Hello everyone and welcome to another great tutorial from errortools.com I hope everyone is feeling great and that you are prepared to boost the performance of your computer. This time we will speed up Windows startup time and overall performance by eliminating startup programs that we don't need and do not use.
Microsoft itself and some application developers tend to have some applications or some services always active and set to be loaded on Windows startup. If you want to change which of these applications are starting up with your Windows and change them, follow this easy guide and you will be speeding up your Windows in no time.
First thing is to open a task manager, fastest and most direct way of doing this is with a keyboard combination of CTRL + SHIFT + ESC
When Task Manager opens, click on the startup tab on top.
Once you click on startup you will get a list of applications that are set to be started when Windows is booted.
You can now click on the application and then click on disable on the bottom button, the application status will update in task manager to disabled and it will not be booted anymore when Windows starts. In this same manner, you can enable back some applications if you changed your mind about them.
Please note that some applications are using some services and must have them running or they will not work properly. The best practice is to disable applications you are positive you will not use or use rarely so you do not want them to slow down Windows.

Error CausesWindows 11 is a good-looking operating system but people love to make things personal and to their liking so we decided to help you in this mission with small customization of changing default system fonts inside Windows 11.
Since there is no really easy way to just switch the font windows is using for itself we will have to tweak a registry a little so before we start please do make a backup of the registry file and follow the steps as they are presented in order to avoid any errors and break the system.

So, if all precautions are made and you are ready to change your Windows appearance let's dive right into it:
There are vast free font sites on the internet where you can find fonts that you like and wish to use but be very careful with your desired font selection. The font that you choose needs to be a complete typeface, meaning that it has to contain all glyphs, large and small font sizes, all special characters, etc or you will experience that in certain areas nothing will be displayed.
Once you have found the font that you like and made sure it is a complete font, install it on your system (you can skip this step if you just want to change the system font with one already installed on your system)
Open notepad or a similar plain text editor in order to create a file that will apply changes directly into the registry and create a new file. Inside the file paste this text:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts]
"Segoe UI (TrueType)"=""
"Segoe UI Bold (TrueType)"=""
"Segoe UI Bold Italic (TrueType)"=""
"Segoe UI Italic (TrueType)"=""
"Segoe UI Light (TrueType)"=""
"Segoe UI Semibold (TrueType)"=""
"Segoe UI Symbol (TrueType)"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes]
"Segoe UI"="NEW-FONT"
All the way to the bottom where it says: "Segoe UI"="NEW-FONT", change NEW-FONT with the font name that you have chosen or installed in the previous step. For example: "Segoe UI"="Ubuntu".
Now go to File > Save As and name your file however you want but give it REG extension so it looks like: my_new_windows_font.REG
Now that you have your registry entry saved, locate it and double-click on it, at this stage Windows warning will probably pop up, you can just ignore it and click on YES since you wrote the file and know what it is. After registry entry is applied reboot your PC in order for changes to take effect.
If you want to change the font to another one, just repeat this procedure again. If you want to roll back to using the default Windows font, repeat the process but with this code instead of the one provided in the REG file:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts]
"Segoe UI (TrueType)"="segoeui.ttf"
"Segoe UI Black (TrueType)"="seguibl.ttf"
"Segoe UI Black Italic (TrueType)"="seguibli.ttf"
"Segoe UI Bold (TrueType)"="segoeuib.ttf"
"Segoe UI Bold Italic (TrueType)"="segoeuiz.ttf"
"Segoe UI Emoji (TrueType)"="seguiemj.ttf"
"Segoe UI Historic (TrueType)"="seguihis.ttf"
"Segoe UI Italic (TrueType)"="segoeuii.ttf"
"Segoe UI Light (TrueType)"="segoeuil.ttf"
"Segoe UI Light Italic (TrueType)"="seguili.ttf"
"Segoe UI Semibold (TrueType)"="seguisb.ttf"
"Segoe UI Semibold Italic (TrueType)"="seguisbi.ttf"
"Segoe UI Semilight (TrueType)"="segoeuisl.ttf"
"Segoe UI Semilight Italic (TrueType)"="seguisli.ttf"
"Segoe UI Symbol (TrueType)"="seguisym.ttf"
"Segoe MDL2 Assets (TrueType)"="segmdl2.ttf"
"Segoe Print (TrueType)"="segoepr.ttf"
"Segoe Print Bold (TrueType)"="segoeprb.ttf"
"Segoe Script (TrueType)"="segoesc.ttf"
"Segoe Script Bold (TrueType)"="segoescb.ttf"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes]
"Segoe UI"=-
Hive ransomware has been targeting Microsoft exchange servers lately vulnerable to ProxyShell security issues in order to deploy various backdoors. Once the backdoor has been placed various attacks can be performed including but not limited to network reconnaissance, stealing admin accounts, taking valuable data, and even installing and deploying file-encrypting algorithms.

ProxyShell is a set of three vulnerabilities in the Microsoft Exchange Server that allows remote code execution without authentication on vulnerable deployments. The flaw has been used in past by various ransomware like Conti, BlackByte, Babuk, Cuba, and LockFile.
Security vulnerabilities have been reported to be fully patched on May 2021 but how Hive was able to still be successful in exploiting PowerShell and infiltrating into the system there seems to be still some unpatched and open issues.
Hive has gone a long way since it was first observed in the wild back in June 2021, having a successful start that prompted the FBI to release a dedicated report on its tactics and indicators of compromise.
In October 2021, the Hive gang added Linux and FreeBSD variants, and in December it became one of the most active ransomware operations in attack frequency.
Last month, researchers at Sentinel Labs reported on a new payload-hiding obfuscation method employed by Hive, which indicates active development.
Keeping your PC clean is not rocket science and you can do it with things you already and probably have in your house. One thing that I would recommend tho to purchase is antistatic gloves since they could prevent any kind of electrostatic discharges thus protecting your electric components.
If you have the option to disconnect your PC and get it outdoors, I would highly recommend this approach since all the dust will be dusted outside and not in the room where your computer is. If you can not it is still ok, but since some portion of dust will be set in the room, you might need to dust your room after cleaning your computer.
Roblox is a very popular online game with millions of gamers playing it each day and as such it will naturally bring a lot of malware and attack on players trying to steal and exploit them for monetary gains. The latest attack and high-profile stealing of currency and assets happened exactly in Roblox.

Malicious activities have been reported to come from chrome extensions. So far 2 extensions have been identified that have hidden malware inside them but there could be more of them currently undetected. Extensions work as a front while in the back they mine user logins and other data in order to steal stuff from the Roblox platform.
To make things worse some of the malware is within long extensions like SearchBlox. The SearchBlox extension allows you to search quickly for other users if it was legitimate but has been compromised within the last month. There is evidence that people are stealing Roblox currency with the data gathered by the hidden backdoor in it.
SearchBlox extension is still Active in Chrome Web Store, with the primary listing still with the "Featured " badge. Google is actively removing malicious software from its storefront on a regular basis but this one still lingers in it.
If you or your kid have this Chrome extension installed, uninstall it right away and always be careful about which extension you install and give access to your system, keep them updated and check various blogs and article sites to inform yourself when a bad one is found.
diskpart
list disk
select disk number
list partition
select partition number
active