Fix DISM Error: The scratch directory size ...

One of the most useful and powerful built-in utility in Windows 10 is the DISM tool. This tool can be used with the Command Prompt command line as well as for other purposes. However, it is not without flaws and there are times when you may encounter some issues while using it.

One of the problems you can get while using the DISM tool is the following error:

“The scratch directory size might be insufficient to perform this operation”

This kind of error in DISM occurs when the DISM command is executed from the Windows Recovery Environment due to the limited size permissions of a delivery where the operating is being performed. To fix this DISM error, you need to follow the instructions laid out below.

Step 1: First, tap the Win + R keys to open the Run utility and then type “cmd” in the field and tap Enter to open Command Prompt.

Step 2: Next, you have to specify a scratch directory that contains the Windows folder and to do that, you can either use the DIR command or the BCEDIT command. So in the elevated command prompt type and enter “dir” or “bcedit”.

Step 3: After that, you will see a list of folders inside the C: partition. Now you have to create a folder named “scratch” inside the partition. To do so, execute the following command:

mkdir C:Scratch

Note: The command you just entered will create a directory inside the root of the C: partition named Scratch.

Step 4: Now that you’ve created the Scratch folder, note that each time you run any of the DISM commands, you have to enter the following code snippet in them:

/ScratchDir:C:Scratch

 Note: For instance, if you are using the DISM tool to repair the offline Windows image, instead of executing the “Dism /Online /Cleanup-Image /RestoreHealth” command, you now have to execute the “DISM /Image:C: /ScratchDir:C: Scratch /Cleanup-Image /Restorehealth” command. And if you want to remove a selected installed update package, you can use the “DISM /image:C: /ScratchDir:C:Scratch /Remove-Package /PackageName:Package_for_RollupFix~31bf3856ad364e75~amd64~~16299.196.4.9” command. Keep in mind that the mentioned package is only an example. And lastly, you also have to replace the drive letter in the new code snippet when you execute the commands given above.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Fixing the No Audio Output Device is Installed
If you suddenly encountered an error that says, “No Audio Output Device is installed” on your Windows 10 computer, worry not for this post will guide you on how exactly you can fix the problem. There are several possible reasons why this error pops up. It could be due to a recent Windows 10 update you’ve installed, or it could be due to a corrupted or outdated audio driver, and so on. There are several potential solutions to this error. You can try running the built-in Audio Playing troubleshooter or update or uninstall the Audio driver. You could also try to update the Intel Smart Sound Technology Audio Control driver, as well as contact support for your laptop or computer. For more details, refer to each one of the provided options below.

Option 1 – Try to run the Playing Audio Troubleshooter

Since the Windows 10 operating system has the Playing Audio Troubleshooter, you can use this troubleshooter to try and fix the problem with the “No Audio Output Device is installed” error. You can access this tool in the Control Panel or in the Taskbar Search and even on the Troubleshooters page of Windows 10. Run this troubleshooter and see if it can fix the issue or not.

Option 2 – Try to update the Audio driver

If the error has something to do with software, chances are it might be related to the audio driver – it could be that the newest version of your Windows 10 does not work well with the old version of the driver. This is why you have to update your audio driver to the newest available version.
  • Tap the Win + R keys to open the Run dialog box and then type in MSC and tap Enter or click OK to open the Device Manager.
  • Expand the section of the Sound, video, and Game Controllers.
  • And then from the drop-down menu, select the Update Driver option and follow the on-screen instructions to install the latest version of the driver.
  • Then also click on the option, “Search automatically for updated driver software.
  • Restart your PC after the installation.
Note: If updating the Audio driver didn’t work, you can go to the website of your PC manufacturer and look for the support section where you can download the drivers for your computer. You just need to take note of your PC’s correct model and model number so you can find the appropriate driver.

Option 3 – Try removing and reinstalling the sound card

If option 1 didn’t work, you can also try to remove and reinstall the sound card of your computer to fix the high-pitched sound coming from your computer’s speakers.
  • To get started, tap on the Windows key + R to pull up the Run box.
  • Next, type in “MSC” in the box to open the Device Manager.
  • After opening the Device Manager, go to the “Sound, video, and game controllers” option then right-click on the sound card.
  • Finally, click on Uninstall and tick the box with a label that says, “Delete the driver software for this device” and close the Device Manager.
  • Restart your computer and check if the problem’s fixed or not.
Note: After you restart your computer, the system should reinstall the speaker automatically. But if it does not reinstall, you can follow the aforementioned steps again to go to the Device Manager. From there, go back to “Sound, video, and Game Controllers” and right-click on the sound card. After that, enabling the sound card and restart your computer once more. That should fix the problem.

