Booting the Windows computer system includes loading it from the various boot devices such as drivers, network as well as USB drives when the computer is turned on. The instant the startup sequence is done loading the operating system the system hardware will be ready to perform some complex operations – in this process, the Boot Log in Windows 10 is a record that maintains the list of success or failure of many pieces of Windows 10 system during the booting process. In other words, the Boot Log is the one that keeps a record of all that has happened while loading from the computer storage system to the memory during the boot process. It is available for several devices like network, hardware devices, and the operating system which assist in detecting issues during the boot process and other issues with regards to troubleshooting. Through Boot Log, you’ll know which drivers were unloaded and loaded from the start of the system during the boot process. You have the option to either disable or enable this feature on your Windows 10 PC.
Named as “ntbtlog.txt”, the log file lists all the successfully loaded processes and the unsuccessful ones during the boot process. It is saved to the drive C:Windowsntbtlog.txt. As mentioned, you can enable or disable this feature in two ways – the first one is by using the System Configuration or MSConfig while the second one is using the Command Prompt. In this post, we’ll show you how you can enable or disable Boot Log in Windows 10 either way.
Option 1 – Enable or Disable Boot Log using System Configuration
Enable Boot Log:
Tap the Win + R keys to open the Run dialog box.
Then type in “msconfig” and click OK to open System Configuration.
After that, go to the boot tab and check the checkbox labeled “Boot Log” under the Boot options so that you can enable the Boot Log feature.
Then click on OK to save the changes made.
Next, click on the Restart button in the prompt window to get started with the Boot Log process.
After restarting your PC, go to C:Windowsntbtlog.txt to open the boot log.
Note: As pointed out earlier, the log file contains a list of all the successfully loaded drivers and also the list of drivers that failed to load during the boot process and every time you restart the system, the boot log file will keep on updating and will eventually increase the list of entries. For you to locate the drivers and make your troubleshooting a lot easier, I advised disabling the boot log after troubleshooting. To disable the boot log using System Configuration, refer to the steps below.
Disable Boot Log:
Tap the Win + R keys to open the Run dialog box.
Then type in “msconfig” and click OK to open System Configuration.
After that, go to the boot tab and unmark or uncheck the checkbox labeled “Boot Log” under the Boot options so that you can disable the Boot Log feature.
Then click on OK to save the changes made.
Option 2 – Enable or Disable Boot Log using Command Prompt
Enable Boot Log:
Go to the Start Menu and then type in “command prompt” in the search bar.
After that, right-click on the Command Prompt option and select the “Run as administrator” option.
After opening Command Prompt, type in “bcdedit” and tap Enter.
Note: You have to find the Identifier of the current operating system first to enable the Boot log. You can find it under the Windows Boot Loader section in the “Description” field and in this case, it’s Windows 10. You can also find the operating system identifier under the Windows Boot Loader section next to the field name identifier.
To check if the boot log entry is disabled or enabled, go check the “Bootlog” field under the Windows Boot Loader. And if it turns out that the “bootlog” entry is enabled, the entry will be “Yes”. Otherwise, the entry will be “No”.
Next, type in the following command with the operating system identifier to enable the boot log.
bcdedit /set {identifier} bootlog Yes
Note: In the command given above, make sure that you replace the given system identifier with your computer’s system identifier. For instance:
In this example, the identifier was replaced with the actual operating system identifier as current.
bcdedit /set {current} bootlog Yes
Afterward, restart the system to start the Boot log process.
After the restart, go to C:Windowsntbtlog.txt to open the boot log.
Note: Every time you restart your computer, the boot log file will keep on updating which will increase the size of the log eventually. So if you want seamless and easier troubleshooting, it is advised to disable the Boot log after you troubleshoot. To disable it using the Command Prompt, here’s what you have to do.
Disable Boot Log:
Go to the Start Menu and then type in “command prompt” in the search bar.
After that, right-click on the Command Prompt option and select the “Run as administrator” option.
Once the Command Prompt is opened, type in the following command and then tap Enter to disable the boot log feature.
bcdedit/ set {identifier} bootlog No
Note: In the command given above, you need to replace the given system identifier with your computer’s system identifier. For instance:
In this example, the {identifier} was replaced with the actual operating system identifier as {current}.
It is no longer a secret that websites, social media, and other various places on WEB are tracking you and your messages and emails for keywords that they will later use to promote and serve your specific ads linked to those keywords. Altho the process is fully automated it does feel a little forced and uneasy.
