DirectX encountered unrecoverable error usually face gamers when they try to star certain game. In this guide, we will help you to get over it and solve the issue.
Follow steps in this guide one after another since they go from most simple ones to complex ones so following is advised in order not to waste a ton of time and resources doing wrong tasks.
Check your game page and your DirectX
The first and most common thing that can cause this type of error is when your installed DirectX is not the same version that the game requires. Check the game store page to see system requirements and write down which DirectX version it requires in order to run. Then press ⊞ WINDOWS + R to bring run dialog and type in it DXDIAG and press ENTER
DX diagnostic window will pop up and at the bottom, you can find which DirectX version is installed on your system. If versions are different, install the required DirectX version and run the game.
Update or reinstall GPU drivers
DirectX can get corrupted via bad driver update, in order to fix this, reinstall or update your Graphic drivers to the latest version from the official manufacturers' website.
Set custom scaling to 100
Go into Windows settings and set custom Display scaling to a value of 100, sign out, and then sign back in.
Delete registry key
Note that you should do this as the last option and be very careful since you can crash whole Windows in this way. Press ⊞ WINDOWS + R to open the run dialog and type RegEdit in it to open the registry editor. Find this key: ComputerHKEY_CLASSES_ROOTPROTOCOLSFiltertext/XML and delete it from the registry, you might want to do a backup of the registry first, just in case.
Error 126 is a very commonly occurring error that is often the result of damaged system files of Windows. They usually occur during the installation of some Windows program or application. When Error 126 is generated, it terminates the installation process almost instantly.
It is important to take corrective measures immediately to ensure that no such problems are encountered again in the future.
Solution
Error Causes
There are a variety of conditions that may trigger Error 126. These conditions are listed below as follows.
Corrupt or incorrect registry entries in the system files
When any of the above-listed conditions occur, the corrupt system files will go to the improper links or missing information.
Eventually, the problems with the files will keep the applications or programs from responding in the usual manner. Whatever are the reasons for error generation, it is of utmost importance that the error is removed to ensure smooth functioning of the system.
Further Information and Manual Repair
There are many different ways this error can be rectified. However, the two most effective solutions are listed below as follows.
This solution is for the advanced user. Turn on the system and log on to it as the Administrator. Now click on the Start button. Now click on All programs -> Accessories -> System Tools. Here you will come across the option for System Restore. Click on it. A new window will appear. Select 'restore my computer to an earlier time' point. Now clock on Next. A list of restore points will now appear in front of you. Choose the latest restore point you come across from this list and click on ‘Next’. In the next window that opens, click on ‘Next’ again. This is the confirmation window. Once the restoration finishes, restart your computer.
This solution is for novice users. Download an Error 126 repair utility program. Install it on your system. Now use it to scan your system for errors. Find out if there is an option to fix/repair error. When you come across it, click on it as soon as the scan is complete. Restart your computer. Your system is now free of Error 126.
Hello and welcome everyone, today we will be talking about dreaded keyloggers, why they are dangerous, and how to know if you might have one in your system. Keylogger is a malicious application placed in your system and hidden with only one goal in mind, to get information about what are you typing and by that means for a person who infected you to get information about your credit card information or other sensitive data. They can be introduced into your systems in various ways and often can not be detected easily. Modern antivirus applications have ways of detecting them and removing but this tutorial aims to teach you how to spot them all by yourself since new keyloggers are produced daily and sometimes relying on antivirus alone is not enough.
Unlike viruses and trojans, keyloggers are not heavy on system resources and you will not feel slow down on your computer if you have one which makes them harder to sport with regular work. Some of them can be even tracking you on the website and not even be physically present on your computer. Generally, we could categorize keylogger into 4 categories:
Web browser-based keylogger. Some websites would have CSS scripts, input web forms, or so-called man in the middle keylogger. Lucky for us even Windows defenders with the latest update can detect this type of keylogger and successfully deal with it and how keylogger itself is not present on our system we are safe.
General spyware keylogger. This keylogger is present in your system, usually, it infected it via email attachment, social media download, torrent download, some malicious so-called fixer application, etc. Most antivirus applications and windows defenders can detect these types as well and remove them successfully.
