Configuring Snapping feature in Windows 11

The Snapping feature was introduced as an essential part of Windows 11 and I like it very much, it lets you organize your opened windows much faster and with more control. However, some people do not like the feature, worry not because you can turn it off, or if you prefer you can just remove the showing layout option that is shown when hovering over Minimize/Maximize button.

Snapping feature windows 11Removing options all together

To completely turn off Snap layout in Windows 11 follow these steps

  1. Open Windows 11 settings by pressing ⊞ Windows + I
  2. Select System on the left part of the screen
  3. In System options select Multitasking
  4. At the top of Multitasking Click on the switch next to Snap Windows
  5. Close settings

Changes will be automatically applied and you will no longer have Snap layout functionality.

Removing layout graphic from Snapping feature

If you like the snap Layouts feature but are not very fond of the layout graphic that is popping up each time you hover over Minimize/Maximize button do not worry, there is an option to turn just that off and keep the feature itself.

  1. Open Windows 11 settings by pressing ⊞ Windows + I
  2. Select System on the left part of the screen
  3. In System options select Multitasking
  4. Click on the Snap Windows menu
  5. Deactivate Show Snap Layouts When I Hover over a Window’s Maximize button
  6. Close settings

Now you will be able to use the Snap Layout feature without layout graphics showing. If you want to reverse any of these options and go back to standard-setting, just follow the steps and turn features ON.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

How to Fix Windows 10 Update Error Code 80004002

Error Code 80004002 - What is it?

Error code 80004002 will be encountered when there are absent registry keys. These missing registry keys will hinder an update process when initiated. However, this error code can be averted once the user makes a reinstall of the Windows Update Client. The steps will be highlighted throughout the article.

Solution

Restoro box imageError Causes

Error code 80004002 might occur for various valid reasons. In cases of installing programs, a user might mistakenly install a new program over another, that was not properly (completely) uninstalled. This could cause a stack-up of registry keys and error messages. Additionally, error code 80004002 might be a consequence of malware, viruses, and adware.

Further Information and Manual Repair

If left unchecked, error code 80004002 could amount to system freezes and crashes, slow computer performance, error codes upon installation, and even blue screen errors. To fix this error code, you might want to attempt one or all the methods below. This is due to the fact that the problem might stem from various reasons.

Method 1: Safe Mode

Ensure to boot your computer in safe mode. This is to ensure that you are properly able to troubleshoot Windows update error code 80004002. To load your computer in safe mode, turn on the computer, press F8 before it fully loads to the ‘sign in’ screen.

Method 2: Update Outdated Drivers

One of the many reasons why you’ll encounter error code 80004002 is in light of the fact that your drivers might have been outdated. To check if your driver is outdated, Right click on the Start menu, select the Device Manager option. From there, you’ll be able to tell which device(s) is corrupted and needs updating.

Method 3: Reinstall Windows Update Client

To perform this process, follow the steps below:
  1. Locate “My Computer” or “This PC” on your device.
  2. Select the “Properties” option.
  3. Under the System option, determine whether your System type is 64-bit or 32-bit version of Windows.
  4. Use the links below to install the Windows Update client:

Click for 32-bit Operating System

Click for 64-bit Operating System

  1. After installation, search for Windows Update from the Search option.
  2. Select the Check for Updates option.
  3. Once any updates are found, hit Install Updates.

Method 4: Use An Automated Tool

If you wish to always have at your disposal a utility tool to fix these Windows 10 and other related issues when they do arise, download and install a powerful automated tool.
Read More
How to remove MyWebFace

MyWebFace is a browser extension developed by Mindspark. This extension claims to allow users to easily access websites that allow them to make a cartoon portrait of themselves. While this may seem interesting in the beginning, all this extension does is to add links to already popular websites that are easy to find.

When installed MyWebFace changes your default search engine and your home page to MyWay.com.

While the extension is running it gathers user browsing information, allowing it to mine data and better server unwanted ads throughout your browsing sessions. MyWebFace has been marked as a Browser Hijacker by many anti-virus programs, and while not considered malware, it is not recommended to keep it on your computer.

About Browser Hijackers

Browser hijackers (sometimes referred to as hijackware) are a type of malicious software that alters web-browser configurations without the user’s knowledge or consent. These hijacks happen to be rising at a worrying rate worldwide, and it could be really nefarious and sometimes harmful too. Browser hijackers are capable of doing a variety of things on your PC. In general, hijackers are made for the benefit of online hackers often through revenue generation that comes from forced ad clicks and website visits. Although it may seem naive, all browser hijackers are harmful and thus always classified as security risks. Browser hijackers could also let other destructive programs without your knowledge further damage the computer.

Indications of browser hijack

There are numerous signs that indicate the browser is highjacked: 1. the browser’s home page is changed 2. if you enter a URL, you find yourself constantly directed to a different web page than the one you intended 3. the default web engine has been changed and your web browser security settings have been lowered without your knowledge 4. unsolicited new toolbars are added to your web browser 5. you observe numerous ads pop up on the web browsers or computer screen 6. your browser gets sluggish, buggy crashes often 7. you can’t go to certain websites like home pages of anti-malware software.