That is why we are bringing you this article in which we will show you how to stop website tracking in the most popular and used browsers.
SAFARI
Apple’s Safari browser gives you the option to block cross-site tracking. It also has a Privacy Report that displays all the sites and agencies that are gathering information about you.
Before blocking these trackers, you may want to review exactly which sites are tracking you online and gathering information about you. Armed with this information, you may decide that cross-site tracking isn’t a huge issue for your particular browsing habits, or you may decide to avoid certain websites entirely.
To access Safari’s Privacy Report:
Launch the Safari web browser.
In the toolbar, select Safari > Privacy Report.
Select the Websites tab. This will display information about all the websites that are profiling you.
Select the Trackers tab. This displays a list of all the trackers that are gathering information about you. This includes the companies that created these trackers and the number of times Safari detected these trackers during your browsing sessions.
You can also check how intrusive a particular website is by navigating to the website in question and then selecting the shield icon that appears alongside Safari’s address bar. You can then select Trackers on This Web Page, and Safari will display a list of all the trackers that are active on this particular webpage.
Once you’ve seen all the websites and agencies who are tracking you, if you want to block these trackers:
In the Safari toolbar, select Safari > Preferences …
Select the Privacy tab.
Select the following checkbox: Prevent Cross-Site Tracking.
Safari will now prevent these trackers from following you across the World Wide Web.
CHROME
As you’re browsing the web, Chrome can send a request for websites not to collect or track your browsing data.
It’s important to note that this is a request, so there’s no guarantee that every website will honor the request. Frustratingly, Chrome doesn’t provide information about the websites that are tracking you online. However, we still recommend enabling this feature, as it can help minimize the number of websites that are tracking your online movements:
In Chrome’s upper-right corner, select the three-dot menu icon, then Settings.
In the menu on the left, select Privacy and security.
Click Cookies and other site data.
Find the Do not track slider and push it into the On position.
Now Chrome will send a Do Not Track request to every website you visit. Since this is only a request, you may want to take additional steps to protect your online privacy.
Ghostery is a Chrome extension that enables you to view and block online trackers. After installing Ghostery, you can view all the trackers that are active on a particular website:
Head to the site in question.
Click the Extensions icon in the Chrome toolbar.
Select Ghostery to see a list of all the trackers this extension has detected.
You can block all of these trackers by selecting the Detailed tab and then clicking Restrict site.
Repeat this process for every site you visit.
MOZILLA FIREFOX
Firefox has an Enhanced Tracking Protection feature that can block all the cross-site trackers identified by Disconnect. This feature can also preserve your online privacy by blocking social media trackers, fingerprints, and crypto miners, making this a great all-arounder for the security-conscious Internet user.
Enhanced Tracking Protection should be enabled by default. However, you can verify whether it’s active for your particular Firefox installation by navigating to any website. Next, click the little shield icon that appears alongside Firefox’s address bar and you should see a message confirming that Enhanced Tracking Protection is enabled.
If Enhanced Tracking Protection isn’t enabled, we recommend activating it:
In Firefox’s upper-right corner, select the three-line icon, then Preferences.
In the menu on the left, select Privacy & Security.
You can now select either Standard or Strict. Note that Strict may affect the functionality of certain websites, so it’s recommended you opt for Standard unless you specifically require a greater level of protection.
Similar to Chrome, Firefox can send a Do Not Track request. While you’re in the Privacy & Security menu, you may want to consider activating Mozilla’s Do Not Track feature.
OPERA
When you first installed Opera, it gave you the option to block trackers. If you didn’t take Opera up on the offer then, you can start blocking trackers now:
Along the left side of the Opera browser, click the cog icon. This opens Opera’s settings.
In the menu on the left, select Basic.
Find the Block Trackers slider and push it into the On position.
Blocking trackers can impact the functionality of certain websites. If you start noticing strange behavior on a particular website, you may want to add that site to your Exceptions list. By allowing this site to use trackers, you should be able to resolve any issues you’re experiencing.
To make an exception for one or more websites:
Launch Opera’s settings by clicking the little cog icon.
Navigate to Basic > Manage Exceptions.
Click Add and then type the address of the site where you want to permit trackers.
Repeat for all the sites that you want to add to your exceptions list.
If you have a USB that has stopped working and does not show any signs of life do not throw it away just jet.