Kernel-level keylogger. This keylogger is a more dangerous type they tend to operate underneath Windows as a rootkit and can go undetected by antivirus and windows defenders.
Hypervisor-based keylogger. This is the most dangerous keylogger, they use virtualization techniques to hide and mask themselves as a replica of the operating system and they scan all keystrokes by the user. These are very rare keyloggers but they do exist.
If you suspect that you have a keylogger or just want to check your system for precaution reasons follow these tips and guides and luckily you will solve your issue in no time and your data will be safe.
Use Task Manager to find suspicious entries.
Task manager is a great application implemented in Windows that is constantly monitoring and showing all services, applications, and processes currently running on your system and thus a great tool to monitor your system if you know how to use it.
First, open task manager by pressing CTRL + SHIFT + ESC
Then take a good look into it, try to find suspicious names, probably duplicate of running application, something like Windows logon application, or keylog or anything similar which seems out of ordinary. If you manage to find a suspicious running application right-click on it and close it. Also while you are in task manager jump into the startup tab and check to see are there some unusual applications starting with your Windows, if you find anything, disable it right away.
This is the most simple and quickest way to get some information right away if you suspect to have some simpler keylogger in your system.
Use the command prompt to monitor your network.
In order to check connections to your computer and find potential suspicious ones start the command prompt in administrator mode, press ⊞ Win + X, and choose command prompt (administrator).
type in netstat -b and press ENTER. All website and application connections to your computer are now visible. ignore svchost, edge browser, windows store, etc ad check the IP of the remaining ones using the internet.
Use keystroke encryption.
Install encrypting software and even if you have a keylogger, the application will encrypt each stroke and all that attacker will get is gibberish
Please remember to always download files from trusted sources, do not open unknown emails, and do not share your information publicly. Take common protection steps in order to protect yourself in the digital world.
Overwatch has taken the world by the storm, it introduced new mechanics in gameplay, colorful characters, various game modes and it is constantly updated with new content for free. If you have friends to play with this game is even better but sometimes errors occur and the game loses connection to the game server making it unplayable since it requires a constant internet connection to the server to function.
Keep reading and try provided solutions as they are presented to fix this issue and continue gaming.
In case you don’t know, there is a built-in tool in Windows 10, known as Reliability Monitor that provides a day-to-day snapshot of the health of your system. It warns users of any looming issues or disasters before your computer breaks down finally. So obviously, Reliability Monitor is useful, however, there are times when it could behave incorrectly. For instance, it might fail to show you any updates even when they are installed. Thus, if you experience any malfunctions with the Reliability Monitor tool in Windows 10, read on as this post will guide you in updating or working in Windows 10.
To fix the problem with the Reliability Monitor, there are several fixes you can check out. You can try to enable the data collection for Reliability Monitor or reset it, as well as put your computer in a Clean Boot State. For more information, refer to each one of the options given below.
Option 1 – Try to enable the Data Collection for Reliability Monitor
The Reliability Monitor tool uses data provided by the RAC Agent scheduled task and it will start to display a Stability Index rating and specific event information 24 hours after the system installation. The RACAgent scheduled task, by default, runs after the operating system is installed. And if it is disabled, it must be manually enabled from the Task Scheduler snap-in for MMC or Microsoft Management Console. Thus, you need to enable the Data Collection for Reliability Monitor to fix the problem.
Option 2 – Try to reset the Reliability Monitor
The next thing you can do to fix the issue with the Reliability Monitor might want to reset it to resolve the problem. If the Reliability Monitor is already open, you have to close it and open it again. After the reset is done, it may take up to 24 hours for the Reliability Monitor to display results again. This should fix the problem.
Option 3 – Troubleshot the problem in a Clean Boot State
There are some instances that some conflicting programs installed in your computer might be the one that’s causing the Black border issue. To identify which program is causing the problem, you need to put your computer in a Clean Boot State. To do so, follow the steps below.
Log onto your PC as an administrator.
Type in MSConfig in the Start Search to open the System Configuration utility.
From there, go to the General tab and click “Selective startup”.
Clear the “Load Startup items” check box and make sure that the “Load System Services” and “Use Original boot configuration” options are checked.