How does a browser hijacker infect a PC

Browser hijackers can get into a PC in some way or other, for instance via downloads, file sharing, and e-mail also. They also come from add-on applications, also known as browser helper objects (BHO), web browser extensions, or toolbars. Also, some shareware and freeware can put the hijacker within your computer through “bundling”. Typical examples of browser hijackers include Conduit, CoolWebSearch, OneWebSearch, Coupon Server, RocketTab, Snap.do, Delta Search, and Searchult.com. Browser hijacking can cause severe privacy problems and even identity theft, disrupt your browsing experience by taking control over outgoing traffic, substantially slows down your PC by deleting lots of system resources, and lead to system instability at the same time.

Browser Hijacker Malware – Removal

Certain hijackers can be removed simply by uninstalling the corresponding freeware or add-ons from the Add or Remove Programs in the Windows control panel. In some cases, it can be a difficult task to discover and get rid of the malicious piece because the associated file will be running as part of the operating system process. Moreover, manual removal requires you to execute several time-consuming and complex procedures that are tough to conduct for inexperienced computer users. Browser hijackers could be effectively removed by installing the anti-malware application on the affected system. To get rid of any type of browser hijacker from your computer, you could download this particular top-notch malware removal program – SafeBytes Anti-Malware. And use a system optimizer, such as Total System Care, to eliminate all related files from the registry and repair browser issues.

Tips on How to Eliminate a Virus that is Blocking Websites or Preventing Downloads

Malware may cause several different types of damage to PCs, networks, and data. Some malware is meant to restrict or block things that you wish to do on your personal computer. It may well not permit you to download anything from the internet or stop you from accessing some or all sites, in particular the anti-virus sites. If you’re reading this, chances are you’re stuck with a malware infection that is preventing you to download or install the Safebytes Anti-Malware program on your system. Even though this type of problem can be tougher to get around, there are a few actions you can take.

Start Windows in Safe Mode

The Windows OS includes a special mode known as “Safe Mode” where just the bare minimum required programs and services are loaded. In case the virus is set to load immediately when the PC starts, switching to this mode may prevent it from doing so. To start the computer into Safe Mode, press the “F8” key on the keyboard right before the Windows boot screen appears; Or after normal Windows boot up, run MSCONFIG, look over “Safe Boot” under the Boot tab, and click Apply. Once you’re in safe mode, you can attempt to install your antivirus software application without the hindrance of the malicious software. Following installation, run the malware scanner to eliminate standard infections.

Switch over to an alternate internet browser

Some malware only targets certain internet browsers. If this is your case, utilize another web browser as it might circumvent the computer virus. If you suspect that your Internet Explorer has been hijacked by malware or otherwise compromised by hackers, the best course of action is to switch to an alternate browser like Chrome, Firefox, or Safari to download your favorite computer security software – Safebytes Anti-Malware.

Install and run anti-virus from a USB drive

To effectively get rid of the malware, you should approach the problem of running an anti-malware software program on the affected computer from a different angle. To run anti-virus using a USB flash drive, follow these simple steps: 1) Use another virus-free computer system to download Safebytes Anti-Malware. 2) Insert the USB drive into the uninfected PC. 3) Double-click the Setup icon of the anti-malware software package to run the Installation Wizard. 4) When asked, select the location of the USB drive as the place in which you would like to store the software files. Do as instructed on the screen to complete the installation process. 5) Transfer the thumb drive from the clean computer to the infected computer. 6) Double-click the anti-malware software EXE file on the USB flash drive. 7) Click the “Scan Now” button to start the virus scan.

Highlights of SafeBytes Anti-Malware

If you are looking to install an anti-malware program for your PC, there are numerous tools on the market to consider nonetheless, you just cannot trust blindly anyone, irrespective of whether it is a free or paid program. A few of them do a good job in removing threats while some will harm your computer by themselves. You should choose one that is efficient, practical, and has a strong reputation for its malware source protection. On the list of strongly recommended software is SafeBytes Anti-Malware. SafeBytes has a superb history of top-quality service, and customers appear to be very happy with it. SafeBytes anti-malware is a reliable tool that not only secures your PC permanently but is also quite easy to use for people of all ability levels. With its outstanding protection system, this utility will quickly detect and remove the majority of the security threats, including browser hijackers, viruses, adware, ransomware, trojans, worms, and PUPs.

There are many amazing features you will get with this particular security product. Listed below are a few of the great ones:

Antimalware Protection: Using its enhanced and sophisticated algorithm, this malware elimination tool can identify and remove the malware threats hiding in your PC effectively. Real-time Threat Response: Malware programs looking to enter the computer are discovered and stopped as and when detected by the SafeBytes real-time protection shields. This tool will continuously monitor your PC for any suspicious activity and updates itself continuously to keep abreast of the constantly changing threat scenarios. Faster Scanning: This software has one of the fastest and most powerful virus scanning engines in the industry. The scans are extremely accurate and take a little time to complete. Safe Web Browsing: Through its unique safety ranking, SafeBytes notifies you whether a site is safe or not to visit it. This will assure that you’re always certain of your online safety when browsing the net. Minimal CPU Usage: SafeBytes is a lightweight and user-friendly anti-virus and anti-malware solution. As it uses very low computer resources, this program leaves the computer’s power exactly where it belongs: with you actually. 24/7 Guidance: You can obtain absolutely free 24/7 technical assistance from their computer experts on any product queries or PC security issues. To conclude, SafeBytes Anti-Malware is really great for securing your computer against all kinds of malware threats. You now may understand that this particular software does more than just scan and eliminate threats in your PC. You will get the best all-around protection for the money you spend on SafeBytes Anti-Malware subscription, there isn’t any doubt about it.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove MyWebFace without the use of an automated tool, it might be actually possible to do so by removing the program from the Windows Add/Remove Programs menu, or in cases of browser plug-ins, going to the browsers AddOn/Extension manager and removing it. You will likely also want to reset your browser. Lastly, check your hard disk for all of the following and clean your computer registry manually to remove leftover application entries after uninstallation. However, editing the registry can be a difficult job that only advanced users and professionals should try to fix it. Moreover, certain malicious programs are capable to defend against its deletion. You’re advised to do this process in Safe Mode.
Files: %PROGRAMFILES%\MyWebFace_5aEI\Installr.binaEZSETP.dll %PROGRAMFILES%\MyWebFace_5aEI\Installr.bin\NP5aEISb.dll Search and Delete: 5aauxstb.dll 5abar.dll 5abarsvc.exe 5abrmon.exe 5abrstub.dll 5adatact.dll 5adlghk.dll 5adyn.dll 5afeedmg.dll 5ahighin.exe 5ahkstub.dll 5ahtmlmu.dll 5ahttpct.dll 5aidle.dll 5aieovr.dll 5aimpipe.exe 5amedint.exe 5amlbtn.dll 5amsg.dll 5aPlugin.dll 5aradio.dll 5aregfft.dll 5areghk.dll 5aregiet.dll 5ascript.dll 5askin.dll 5asknlcr.dll 5askplay.exe 5aSrcAs.dll 5aSrchMn.exe 5atpinst.dll 5auabtn.dll CREXT.DLL CrExtP5a.exe NP5aStub.dll T8EXTEX.DLL T8EXTPEX.DLL T8HTML.DLL T8RES.DLL T8TICKER.DLL Folders: C:\Documents and Settings\username\Application Data\Mozilla\Firefox\Profiles\gb5e8gtn.default\extensionsaffxtbr@MyWebFace_5a.com C:\Documents and Settings\username\Application Data\MyWebFace_5a C:\Program Files\MyWebFace_5a Registry: Key HKLM\SOFTWARE\MyWebFace_5a Key HKLM\SOFTWARE\MozillaPlugins\@MyWebFace_5a.com/Plugin Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyWebFace_5abar Uninstall Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\b1df253a-9e7a-480d-b6a5-7a435b520dbb Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\14d02517-c8be-4735-a344-3c8366c77aa0 Key HKLM\SOFTWARE\Classes\MyWebFace_5a.ThirdPartyInstaller Key HKLM\SOFTWARE\Classes\MyWebFace_5a.SkinLauncherSettings Key HKLM\SOFTWARE\Classes\MyWebFace_5a.SkinLauncher Key HKLM\SOFTWARE\Classes\MyWebFace_5a.ScriptButton Key HKLM\SOFTWARE\Classes\MyWebFace_5a.SettingsPlugin Key HKLM\SOFTWARE\Classes\MyWebFace_5a.RadioSettings Key HKLM\SOFTWARE\Classes\MyWebFace_5a.Radio Key HKLM\SOFTWARE\Classes\MyWebFace_5a.PseudoTransparentPlugin Key HKLM\SOFTWARE\Classes\MyWebFace_5a.MultipleButton Key HKLM\SOFTWARE\Classes\MyWebFace_5a.HTMLPanel Key HKLM\SOFTWARE\Classes\MyWebFace_5a.HTMLMenu Key HKLM\SOFTWARE\Classes\MyWebFace_5a.FeedManager Key HKLM\SOFTWARE\Classes\MyWebFace_5a.DynamicBarButton Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Value: MyWebFace_5a Browser Plugin Loader Data: 5aPlugin.dll Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Value: MyWebFace Search Scope Monitor Data: 5abrmon.exe Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Value: MyWebFace Data: MyWebFace.dll
Read More
Fix Hello Errors 0x801c004d or 0x80070490
As you know, Windows Hello offers you quick access to computers since you can log in to your Windows devices three times faster compared to passwords with the help of the camera via Face recognition and fingerprint reader. This way, Windows Hello will recognize you right away. However, there are also times when you might encounter some problems when using Windows Hello. For one, if you are trying to add the PIN method to Windows Hello on your Windows 10 computer but you suddenly encountered an error code of 0x801c004d or if you are trying to use your existing pin and you encounter an error code of 0x80070490 along with an error message that says, “Not recognized”, then read on as this post will guide you on how you can fix both of these errors. Here is the complete content for both errors:
  • 0x801c004d – Unable to enroll a device to use a PIN for login”
  • 0x80070490 - Not recognized, Pin and fingerprint are no longer options for signing in”
If you got any of these two errors, there are several potential fixes you can check out to resolve them. You can try to check for any Windows Updates or create the PIN again or check the CNG Key Isolation Service. You could also try to reset the TPM or create a new User Account. For more information, follow the instructions provided below.

Option 1 – Try checking for any available Windows Updates

The first thing you can do is to check for any available Windows Updates. It is possible that your computer may be outdated and is the reason why you’re having troubles with Windows Hello. To check for Windows Updates, just go to Settings and from there, head over to the Update and Security section and click on Windows Updates located on the left pane, and then click on the Check for Updates option. Wait until the process of checking updates is completed and if it finds new updates, install it. After you install the new Windows Updates, check if you can now add the PIN on Windows Hello or not.