Hello and welcome to another great tutorial on errortools.com, today we will explore how to bring back to life dead USB memories.
Detect a Corrupted Drive:
If your computer is still able to detect your USB drive, you might want to know if it’s been corrupted. Select the Properties of the drive folder and check the device status. If it says This device is working properly this USB drive is worth saving. There’s no need to worry if you can’t see the USB drive folder.
Erase the USB Drive with Diskpart Tool
Press ⊞ WINDOWS + X top open start menu and choose Command prompt (admin)
Type diskpart and press ENTER
Type in list disk and press ENTER
Locate your USB drive by size and type in select disk#, where # is the number of removable disks.
Reallocate the USB Drive Volume
Press ⊞ WINDOWS + R to open the run dialog and type in diskmgmt.msc
Select the USB drive and Right-click on it and select create simple volume. It will lead to a new simple volume wizard window.
Once you click next, you can specify the volume size for the pen drive. Select the maximum volume, which is shown as a default unit in MB.
As soon as you see the next step, select assign drive letter which will help you view your pen drive once again.
Format the partition in the next step. This may be just an extra step because you have already wiped the data clean. But it is always better to be sure.
Click Finish to complete the new simple volume wizard which will now be allocated to the USB drive.
After you reallocate the unallocated USB drive space, you will be able to view the USB drive storage once again.
TPM, also known as Trusted Platform Module, is a specialized chip used for security as well as encryption of users’ private data like Fingerprint, Facial data, and many more. TPM also comes with a Management Console and if you are not able to load the Management Console and you got the “Cannot load Management Console” error instead, read on as this post will guide you in fixing the problem. This type of issue usually happens when you clear or disable the TPM using the settings in the BIOS and so when you run the Trusted Platform Module Management console, you encounter the error.
To fix the “Cannot load Management Console” error in your Windows 10 computer, here are some options you should check out.
Option 1 – If TPM is cleared in the BIOS:
If the Trusted Platform Module is cleared in the settings of the BIOS, you have to close and restart the TPM Management console or TPM.msc once again. It could be that the TPM Management has to reload the changes again after you’ve made them which is why you encounter the “Cannot load management console” error.
Option 2 – If TPM is disabled in the BIOS:
If you opted to disable TPM using the BIOS settings or you have turned it off by accident, then you have to enable it back and you have two options to do that – you can either enable TPM from the BIOS or using the Windows PowerShell. For more details, refer to the instructions below.
Enabling TPM from the BIOS:
You need to first reboot your PC and then go to the BIOS.
From there, look for TPM under the security options and in case the TPM management option has been disabled or greyed out, refer to the sub-steps given below to make it active again
Enable the Admin password in the BIOS.
Then go back to the TPM settings and check if the TPM management is already available.
After that, you should now be able to enable TPM. Remember that it’s always a good idea to have an ADMIN password for your BIOS as it makes sure that no one can change the settings in your computer BIOS and Security level options.
Enable TPM via Windows PowerShell:
This second option is a lot easier compared to the first one if you have admin privileges. So once you’ve opened the Windows PowerShell with admin privileges, you need to run the following command:
Error code 3 is a type of PC windows error that can occur on any Windows version including Windows XP, Vista, Windows 7, or 8. This error code means that the system cannot find the path specified.
The error 3 messages are displayed in the following format: “Error_ Path_Not_Found” or it may sometimes be displayed with the value 3 in this format: (0x80070003: Error_Path_Not_Found)
Solution
Error Causes
The error code 3 indicates poor PC maintenance. It is a critical sign of an unstable system. The causes of this error code are:
Missing or broken system files
Registry issues
This error code poses serious system threats and should be resolved immediately before the damage is done. If you don’t address this error timely, your PC may be exposed to risks like system failure and crash. And this may lead to valuable data loss.
Further Information and Manual Repair
To resolve this error on your system, you don’t have to hire a technician or be technically sound yourself. What you simply need to do is clean the registry. Here are 2 ways to clean the registry:
1. Manually by Launching Registry Editor
First, launch the Windows registry editor by clicking the start button and selecting run.
In the text box type, 'Regedit' and press enter and click OK. Before you make changes to the registry, make sure you create a backup of your existing registry. This is advisable because if you accidentally lose important data during the cleaning process you can also recover the lost data.
Once you create a backup, now get started with the cleaning process. Expand HKEY_CURRENT_USER" key, then click on the software key and look for applications that you think could have corrupted the registry. Now delete them.