Next, click the Services tab and select the “Hide All Microsoft Services” check box.
Click Disable all.
Click on Apply/OK and restart your PC. (This will put your PC into a Clean Boot State. And configure Windows to use the usual startup, just simply undo the changes.)
From there, start to isolate the problem by checking which one of the programs you installed recently is the root cause of the problem.
Afraid of the growing threats online? As you should be. But we’re here to show you what kinds of malware are out there and what you can do to keep them at bay.
Malware definition
Malware comes from the term malicious software. It’s software designed to attack and exploit devices and networks to the advantage of the hacker who made it.
Malware can be transmitted in different ways. Most commonly this happens via infected USB drives, downloadable files or malicious websites. Depending on the type and ultimate goal, the consequences of a malware attack can range from negligible to catastrophic.
What kinds of malware are there?
1. Virus
A virus is typically spread via infected files, websites or links. It’s one of the oldest malware types and one of the most difficult to get rid of. That’s because, once activated, it replicates itself - hence the name.
It can perform different kinds of attacks, depending on what the creator wants to achieve. The main characteristic of a virus is that it really doesn’t show itself until you activate the host. So that’s a scary thought for sure.
2. Adware
Sometimes an ad blocker isn’t enough to fight off unwanted ads. And some of them can, unfortunately, be malicious. They may redirect you to infected sites or prompt downloads of risky files. Even just opening a malicious site can lead to data theft.
So, definitely be careful when clicking around. Even if an ad seems completely legitimate, you can never be too sure.
3. Ransomware
Through ransomware, cybercriminals gain access to a user’s data and use it to extort them for money. Basically, the user is threatened with data deletion or even exposure if a ransom isn’t paid by a specific deadline.
This is a particularly nerve-wracking type of malware. If it targets an individual, it preys upon their sense of anxiety, fear, guilt and even shame. If it targets a business (which is a lot more common), it preys upon not only that business’s profit but also every single one of their customers and their data.
4. Trojans
This type of malware disguises itself very well as a legitimate-looking program. Once you download it, hackers can get full access and control of your device, data and network. They can even be hidden in games, apps and attachments. They cannot self-replicate, though, so we guess that’s… good news?
5. Worms
Worms can replicate, just like viruses, but you don’t need to actually activate the infected program for them to get going. They can be used for various purposes, ranging from data deletion to file encryption to support a ransomware attack.
6. Spyware
Spyware refers to malicious software that stays hidden on your computer and monitors your activity. The best-known type is keyloggers. This can be used to steal sensitive data like passwords and banking information.
7. Rootkits
Rootkits are among the most dangerous types of malware. They allow administrative access and full control of a device, which lets hackers continue hijacking all your data and monitoring your activity without your knowledge.
8. Botnets
Botnets are networks made up of bots - computers that cybercriminals have infected with malicious software. Bots and botnets give hackers remote access to users’ devices and allow them to spy on your camera, take screenshots, memorize passwords and launch Distributed Denial of Service attacks. This one truly makes your hair stand on end.
What can you do about it?
You know the old adage - better safe than sorry. And trust us, malware attacks are such a pain in the you-know-what that you really don’t want to be sorry.
Luckily, there are simple solutions that can shield you from most digital threats these days. What you want to be looking at is a solid antivirus program. Well, technically, you need an antimalware program, but since the latter evolved from the former, we still mostly refer to them as antivirus software. The majority of antimalware programs these days don’t just shield you from potential risks online, but include additional features as well. For example, some Bitdefender antivirus packages also include parental control and a VPN. And Bitdefender is not just for PCs either - it offers protection for your beloved iPhone or Android as well. You can throw in a password manager in there too, for an additional layer of security.
If you aren’t too concerned about all these various threats or feel like you don’t need extra security, you can at least take a step to protect your information from being exposed to lurking cybercriminals as you’re browsing. This can be done through a good VPN like Surfshark, which hides your identity in the digital space and prevents your data from being tracked.
Choosing the right protective software is especially important if you have children with access to the Internet, since they’re unfortunately even more vulnerable to malicious attacks. If you aren’t sure what the right kind of antimalware program is right for you, you can reach out to us and we’ll be happy to help keep your entire household or office digitally secure.