Option 2 – Try creating the PIN again

The next thing you can do is to create the PIN again by signing out and signing in again and then try creating the PIN once more. If this does not work, you can try restarting your computer and creating the PIN again. You could also try removing the PIN and then change it.
  • Remove the PIN by going to Settings > Accounts > Sign-in options.
  • From there, go to the PIN section and click on the Remove button.
  • You will be asked to verify your account to proceed in removing the PIN, enter your credentials.
  • Restart your computer and then set up a new PIN.
  • Once you’re done, restart your computer and check if the error is gone now.

Option 3 – Try checking the CNG Key Isolation Service

The CNG Key Isolation Service is the one that stores and uses long-lived keys in a secure process complying with the common criteria requirements and it is possible that the error could be related to this service. This service is hosted in the LSA processes and provides key process isolation to private keys and associated cryptographic operations as required by the common criteria. Thus, you need to check this service to see if it’s the one that’s causing the error.
  • Tap the Win + R keys to open the Run dialog box and type “services.msc” in the field and hit Enter to open the Windows Services Manager.
  • Next, locate the “CNG Key Isolation Service” and once you find it, double click on it to open its Properties box.
  • After opening its Properties, check its Startup type and select Manual. This is the default setting and if it is Disabled, then it’s no wonder why you’re getting errors with Windows Hello, thus, you need to enable it.
  • Once done, restart your computer and check if you can now add the PIN to Windows Hello. If you still get the error, then you might want to try setting the CNG Key Isolation Service from Manual to Automatic and then click on the Start button and see if it fixes the error or not.

Option 4 – Try to reset the Trusted Platform Module or TPM

You might also want to try resetting the Trusted Platform Module or TPM to fix the error. You can do this by opening Windows PowerShell and then executing the “Clear-Tpm” command. After that, check if the error is now resolved.

Option 5 – Try to create a new User Account

You could also try to create a new User Account on your Windows 10 computer to fix the Windows Hello error. Once you have created a new local user or administrator account in Windows 10, check if you are now able to add the PIN from this newly created user account.
Read More
The Steam Autumn sale is coming!

Oh, gamers rejoice, the Steam autumn sale is just around the corner!!!

The sale starts on November 22nd and lasts until November 29th. A great deal for any gamer, especially for ones that have plenty on their wishlist. Speaking of wishlists now would be a good time to place some interesting titles on them so you can be notified about discounts on them.

If you by any chance are unavailable to participate in the Autumn sale, do not worry, Steam winter sale is coming on December 22nd and it will last until January the 5th so you can save for it.

The best tactic for sale is not to jump on the train right away, it is best to wait until a few days, maybe even until the last 2 days since some games can go even lower on discount in the last days of the sale. Also, there might be also some packages that include games you wish to buy but are packed with other ones in a bundle and even with a higher discount.

So get prepared for the upcoming sale and treat yourself to something nice!

steam sale
Read More
What is USB Kill Kit

USB Kill, a USB device is able to fry and damage your computer, mobile phone, router, etc. This device is quite dangerous and can kill electronics the moment it is inserted into an available port. By now people should know that they should not put unknown USB sticks into their devices because of potential virus and malware threats but this raises using unknown sticks to a whole new level.

usb kill kit

Kill kits are not really new to the market, they have existed before but lately, technology really progressed and the latest USB sticks are really good, their success rate is around 95% which is pretty high and should not be taken lightly.

The second thing that you really should not play with strange USB sticks is that they dropped in price really hard, although top Kill kits will still go as high as around 300 USD, there are really cheap ones lurking in Ali Express that are just 6 USD!!! that makes them affordable devices for the mass market.

The device is made to take energy and current from the port it is plugged in, multiply it and release its charge back into the device, successfully frying some components immediately. Some more professional Kill sticks can even fry devices even when the device itself is not powered and can be even started remotely.

The point of this article is to make you aware that you should not in any kind of circumstances use and plug-in USB sticks into your devices that you do not know where they come from, especially from the mail!!

Read More
Fix DRIVER_VERIFIER_DETECTED_VIOLATION
Driver Verifier is a built-in tool in Windows 10 that monitors device drivers on your computer, if it detects issues with drivers, it will attempt to fix the issue. If you are encountering Blue Screen for a Driver and after running Driver Verifier you get another with message DRIVER_VERIFIER_DETECTED_VIOLATION ten follow this article step by step in order to solve it. There is a chance that you will maybe even have to do this in safe mode, if that is your case, login into safe mode and proceed, otherwise proceed normally.
  1. Update Device Drivers

    the most common issue with the blue screen is old Drivers, in most cases, graphical drivers, update all Drivers with the latest versions and see if this will resolve the issue.
  2. Stop or uninstall Virtualization software

    Virtua machine software is a great way to have a safe environment and to experiment while preserving your Windows installation intact, however sometimes due to the nature of these applications they can be a case for blue screen errors. Stop virtualization software to see if it will remove the issue. If that is the case, try another virtualization application
  3. Disable Driver Verifier

    Press ⊞ WINDOWS + X to open the secret menu Click on Command Prompt (admin) Inside command prompt type: verifier and press ENTER Select the Delete existing settings radio button Click Finish Reboot your computer
  4. Reset Driver Verifier

    Press ⊞ WINDOWS + X to open the secret menu Click on Command Prompt (admin) Inside command prompt type: verifier /reset and press ENTER Reboot your computer
  5. Use system restore

    Rollback Windows to the previous state where everything was working fine.
Read More
FreeDownloadManager Removal Tutorial

Free Download Manager is a software program developed by FreeDownloadManager.ORG. According to the publisher:

This software downloads files and converts videos. Its features include integration with all browsers, support of downloads from RapidShare, BitTorrent support, adjusting traffic usage, resuming broken downloads, and adds BitTorrent support, flash video download, upload manager, portable mode, and remote control.