After that, remove the unwanted start-up items, by accessing this link: My Computer HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows Current Version.
Now click on the run tab and delete invalid entries/ values. This process may be time-consuming and for some, it may be slightly technical to identify unwanted start-up items.
2. Download Restoro Registry Cleaner
Another way to clean and repair the registry is to download Restoro. This is an innovative and a highly-functional registry cleaner.
It is embedded with an intuitive algorithm that detects all the registry issues instantly and removes them right away in just a few simple clicks. It removes all the unnecessary and obsolete files, repairs the registry, and fixes the damaged dll and system files.
It has a user-friendly interface and simple navigation which makes it easy for all levels of users to work around it. This software is compatible with all Windows versions.
Besides functioning as a registry cleaner, Restoro also functions as an antivirus and a system optimizer. It scans and removes all kinds of malicious software and simultaneously boosts the speed of your PC.
Click here to download Restoro and resolve error 3 “Entry_Path_Not_Found” on your PC now!
Living in today's world sadly is still living in the COVID-19 pandemic. It has been more than a year and sadly pandemic is still very strong and we are battling it on a daily basis.
Governments all over the world are trying to battle pandemics in their own way with their own ideas and prevention measures. We as individuals can not very much influence how will the pandemic itself go but fortunately in this modern age of information we can at least follow and be in the loop at the current state of the situation regarding it.
Today instead of having a troubleshooting article or tips and trick for your PC we are doing something else but in the domain of internet technology, you know, just to keep everything still IT related ????
Below you will find websites with small descriptions of what they do to keep yourself informed and hope to get over this dreadful pandemic.
If you are interested in real-time COVID-19 information about active cases, death tool so far, new cases and the number of vaccines administrated so far I would recommend WHO's dashboard. How WHO is a non-government institution composed of doctors from all over the world with just a single goal in mind, to help and put an end to this pandemic is a great non-biased source of information on the current state of virus spread.
Please be aware that Vaccinefinder is working only on the territory of the United States of America. The reason why it was included in this list is that basically it is a great idea and I hope to see this site expand on other world regions or at least that inspires the emergence of another worldwide website with this type of content.
If you live in the USA, this site will be a great help since you can track where and how many shots are distributed to states and even towns in America.
This site is also for U.S. residents, this time it is about tracking cases in each state with details and statistics. If you are interested in more detailed statistics of hospitalized patients per state or overall you are just interested in statistics about the pandemic in the U.S. this site might provide all the information about your needs.
On national public radio or NPR for short, there is a special section devoted to the coronavirus where new articles about pandemic are released daily with new information and new findings on how to battle it and the current state of things. A great informational site to keep up with the current state of things.
Google has not been inactive during this pandemic and on its page specially dedicated to the COVID-19 virus you can find a lot of free information updated daily. From safety and prevention tips to data about pandemics there is a lot of ground covered on-page and we recommend at least going through the prevention section to inform yourself how to keep yourself and others safe.
This daily updated chart can show how many cases and deaths are from chosen time period all in form of a chart, you can see charts for each country in the world how COVID cases rose or dropped along with the death tool it brought.
There you go, 6 websites to track and inform yourself about this dreaded pandemic which has managed to change the world and people's lives forever, sadly on the bad side.
Error 118 is a typical Google Chrome error. It pops up when Google Chrome fails to load websites like Facebook. It is usually displayed in the following format:
‘Error Message: Error 118 (net::ERR_CONNECTION_TIMED_OUT): The operation timed out.’
Solution
Error Causes
Error 118 may be triggered due to several reasons. This includes:
Problems with DNS setting
IP Address is filtering websites
Cookies and invalid registry entries
Further Information and Manual Repair
To ensure smooth internet browsing on Google Chrome, it is advisable to repair the error 118. If error 118 is not resolved you will be unable to load and access your desired websites.
To avoid inconvenience and resolve the issue immediately, try the methods suggested below. These are easy and effective do-it-yourself methods that require no technical skills.
Method 1 - Change Proxy Settings
If your IP address is filtering websites, then you might experience error 118 while using Google Chrome. When this is the error cause, then it is advisable to add a proxy for your PC.
To change proxy settings and add a new proxy, simply click on Customize and Control Google Chrome menu. Now click the options button. Under the Google Chrome Options window select the Under the Hood tab.
After that in the Network, section click the change proxy settings button.
