages beyond Windows (Microsoft just recently made a slick and modern design with Windows 11). Under the hood, it turned out that the operating system itself is stable and incredibly fast & responsive. If you value stability and easiness of use, Mac OS is the Operating system for you.

Apple ecosystem

This one is easy, if you are already invested in apple devices like iPhone and iPad, having an apple computer is one step forward into the apple ecosystem and one more step into easy sharing of documents and data between devices.

Calendars, emails, photos, videos, documents, and many more can easily be shared and synched between devices with a single apple ID making workflows much easier than on other operating systems.

Development

Developers all around the world say that developing on Mac is much better and smoother than on PC, this has probably to do something with OS being based on Linux but whatever the case is, it is much smoother and it just feels better. Apple laptops are often the go-to choice of developers for a reason.

Also if you are in the development business for applications and services aimed at iPhone or iPod then there is no really another way than to be into the apple ecosystem and own apple hardware.

Professional software

A lot of professional-grade software exists for both the Windows platform and Mac OS but there is some software that exists exclusively for Apple hardware like Final Cut Pro or Logic Pro. Both applications are used by professionals and are industry-standard software.

Logic pro is used by industrial audio specialists all around the world and is used in professional studios. Final Cut Pro is also used worldwide by video editors and if you are specializing in any of these two fields Mac seems like a very reasonable platform since the software can not be found on Windows. These two are examples, there are other similar applications that are only available on Mac OS

Longevity

Apple hardware is made of high-quality materials and components and it is proven over time that it lasts longer than usual. There are iPhones out there that have 13 years and they are still working, G3 and G4 Macs that are still functional.

When buying Apple products they will outlive other ones if treated properly so in the end you could be saving money by purchasing them.

Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status