During setup, the program creates a startup registration point in Windows in order to automatically start when any user boots the PC. It adds a browser extension to help it cache files you are downloading over your browser. The software is designed to connect to the internet and adds a Windows Firewall exception in order to do so without being interfered with. It also hooks up to start automatically and cache every download even if it's turned off.

This software comes bundled with video converters that some anti-virus programs marked as malware and therefore it is considered a potentially unwanted program.

About Potentially Unwanted Applications

If you’ve ever downloaded freeware or shareware, odds are high that your computer can get installed with a bunch of unwanted programs. These unwanted applications, officially known as Potentially Unwanted Programs (PUPs), often come bundled with other software and install themselves on user’s computers without their knowledge. They might not look like computer viruses to some individuals, but they can create huge annoyances and lead to serious difficulties for users. It’s clear by its name – unwanted programs – but did not really constitute “malware” in the traditional sense. What makes a PUP different from malware is the fact that when you download one, you’re doing it with your approval – even though in most cases unconsciously and unwillingly. Nevertheless, there is no doubt that PUPs continue to be bad news for PC users as they can be incredibly detrimental to your computer in several ways.

How does unwanted software affect you?

Unwanted programs come in various forms. Usually, they could be found in adware bundlers that are known to use aggressive and deceptive advertising. The majority of bundlers install multiple adware applications from a number of companies, each of which has its own EULA policy. Safebytes Anti-Malware entirely eliminates this threat and safeguards your PC against PUP or adware infection. They will also come in the form of web browser extension add-ons and toolbars. Not just they needlessly fill up space on your computer screen, toolbars could also manipulate search results, keep an eye on your web browsing activities, decrease your internet browser’s efficiency, and slow down your net connection to a crawl. Potentially unwanted programs utilize aggressive distribution methods to get in your computer. They will often include things like information gathering code that will collect and send your private information to other companies. Due to this unwanted program, your application may freeze, your security protections may get turned off that can leave your computer susceptible, your system could get damaged, and this list goes on and on.

Tips to prevent PUPs

• Always read the license agreement and privacy statement. Don’t agree unless you understand exactly what you are acknowledging. • Always choose “Custom” or “Advanced” installation and don’t blindly click the Next button, which will allow you to uncheck any foistware software programs you do not want. • Install an ad blocker/pop-up blocker; Add anti-malware products such as Safebytes Anti-Malware. These applications could establish a wall between the computer and cybercriminals. • Be alert if you install freeware, open-source programs, or shareware. Nowadays ‘freeware’ is not really freeware – but ‘crapware’ bundling nonsense. • Always download software from trusted sources like official websites instead of untrustworthy sharing space. Avoid file-hosting sites wherever possible.

Can't Install Safebytes Anti-malware due to the presence of Malware? Do This!

Malware could cause plenty of damage to your PC. Some malware types modify browser settings by including a proxy server or change the PC’s DNS configurations. In these cases, you’ll be unable to visit certain or all of the internet sites, and thus not able to download or install the required security software to remove the infection. If you are reading this article, you may have got infected by malware that stops you from installing a computer security program such as Safebytes Anti-Malware. There are some fixes you can attempt to get around with this obstacle.

Get rid of viruses in Safe Mode

In the event the malware is set to load at Windows startup, then booting in safe mode should avoid it. Only minimal required programs and services are loaded whenever you boot your PC in Safe Mode. To launch your Windows XP, Vista, or 7 computers in Safe Mode with Networking, do as instructed below. 1) Tap the F8 key continuously as soon as your PC boots, however, before the large Windows logo appears. This would conjure up the Advanced Boot Options menu. 2) Choose Safe Mode with Networking using arrow keys and hit Enter. 3) Once you get into this mode, you should have an internet connection once again. Now, use your browser normally and navigate to https://safebytes.com/products/anti-malware/ to download and install Safebytes Anti-Malware. 4) Following installation, run a complete scan and let the software program remove the threats it discovers.

Obtain the anti-malware program using an alternate browser

Web-based viruses could be environment-specific, targeting a particular web browser or attacking particular versions of the web browser. In case you suspect that your Internet Explorer has been hijacked by a computer virus or otherwise compromised by online hackers, the most effective thing to do would be to switch to a different browser like Chrome, Firefox, or Safari to download your chosen computer security program – Safebytes Anti-Malware.

Run antivirus from your pen drive

Here’s yet another solution which is creating a portable USB antivirus software package that can scan your computer for malicious software without the need for installation. Try these simple steps to clear up your infected computer by using a portable antivirus. 1) On a virus-free PC, download and install Safebytes Anti-Malware. 2) Put the pen drive into the clean PC. 3) Double click on the downloaded file to open the installation wizard. 4) Choose the drive letter of the flash drive as the location when the wizard asks you where you want to install the antivirus. Follow the directions to finish the installation process. 5) Unplug the pen drive. Now you can utilize this portable anti-virus on the affected computer system. 6) Run the Safebytes Anti-malware directly from the USB drive by double-clicking the icon. 7) Click on “Scan Now” to run a scan on the infected computer for malware.