Check Show Suggestions for navigation errors and Use DNS pre-fetching to improve page load performance boxes. Now under Internet Properties, click LAN Settings.
Under LAN settings you will see the Proxy Server box, check it, and enter your new proxy settings. Click OK to confirm and save settings. This will hopefully resolve the issue.
Method 2 - Change to Google DNS
When the error is related to DNS settings then try this method to resolve it. Simply set DNS to use Google DNS. Here’s how it’s done:
Go to the start menu, click Windows Control Panel, Network and Internet, and change adapter settings. Here you will see Local Area Connection.
Right click to select properties at the bottom.
Check Internet Protocol Version 4 and click properties.
Now check the ‘Obtain an IP address automatically’ box and also select the option that says ‘Use the following DNS server addresses’.
Change Preferred DNS to 8.8.4.4 and Alternate DNS server to 8.8.8.8 now click OK to confirm.
Method 3 - Remove the Bad Entries and Cookies Damaging the Registry
Bad entries and cookies saved in the registry can also trigger error 118.
To fix the issue immediately download Restoro. This is PC Fixer with multiple utilities including a registry cleaner. The registry cleaner removes all bad entries and cookies in seconds and repairs the damaged registry.
Click here to download Restoro and resolve error 118.
Faraday bag is a new take on security and privacy for people using a lot of electronic devices and credit cards. So what is exactly a Faraday bag?
Faraday bag explained
Faraday bag is designed in the same manner as the Faraday cage which was invented by Michael Faraday, who was an English scientist who contributed to the study of electromagnetism and electrochemistry. His main discoveries include the principles underlying electromagnetic induction, diamagnetism, and electrolysis.
The idea of the Faraday cage is that anything inside a cage that is made of specific grid size is completely isolated from outside current and magnetic fields since the cage itself will pick up everything upon itself. This means that for example, a human could be inside a cage that is struck by lightning and be perfectly safe and fine.
This idea led to the Faraday bag design, which takes this concept and places a wiring pattern inside clothing in order to isolate all magnetic fields from the outside so your devices and cards are completely cut off from any kind of influence and electromagnetic waves. If the pattern and quality of material for the bag are good, you have a fully safe placeholder for your stuff.
Advantages of Faraday bag
The main advantages, of course, are the privacy and safety of mobile phones and credit cards from outside influences and this is why this bag has been designed in the first place. If the bag is designed properly your phone would not be able to be hacked nor accessed from any outside source, GPS tracking will also be disabled and your phone location will not be visible. Credit cards will also be completely safe from any malicious attack via wi-fi signals.
Disadvantages of bag
Well, the disadvantage of using this bag is a very simple one, since your phone is isolated from outside influence that will also mean that you will not be able to take messages or calls on it while it is in the bag. Notifications from the internet would also be disabled so it is security vs usability deal.
Spying via some malicious app on the target phone is not a new thing but it can be very uncomfortable and even against the law in some countries.
Infecting the target phone can be done in various ways, another person can intentionally download and install applications on it, and you can install them via some phishing attacks or by an online scam. Once installed this piece of software presents a very serious invasion of privacy since it can track text messages, track phone location in real-time, record calls in real-time, eavesdrop on calls, take control of the camera and microphone, and many other applications.
Here are some common symptoms of mobile phones infected with spyware.
Symptoms of spyware
Random reboots Slow performance Strange text messages Overheating Unusual high data usage Non-familiar apps in the app list The fast drain of the battery Long shutdown time Strange interference and sounds during calls Signs of activity during standby mode
If your phone exhibits any of these symptoms you might have a spyware app installed and running on it.
Common spy apps
There are many apps that have been designed to spy on people that can be downloaded in the app store or on Google Play today. Most of these spyware apps are aimed at parents wanting to keep an eye on and protect their children. However, these can be used by anyone in order to spy on a target person via their phone.
Below is a list of common apps that can be used to spy on you. Many spyware apps require a phone to be ‘jailbroken’ or ‘rooted’ before being installed, this is when the phone’s operating system is changed to allow the phone to become unlocked and customizable.
mSpy : An undetectable spying app for iOS devices. It can be used to read your chats, see your location, view your email, check your call history, record your keystrokes, and more.
Spyera : This app requires rooted and jail-broken iPhones to work. It can go undetected and monitors phone calls and your call history. It even allows call recording and eavesdropping on live calls.
Flexispy : Flexispy prides itself as the #1 phone monitor for parents and can monitor everything from calls to social texts.