The bottom line
The truth is that there’s no way to be 100% protected in the online world. Hackers are constantly coming up with new ways to infiltrate our devices. But malware-battling software evolves along with them and there’s still plenty you can do to keep risks away. Stay safe!
If you suddenly encounter the DRIVER_CORRUPTED_EXPOOL Blue Screen of Death error when using your computer, then there might be some issues with the device drivers on your Windows 10 computer. This kind of BSOD error can occur at any point while you are using your PC. Its main cause is due to some error in the System Pool where a driver becomes incompatible with the operating system or when the configuration files get corrupted for some reason.
If you are one of the users who are currently inconvenienced by the DRIVER_CORRUPTED_EXPOOL error, worry not, as this post will give you some potential fixes that might help resolve the problem.
Option 1 – Perform a System Restore
Performing System Restore might help you in fixing the DRIVER_CORRUPTED_EXPOOL Blue Screen error. You can do this option either by booting into Safe Mode or in System Restore. If you are already in the Advanced Startup Options, just directly select System Restore and proceed with the next steps. And if you have just booted your PC into Safe Mode, refer to the steps below.
Tap the Win + R keys to open the Run dialog box.
After that, type in “sysdm.cpl” in the field and tap Enter.
Next, go to the System Protection tab then click the System Restore button. This will open a new window where you have to select your preferred System Restore point.
After that, follow the on-screen instructions to finish the process and then restart your computer and check if the problem is fixed or not.
Option 2 – Run the Blue Screen Troubleshooter
The Blue Screen troubleshooter is a built-in tool in Windows 10 that helps users in fixing BSOD errors like DRIVER_CORRUPTED_EXPOOL error. It can be found on the Settings Troubleshooters page. To use it, refer to these steps:
Tap the Win + I keys to open the Settings panel.
Then go to Update & Security > Troubleshoot.
From there, look for the option called “Blue Screen” on your right-hand side and then click the “Run the troubleshooter” button to run the Blue Screen Troubleshooter and then follow the next on-screen options. Note that you might have to boot your PC into Safe Mode.
Option 3 – Update the Device drivers
The device driver installed in your computer might be incompatible with your operating system which is the reason why the DRIVER_CORRUPTED_EXPOOL Blue Screen error occurs. To fix that, you have to update your device drivers.
Tap the Win + R keys on your keyboard to open the Run dialog box.
After that, type “msc” in the field and hit Enter or click OK to open the Device Manager.
After opening the Device Manager, update all the outdated Device drivers on your computer.
Next, right-click on all the driver entries that are appropriately labeled, and then click the Update driver option.
Now restart your PC and check if the BSOD error is fixed or not.
Option 4 – Uninstall any faulty device drivers
Tap the Win + R keys on your keyboard to open the Run dialog box.
After that, type “msc” in the field and hit Enter or click OK to open the Device Manager.
From there, look for any device driver which has a yellow exclamation mark which indicates that something is wrong with them.
And then right-click on each one of them and click on Uninstall.
Once you’re done uninstalling the faulty drivers, restart your computer and allow your computer to reinstall the drivers you just uninstalled.
Option 5 – Try running the System File Checker
System File Checker or SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files with good system files that might be causing the Machine Check Exception BSOD error. To run the SFC command, follow the steps given below.
Tap Win + R to launch Run.
Type in cmd in the field and tap Enter.
After opening Command Prompt, type in sfc /scannow
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
Windows Resource Protection did not find any integrity violations.
Windows Resource Protection found corrupt files and successfully repaired them.
Windows Resource Protection found corrupt files but was unable to fix some of them.
Option 6 – Try updating the BIOS
As you know, the BIOS is a sensitive part of a computer. Even though it is a software component, the functioning of the hardware depends on it largely. Thus, you must be careful when modifying something in the BIOS. So if you don’t know much about it, it’s best if you skip on this option and try the other ones instead. However, if you are well-versed in navigating the BIOS, then follow the steps below.
Tap the Win + R keys to open the Run dialog box.
Next, type “msinfo32” in the field and press Enter to open System Information.
From there, you should find a search field on the bottom where you have to search for the BIOS version and then press Enter.
After that, you should see the developer and version of the BIOS installed on your PC.