Features and Benefits of SafeBytes Anti-Malware

If you are looking to purchase anti-malware for your computer system, there are numerous brands and applications for you to consider. A few of them do a good job in getting rid of malware threats while some will ruin your PC by themselves. You must choose a product that has gained a good reputation and detects not only viruses but other kinds of malware too. Among few good programs, SafeBytes Anti-Malware is the strongly recommended software for the security-conscious user. SafeBytes anti-malware is a very effective and easy-to-use protection tool that is created for users of all levels of IT literacy. Once you’ve got installed this software program, SafeBytes superior protection system will make sure that no viruses or malware can seep through your computer. SafeBytes anti-malware provides an array of advanced features that sets it aside from all others. The following are some of the good ones: World-class AntiMalware Protection: Safebytes is made on the very best virus engine in the industry. These engines can detect and remove threats even during the early stages of a malware outbreak. Real-time Active Protection: SafeBytes provides complete and real-time security for your personal machine. It will monitor your personal computer for suspicious activity at all times and shields your PC from unauthorized access. Fast Multi-threaded Scanning: Safebytes Anti-Malware, using its advanced scanning engine, provides super-fast scanning that can immediately target any active online threat. Safe Web Browsing: Through its unique safety rating, SafeBytes notifies you whether a website is safe or not to access it. This will ensure that you’re always certain of your safety when browsing the online world. Lowest Memory/CPU Usage: This software is lightweight and will work silently in the background, and that does not have an effect on your PC efficiency. 24/7 Live Expert Support: You can obtain high levels of support round the clock if you’re using their paid software.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove FreeDownloadManager without the use of an automated tool, it may be possible to do so by removing the program from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. You will likely also want to reset your browser. To ensure the complete removal, manually check your hard drive and registry for all of the following and remove or reset the values accordingly. Please note that this is for advanced users only and may be difficult, with incorrect file removal causing additional PC errors. In addition, some malware is capable of replicating or preventing deletion. Doing this in Safe Mode is advised.

The following files, folders, and registry entries are created or modified by FreeDownloadManager

Files: C:WINDOWSsystem32netmsg.dll C:DocumentsUserLocalTempfdminst.exe C:DocumentsUserLocalTempis-FJKMF.tmpfdminst.tmp C:WINDOWSsystem32msctfime.ime C:DocumentsUserLocalTempis-FN3E3.tmp_isetup_shfoldr.dll C:WINDOWSsystem32shfolder.dll C:DocumentsUserLocalTempis-FN3E3.tmpfdminno.dll C:DocumentsUserLocalTempis-FN3E3.tmpnsProcessW_modified.dll C:WINDOWSsystem32shell32.dll C:Documents and SettingsUserStart Menudesktop.ini C:Documents and SettingsUserStart MenuProgramsdesktop.ini C:WINDOWSRegistrationR000000000007.clb C:WINDOWSwin.ini Registry: HKEY_CURRENT_USERSoftwareCodeGearLocales HKEY_LOCAL_MACHINESoftwareCodeGearLocales HKEY_CURRENT_USERSoftwareBorlandLocales HKEY_CURRENT_USERSoftwareBorlandDelphiLocales HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersionIMM HKEY_USERSS-1-5-21-1547161642-507921405-839522115-1004SoftwareMicrosoftWindows NTCurrentVersionAppCompatFlagsLayers HKEY_CURRENT_USERSOFTWAREMicrosoftCTF HKEY_LOCAL_MACHINESoftwareMicrosoftCTFSystemShared HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionFontSubstitutes HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersion HKEY_CURRENT_USERSoftwareFreeDownloadManager.ORGFree Download Manager 5 HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionShellCompatibilityObjects20D04FE0-3AEA-1069-A2D8-08002B30309D HKEY_CLASSES_ROOTHKEY_LOCAL_MACHINESoftwareClassesCLSID20D04FE0-3AEA-1069-A2D8-08002B30309DInProcServer32 HKEY_CLASSES_ROOTDriveshellexFolderExtensions HKEY_CLASSES_ROOTDriveshellexFolderExtensionsfbeb8a05-beee-4442-804e-409d6c4515e9 HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerUser Shell Folders HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionExplorerUser Shell Folders HKEY_LOCAL_MACHINESystemCurrentControlSetControlSession Manager HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerMountPoints2CPCVolume HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerMountPoints2CPCVolume475c7950-e3d2-11e0-8d7a-806d6172696f HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerMountPoints2CPCVolume475c7952-e3d2-11e0-8d7a-806d6172696f HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerMountPoints2475c7952-e3d2-11e0-8d7a-806d6172696f HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerMountPoints2475c7950-e3d2-11e0-8d7a-806d6172696f HKEY_CLASSES_ROOTDirectory HKEY_CLASSES_ROOTDirectoryCurVer HKEY_CLASSES_ROOTDirectory HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorer HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorer HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced HKEY_CLASSES_ROOTDirectoryShellExIconHandler HKEY_CLASSES_ROOTDirectoryClsid HKEY_CLASSES_ROOTFolder HKEY_CLASSES_ROOTFolderClsid HKEY_CURRENT_USERSoftwareMicrosoftwindowsCurrentVersionExplorerAutoComplete HKEY_LOCAL_MACHINESoftwareMicrosoftwindowsCurrentVersionExplorerAutoComplete HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerAutoComplete HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionExplorerAutoComplete HKEY_LOCAL_MACHINESoftwareMicrosoftCOM3 HKEY_USERSS-1-5-21-1547161642-507921405-839522115-1004_Classes HKEY_LOCAL_MACHINESoftwareClassesREGISTRYUSER HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2765-6A77-11D0-A535-00C04FD7D062 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2765-6A77-11D0-A535-00C04FD7D062TreatAs HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2765-6A77-11D0-A535-00C04FD7D062 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2765-6A77-11D0-A535-00C04FD7D062InprocServer32 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2765-6A77-11D0-A535-00C04FD7D062InprocServerX86 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2765-6A77-11D0-A535-00C04FD7D062LocalServer32 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2765-6A77-11D0-A535-00C04FD7D062InprocHandler32 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2765-6A77-11D0-A535-00C04FD7D062InprocHandlerX86 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2765-6A77-11D0-A535-00C04FD7D062LocalServer HKEY_CLASSES_ROOTHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2765-6A77-11D0-A535-00C04FD7D062 HKEY_CLASSES_ROOTHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2765-6A77-11D0-A535-00C04FD7D062TreatAs HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383TreatAs HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383InprocServer32 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383InprocServerX86 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383LocalServer32 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383InprocHandler32 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383InprocHandlerX86 HKEY_LOCAL_MACHINESoftwareClassesHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383LocalServer HKEY_CLASSES_ROOTHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383 HKEY_CLASSES_ROOTHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383TreatAs HKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062 HKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062TreatAs HKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062 HKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062InprocServer32 HKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062InprocServerX86 HKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062LocalServer32 HKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062InprocHandler32 HKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062InprocHandlerX86 HKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062LocalServer HKEY_CLASSES_ROOTHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062 HKEY_CLASSES_ROOTHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062TreatAs HKEY_CLASSES_ROOTHKEY_LOCAL_MACHINESoftwareClassesCLSID3C036F1-A186-11D0-824A-00AA005B4383InProcServer32 HKEY_CLASSES_ROOTHKEY_LOCAL_MACHINESoftwareClassesCLSID0BB2763-6A77-11D0-A535-00C04FD7D062InProcServer32 HKEY_CURRENT_USERsoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced HKEY_LOCAL_MACHINEsoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersionFontSubstitutes HKEY_USERSS-1-5-21-1547161642-507921405-839522115-1004 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionLanguagePackSurrogateFallback HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionUninstallFree Download Manager_is1 HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionUninstallFree Download Manager_is1 HKEY_CURRENT_USERSoftwareFreeDownloadManager.ORGFree Download ManagerSettingsCommunity HKEY_CURRENT_USERSoftwareFreeDownloadManager.ORGFree Download ManagerSettingsNetworkBittorrent HKEY_CURRENT_USERKeyboard LayoutToggle HKEY_CURRENT_USERSOFTWAREMicrosoftCTFLangBarAddIn HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFLangBarAddIn
Read More
Setting up an FTP Server in Windows
File Transfer Protocol Server, also known as FTP Server, is a private or public service that can host files that can be accessed both locally and globally. It is a quick, flexible and seamless service that allows you to store any kind of files depending on the total size of the server. If you’ve always found an FTP server useful, then the good thing is you can now create your FTP server since Windows 10 now allows it. You can host this server locally and later on make it globally available via the internet. So if you are planning to set up an FTP server on your Windows 10 computer, read on as this post will guide you on how to do so.