Umobix : This powerful spyware app has a dashboard that allows users to easily monitor someone’s location, calls, texts, keystrokes, all major social media, and more. You can detect Umobix because it heats up the infected phone and greatly affects the battery life of the infected device.
Ikey Monitor : Although it requires the device to be rooted for Android or jailbroken for iPhones, this spy app captures keystrokes, passwords, and screenshots, allows for call recording and supports multiple languages.
Clevguard : Available for both iOS and Android, Clevguard allows users to track GPS and Wi-Fi locations, capture screenshots remotely, and more. Due to a recent update, the spy app drains the target phone’s battery significantly.
Remove spyware from your phone
If any of the beforementioned apps are present on your phone you need to remove them right away.
Go to your phone settings and remove the malicious applications, then download some protection suite and scan the whole phone for any other trace of software remains or other malware apps.
Google Docs has cemented itself as a great free alternative to Microsoft Office Word. Most of the time people just share links to google Docs among themselves but sometimes you need to save and download files.
Luckily Google docs let you download easily files in various formats including PDF as well. In this short tutorial we will explain how can you download your Google document as a PDF file.
Saving Google Docs as a PDF
Open the Google document inside the browser and click on the File drop-down menu. In the file drop-down menu go to Download and choose PDF document. Next, choose the location where you would like your file to be saved and click on SAVE.
And that's all that needs to be done. Also, you can edit PDF files as well in google docs if you need to.
This post will guide you in what to do if you are trying to share the internet connection from your Android smartphone to your Windows 10 computer but USB tethering is not working. Although you can always connect your Android phone to your computer using a USB cable, you still won’t be able to access the internet. However, if you’ve already enabled the USB tethering option in your smartphone, you should be able to access the internet but if you still can’t then you can fix this issue by reading this post.
There are several potential fixes you can check out to fix the USB tethering issue. You can try running both the Internet Connections and Network Adapter troubleshooters or try installing the USB RNDIS adapter or disable any unnecessary network adapters.
Option 1 – Try to run the Internet Connections and Network Adapter troubleshooter
There are various built-in troubleshooters in Windows 10 that can help fix system issues. Since you are dealing with an internet connection problem, you can try running both the Internet Connections and the Network Adapter troubleshooters. To run them, follow these steps:
Go to Settings > Update & security > Troubleshoot.
From there, you can select the Internet Connections troubleshooter.
Click on the Run troubleshooter button to troubleshoot the problem.
Wait until the troubleshooter is done identifying and fixing the problem automatically.
Then follow the next on-screen instructions that may appear.
Once it’s done, check if the USB tethering issue is now fixed.
Note: You can also try to run the Network Adapter troubleshooter. It is also located under the Troubleshoot section. Just scroll down until you see it and then run it.
Option 2 – Try installing or updating the USB RNDIS adapter
RNDIS or Remote Network Driver Interface Specification can also help you resolve the USB tethering problem. If the pre-installed driver does not help you in connecting to the internet, then you can try installing the USB RNDIS driver that is, if it’s not installed yet. If it is already installed, you can try to update it instead.
Tap the Win + R keys to open Run and type “devmgmt.msc” in the field and hit Enter to open the Device Manager.
Next, expand the Network adapters section and look for the Remote NDIS based Internet Sharing Device. But if you are using a Samsung smartphone, you might see “Samsung” instead of under Network adapters.
Right-click on it and then select the “Update driver” option.
Then select the “Browse my computer for driver software” option.
After that, select the “Let me pick from a list of available drivers on my computer” option.
Now uncheck the checkbox for “Show compatible hardware”.
From the given list on your left-hand side, look for Microsoft and then select the Remote NDIS based Internet Sharing Device on your right-hand side.
Click on Next. A new popup will appear where you have to click on Yes. This will install the driver.
Now click on the Close button and restart your computer.
Option 3 – Try disabling any unnecessary network adapters/connections
Assuming that your Ethernet connection is showing ping loss which indicates that the internet is not stable. In such time, if you use the USB tethering functionality, you won’t be able to access the internet connection from your smartphone. The internet connection will be frequently disconnected since your computer gives priority to the Ethernet connection. Thus, you have to disable the Ethernet connection temporarily.
Right-click the network icon on your Taskbar and select the option “Network and Sharing Center”.
After that, click the network connection. And then click the Disable button from the status box that opens.
After that, check if you can now connect to the internet or not.