Go to your manufacturer’s website and then download the latest version of BIOS on your computer.
If you are using a laptop, make sure that you keep it plugged in until you have updated the BIOS.
Now double click on the downloaded file and install the new BIOS version in your computer.
Now restart your computer to apply the changes made.
Option 7 – Try resetting Windows 10
To fix this BSOD error, you can try resetting Windows 10. Doing so won’t get rid of any file in your system – instead of erasing all your media files and documents, this reset option resets all the system settings and files.
If you suddenly noticed that your Onscreen keyboard in Windows 10 has become completely white or transparent for some reason, then you’ve come to the right place as this post will guide you on what you can do to resolve this kind of issue in your computer.
As you know, the on-screen keyboard is included in Windows 10 and has an executable file named “osk.exe”. The on-screen keyboard is a part of the Ease of Access feature in Windows 10 which allows users to navigate the computer with the help of the mouse instead of the physical keyboard. However, there are times when you might encounter some issues when using the on-screen keyboard. One of the issues reported recently is that the on-screen keyboard becomes transparent or it only displays the borders but there is no way for you to access it. You also won’t be able to move it from the view completely. To fix this problem, there are several suggestions you can check out. You can try to check the Fade button or run the Windows Touch Keyboard troubleshooter. You can also restart its process in the Task Manager. For more details, refer to each one of the given options below.
Option 1 – Try to check the Fade button
The first thing you can do is to check the Fade button on the on-screen keyboard. You can find it at the bottom right corner of the keyboard. If it is enabled, then it’s probably the reason why your on-screen keyboard is transparent as it lets it fade in the background. Thus, you have to disable it to resolve the problem.
Option 2 – Try to run the Windows Touch Keyboard troubleshooter
The next option you can check out is running the Windows Touch Keyboard troubleshooter. This troubleshooter will help you identify the problem and would fix them automatically.
Option 3 – Try to restart the process of the on-screen keyboard via Task Manager
The next thing you can do is to restart the on-screen keyboard’s process in the Task Manager. Just follow the steps below.
First, tap the Ctrl + Shift + Esc keys to open the Task Manager.
Next, go to the Processes tab and look for the option that says, “Accessibility On-screen Keyboard”.
Once you found it, click on the drop-down arrow next to it and right click on the “On-screen Keyboard” option, and select End task to end its process.
After that, tap the Win + R keys to launch the Run utility and type “osk.exe” in the field, and then hit Enter to open the on-screen keyboard.
NoteHomepage (by MyWay) is a browser extension that may be bundled with other free software that you download off of the Internet, or delivered via other advertising means. When installed NoteHomepage will set the homepage and search engine for your web browser to http://search.myway.com.
While installing this extension will gather information from your browsing sessions, including website visits, clicked links, and sometimes even private information, that it later sends back to display unwanted ads into your browser.
Several anti-virus scanners have marked this extension as a Browser Hijacker and are therefore not recommended to keep on your computer. It is considered potentially unwanted, and many users wish to remove it, so it is flagged for optional deletion.
About Browser Hijackers
Browser hijacking is a form of unwanted software program, usually a web browser add-on or extension, which then causes modifications in the web browser’s settings. Browser hijacker malware is developed for many different reasons. Generally, browser hijacking is utilized for earning advertising revenue from forced advert mouse clicks and site visits. Even though it might seem harmless, these tools are designed by malicious individuals who always look to take full advantage of you, so that they can earn money from your naivety and distraction. Some browser hijackers are programmed to make certain modifications beyond the browsers, like altering entries on the system registry and letting other malware further damage your machine.
Find out how to identify a browser hijack
Below are some signs and symptoms that suggest your browser has been hijacked: the home page of your browser is changed unexpectedly; your browser is constantly being redirected to adult websites; the default search engine is changed; you are getting browser toolbars you have never noticed before; never-ending pop-up advertisements show up and/or your web browser popup blocker is disabled; your web browser gets sluggish, buggy, crashes regularly; Inability to navigate to certain websites, particularly anti-malware and also other security software websites.
So how exactly does a browser hijacker infect a computer?