To set up the FTP server, you need to configure it first and then configure the Windows Firewall for the connections to go through. For more details, refer to the following steps:

Step 1: You need to configure the FTP server on Windows 10.
  • In the Search box, type in “Turn Windows Features On or Off” to search for it.
  • Then click on the appropriate result which will open a mini window.
  • From this mini window, scroll down to the list and expand “Internet Information Services where you have to expand the FTP Server section.
  • Next, select all the checkboxes to enable all the entries under FTP Server and then click the OK button to apply the changes made.
  • And now, since your computer is now allowed to host an FTP server, you need to configure it. To do so, type “Internet Information Services (IIS) Manager” in the Search box and click on the appropriate entry.
  • Next, right-click on Sites under the navigation bar of Connections and select Add FTP Site. This will open a new window where you have to input some information about your FTP hosting.
  • Now enter the details and click on Next.
  • Upon clicking Next, you will be prompted to give some authentication details. Enter the following details in the screenshot below.
  • Now click on Finish. After that, you will get an FTP Server being hosted on your Windows 10 PC.
And now that you’ve successfully configured the FTP Server, the next thing you have to do is to allow connections from and to the FTP server. Refer to the next step below. Step 2: Configure the Windows Firewall for FTP connections to pass-through
  • In the Start Search, type “Allow an app or feature through Windows Firewall” and click on the related search result which will open a window with all the settings.
  • From there, click on the Change Settings button. This will display a list where you have to mark all the checkboxes for the FTP server to enable them in both the Private and Public configurations.
  • After that, click OK. This will allow you access to the FTP server on your local network.
Read More
Bluetooth flaw, Android and Windows in danger
bluetoothResearchers have discovered 16 vulnerabilities in Bluetooth connections that could be exploited and make from minor to some serious damage to your device. The flaw can be used on chips manufactured by Intel, Qualcomm, and Texas Instruments while connecting to external devices like speakers, headphones, keyboards, mice, etc.

Who is affected?

Mentioned chips are used by many in a vast range of devices including big players with their products like Microsoft Surface laptops, Dell desktops, Samsung Phones, Google Pixel, and OnePlus handsets. The Bluetooth bug affects a wide range of devices, including smartphones, laptops as well as smart home gadgets. In total, more than one billion devices that rely on Bluetooth are believed to be impacted.

What is the damage?

The amount of damage possible with this flaw depends on the type of device with the chipset. Some devices can only be crashed after a specially crafted packet is sent to the flawed chip. If that's the case with your gadget, it can be easily resolved with a simple restart. With other devices, hackers can take advantage of the Bluetooth Classic flaw to remotely run malicious code. That could allow malware to be installed remotely. Researchers say vendors were informed about these issues months ago before the findings were published. The good news is this should have given plenty of time for the relevant patches to be pushed out that remedy the flaws. However, you'll need to make sure that you're running the latest version of the operating system to be protected by the patch crafted by the manufacturers.

Android Bluetooth threat

The researchers emphasize the lack of basic tests in Bluetooth certification to validate the security of Bluetooth Low Energy (BLE) devices. The BrakTooth family of vulnerabilities revisits and reasserts this issue in the case of the older, but yet heavily used Bluetooth classic (BR/EDR) protocol implementations. We would also advise users to disable Bluetooth on devices that do not need it. This way you can prevent attackers from sending you malformed LMP packets. Since BrakTooth is based on the Bluetooth Classic protocol, an adversary would have to be in the radio range of the target to execute the attacks. So, in a safe environment Bluetooth can be enabled.
Read More
Fix Windows Update error 0x80244022
Installing Windows Updates in your Windows 10 computer does not always go smoothly as there are instances when you could encounter some errors along the way. One of these errors is error code 0x80244022 –WU_E_PT_HTTP_STATUS_SERVICE_UNAVAIL HTTP 503. This kind of error can be encountered when you check, download or install any updates. At the time of writing, it isn’t known yet what the exact cause of this error is. However, there are some potential fixes you can check out to fix it. When this error occurs, you will see the following error message on your screen:
“There were some problems installing updates, but we’ll try again later. If you keep seeing this and want to search the web or contact support for information, this may help: (0x80244022).”
To fix error code 0x80244022, refer to the potential fixes provided below.

Option 1 – Disable the Proxy server

The first thing you can do is to try disabling the Proxy server as it might be the reason why you’re getting error 0x80244022 for Windows Updates. To disable the proxy server, refer to the steps below.
  • Tap the Win + R keys to open the Run dialog box.
  • Then type “inetcpl.cpl” in the field and hit Enter to pull up the Internet Properties.
  • After that, go to the Connections tab and select the LAN settings.
  • From there. Uncheck the “Use a Proxy Server” option for your LAN and then make sure that the “Automatically detect settings” option is checked.
  • Now click the OK and the Apply buttons.
  • Restart your PC.
Note: If you are using a third-party proxy service, you have to disable it. In addition, if you are also using a VPN, you can try to disable it as well.

Option 2 – Run the DISM tool

You can run the DISM tool as well to help fix the error code 0x80244022 during Windows Update. Using this built-in tool, you have various options such as the “/ScanHealth”, “/CheckHealth”, and “/RestoreHealth”.
  • Open the Command Prompt with admin privileges.
  • Then type in the following commands and make sure to hit Enter right after you type each one of them:
    • Dism /Online /Cleanup-Image /CheckHealth
    • Dism /Online /Cleanup-Image /ScanHealth
    • exe /Online /Cleanup-image /Restorehealth
  • Do not close the window if the process takes a while as it will probably take a few minutes to finish.

Option 3 – Perform a System File Checker scan

The SFC or System File Checker scan could detect and automatically repair damaged system files that could be causing error code 0x80244022 to appear when you try to update your Windows 10 computer. SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files with good system files. To run the SFC command, follow the steps given below.
  • Tap Win + R to launch Run.
  • Type in cmd in the field and tap Enter.
  • After opening Command Prompt, type in sfc /scannow and hit Enter.
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.
  • Once done, restart your computer.

Option 4 – Try disabling the Firewall or antivirus program

Disabling the antivirus program or Firewall or any other security software installed in your computer is always a good idea you can try when the Windows Update process does not go smoothly. So before you try updating your computer again, make sure to disable the antivirus or security program and once the Windows Update is done, don’t forget to enable the antivirus program back again.

Option 5 – Try resetting the Windows Update components

  • Open Command Prompt with admin privileges.
  • After that, type each one of the following commands and hit Enter after you key in one after the other.
    • net stop wuauserv
    • net stop cryptsvc
    • net stop bits
    • net stop msiserver
Note: The commands you entered will stop the Windows Update components such as Windows Update service, Cryptographic services, BITS, and MSI Installer.
  • After disabling WU components, you need to rename both the SoftwareDistribution and Catroot2 folders. To do that, type each one of the following commands below, and don’t forget to hit Enter after you type one command after the other.
    • ren C:/Windows/SoftwareDistribution/SoftwareDistribution.old
    • ren C:/Windows/System32/catroot2/Catroot2.old
  • Next, restart the services you’ve stopped by entering another series of commands. Don’t forget to hit Enter after you key in one command after the other.
    • net start wuauserv
    • net start cryptsvc
    • net start bits
    • net start msiserver
  • Close Command Prompt and reboot your PC.

Option 6 – Run the Windows Update Troubleshooter

You might also want to run the Windows Update Troubleshooter as it could also help in fixing Windows Update Error. To run it, go to Settings and then select Troubleshoot from the options. From there, click on Windows Update and then click the “Run the troubleshooter” button. After that, follow the next on-screen instructions and you should be good to go.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status