Browser hijackers might use drive-by downloads or file-sharing networks or an e-mail attachment in order to reach a targeted PC. They could also come from add-on programs, also called browser helper objects (BHO), web browser plug-ins, or toolbars. Browser hijackers sneak into your computer in addition to free software application downloads also that you unknowingly install alongside the original. A good example of some infamous browser hijackers includes Babylon, Anyprotect, Conduit, SweetPage, DefaultTab, Delta Search, and RocketTab, however, the names are regularly changing.
Browser hijackers will affect the user’s web surfing experience severely, track the websites frequented by users and steal personal information, cause difficulty in connecting to the web, and eventually create stability problems, causing software programs and systems to crash.
Learn how to remove browser hijackers
Some hijackers can be removed by just uninstalling the corresponding freeware or add-ons through the Add or Remove Programs in the Windows control panel. But, many browser hijackers are difficult to get rid of manually. No matter how much you try to get rid of it, it might keep returning again and again. Additionally, manual removals demand in-depth system knowledge and thus can be a very difficult job for novices.
Industry experts always suggest users remove any malicious software including browser hijacker with an automatic malware removal tool, which is easier, safer, and quicker than the manual removal method. Employ a PC optimizer along with your anti-malware software to solve various registry issues, remove computer vulnerabilities, and boost your computer performance.
Download the software in Safe Mode with Networking
If the malware is set to run immediately when Windows starts, stepping into safe mode may block the attempt. Just minimal required applications and services are loaded whenever you start your laptop or computer in Safe Mode. To launch your Windows XP, Vista, or 7 PCs in Safe Mode with Networking, follow the instructions below.
1) At power on, hit the F8 key before the Windows splash screen begins to load. This would invoke the “Advanced Boot Options” menu.2) Select Safe Mode with Networking with arrow keys and press ENTER.3) As soon as this mode loads, you should have an internet connection. Now, get the malware removal software you want by utilizing the web browser. To install the program, follow the directions in the installation wizard.4) Immediately after installation, run a full scan and let the software remove the threats it discovers.
Switch over to an alternate browser
Some viruses may target vulnerabilities of a particular web browser that obstruct the downloading process. If you’re not able to download the anti-virus software program using Internet Explorer, this means malware is targeting IE’s vulnerabilities. Here, you need to switch to a different internet browser such as Firefox or Chrome to download the antivirus program.
Run anti-virus from a pen drive
To successfully get rid of the malware, you have to approach the problem of installing anti-malware software on the affected computer system from a different perspective. Adopt these measures to run the anti-virus on the affected computer system.
1) Download the anti-malware software on a virus-free computer.2) Plug the USB drive into the clean computer.3) Double click on the downloaded file to open the installation wizard.4) Select flash drive as the location when the wizard asks you exactly where you wish to install the application. Follow the on-screen instructions to finish the installation process.5) Remove the flash drive. Now you can utilize this portable anti-malware on the affected computer.6) Double-click the anti-malware software EXE file on the USB drive.7) Press the “Scan” button to run a full computer scan and remove viruses automatically.
Technical Details and Manual Removal (Advanced Users)
To eliminate NoteHomepage manually, navigate to the Add or Remove programs list in the Windows Control Panel and select the program you want to get rid of. For web browser plug-ins, go to your web browser’s Addon/Extension manager and choose the add-on you want to disable or remove. You might also want to reset your home page and search providers, as well as clear your web browser cache and cookies.
Finally, check your hard disk for all of the following and clean your Windows registry manually to remove leftover application entries after uninstalls. Please be aware that this is for professional users only and could be challenging, with incorrect file removal resulting in additional PC errors. In addition to that, certain malware is capable of replicating or preventing deletion. You’re advised to do this procedure in Windows Safe Mode.
There are various components that take part during a Windows Upgrade process such as the CPU, Disk, Network, and many more. This is why the process of upgrading your Windows 10 computer can be quite complex and due to its complexity, there are times when you might encounter some errors like the Windows Upgrade error 0x800701E3.
If you encounter this kind of error then it has something to do with the “disk” part of the whole upgrade process which could be due to a conflict with the storage of your Windows 10 computer. When you receive this error, you will see the following error message on your screen:
“Windows cannot install required files. Make sure all files required for installation are available and restart the installation. Error code: 0x800701e3.”
To fix this Windows Upgrade error, here are some suggestions that might help.
Option 1 – Delete Files from Software Distribution Folder & Catroot2 folders
The downloaded Windows Updates are placed in a folder called “SoftwareDistribution”. The files downloaded in this folder are automatically deleted once the installation is completed. However, if the files are not clean up or if the installation is still pending, you can delete all the files in this folder after you pause the Windows Update service. For complete instructions, refer to the steps below.
Open the WinX Menu.
From there, open Command Prompt as admin.
Then type in the following command – don’t forget to hit Enter right after typing each one of them.
net stop wuauservnet start cryptSvcnet start bitsnet start msiserver
After entering these commands, it will stop the Windows Update Service, Background Intelligent Transfer Service (BITS), Cryptographic, and the MSI Installer
Next, go to the C:/Windows/SoftwareDistribution folder and get rid of all the folders and files thereby tapping the Ctrl + A keys to select them all and then click on Delete. Note that if the files are in use, you won’t be able to delete them.
After resetting the SoftwareDistribution folder, you need to reset the Catroot2 folder to restart the services you just stopped. To do that, follow these steps:
Type each one of the following commands.
net start wuauservnet start cryptSvcnet start bitsnet start msiserver
After that, exit Command Prompt and restart your computer, and then try to run Windows Update once more.
Option 2 – Try running the DISM tool
You can try running the Deployment Imaging and Servicing Management or DISM tool to fix the Windows Upgrade problem. Using this built-in tool, you have various options such as the “/ScanHealth”, “/CheckHealth”, and “/RestoreHealth”.
Open the Command Prompt with admin privileges.
Then type in the following commands and make sure to hit Enter right after you type each one of them:
Dism /Online /Cleanup-Image /CheckHealth
Dism /Online /Cleanup-Image /ScanHealth
exe /Online /Cleanup-image /Restorehealth
Do not close the window if the process takes a while as it will probably take a few minutes to finish.
Option 3 – Run the System File Checker Scan
System File Checker or SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files with good system files. To run the SFC command, follow the steps given below.
Tap Win + R to launch Run.
Type in cmd in the field and tap Enter.
After opening Command Prompt, type in sfc /scannow
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
Windows Resource Protection did not find any integrity violations.
Windows Resource Protection found corrupt files and successfully repaired them.
Windows Resource Protection found corrupt files but was unable to fix some of them.
Restart your computer.
Option 4 – Try running the ChkDsk utility
You can also run the ChkDsk utility to fix the Windows Upgrade error 0x800701E3.
First, open This PC and right-click on your operating system partition for Windows.
Next, click on Properties and navigate to the Tools tab.
Then click on Check under the Error Checking section.
After that, a new mini window will be opened and from there click on Scan drive and let it scan your disk drive partition for any errors and then restart your computer.
Option 5 – Run the Windows Update Troubleshooter
Running the built-in Windows Update troubleshooter is one of the things you can first check out as it is known to automatically resolve any Windows Update or upgrade errors like error code 0x800701E3. To run it, go to Settings and then select Troubleshoot from the options. From there, click on Windows Update and then click the “Run the troubleshooter” button. After that, follow the next on-screen instructions and you should be good to go.
Option 6 – Run Microsoft’s online troubleshooter
Running Microsoft’s online troubleshooter might also help you fix the Windows Upgrade error code 0x800701E3. This online troubleshooter is known to help in fixing Windows Update errors, it scans your computer for issues that might be causing the problem and then fixes them automatically.
Originally Microsoft has imagined its widgets menu as Microsoft-only widgets but it seems that they have changed their mind.
Due to the latest leak, it seems that Microsoft will open the widgets menu to 3rd party developers as well but at launch, it will be only official widgets. It was hinted that later widgets menu will be open to developers who want to bring their own stuff into it.
Distribution, date, and technology that will need to be used in order to create your widget have not been discussed nor leaked at a given time but in some way, I am very glad that at least some customization will be in Windows 11.
It is funny and amusing how some things that were in Windows Vista are getting back like glass design, round corners, and widgets. Let’s just hope Windows 11 will be a better Windows than Vista was.