Option 4 – Try updating the Intel Smart Sound Technology Audio Control driver

If the three options given above didn’t fix the error, you might want to try updating the Intel Smart Sound Technology Audio Control driver. To do so, follow these steps:
  • Tap the Win + X keys and select the Device Manager option from the menu.
  • Next, scroll down and click on the System Devices option and select the “Intel Smart Sound Technology Audio Control” option.
  • Then right-click on it and select the “Update driver” option.
  • After a couple of seconds, the wizard will look for an available driver and will automatically update it.
  • Restart your computer and see if the error is now fixed.
Read More
Backup and Restore pinned Taskbar Items
Pinned Windows 10 Taskbar Items. One of the most used interfaces in the Windows environment is the Taskbar. It is where users like to pin their most-used programs as well as shortcuts with extra privileges and automated tasks. In fact, it’s a lot better than the Start Menu. So if any Windows Update messes up with your computer, or if you’ve just switched to a different computer, setting up the Taskbar with the very same set of programs you used to have is definitely not an easy task. But worry not as this post will guide you on how you can backup and restore the items on your Taskbar either manually or automatically.

Manual Backup:

  • Tap the Win + R keys to open the Run prompt.
  • Then type “%AppData%MicrosoftInternet ExplorerQuick LaunchUser PinnedTaskBar” in the field and hit Enter to open the folder where you can see all the shortcuts or pinned items in the Taskbar.
  • After that, copy all the files in the folder and paste them somewhere else as a backup. For instance, E:\Pinned Items Backuppinnedshortcuts.
  • Next, tap the Win + R keys to open the Run prompt once more, and then type “Regedit” in the field and hit Enter to open the Registry Editor. When the User Account Control dialog box appears, click Yes.
  • After opening the Registry Editor, navigate to this key – HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerTaskband
  • Then right-click on the Taskbar folder and select Export.
  • Now save the file with the .reg extension to another location like the E:\Pinned Items Backup folder and then name it.
  • Close the Registry Editor.

Manual Restore:

Make sure to copy all the files to one of the drives if you are using another computer and then refer to the following steps.
  • Tap the Win + R keys to open the Run prompt.
  • Then type “%AppData%MicrosoftInternet ExplorerQuick LaunchUser PinnedTaskBar” in the field and hit Enter to open the same folder where you just copied all the shortcuts. Make sure to keep it open.
  • Then open the backup folder where you saved all the pinned items and copy all the files there.
  • Next, go to the Taskbar folder (%AppData%MicrosoftInternet ExplorerQuick LaunchUser PinnedTaskBar) and then paste your files in there. If you encounter a problem while doing so, just replace it with your own set of files.
  • After that, go to E:\Pinned Items Backuppinnedshortcuts and then double click on tb-pinned-items.reg. If a User Account Control prompt appears, click Yes. This will add the registry file into the main registry hub. You will also get a dialog box that will confirm that data has been added to the registry successfully. Click OK.
  • You should now see the items on the Taskbar. You have to restart Windows Explorer. To do so, end its process in the Task Manager.

Automatic Backup:

Backing up and restoring the pinned Taskbar items in your Windows 10 computer can be done automatically as well. But before you get started on the process, you need to understand what’s going on behind the hood first. First, you need to create two bat files and name them “Backup Pinned Taskbar Items” and “Restore Pinned Taskbar Items”. After you have that covered, refer to the following steps:
  • Open the Notepad app and paste the following details and save it as “Backup Pinned Taskbar Items.bat.
REG EXPORT HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerTaskband “E:\Pinned Items Backuptb-pinned-items.reg” xcopy “%AppData%MicrosoftInternet ExplorerQuick LaunchUser PinnedTaskBar” “E:\Pinned Items Backuppinnedshortcuts” /E /C /H /R /K /Y
  • After that, run the newly created bat file with admin privileges.

Automatic Restore:

  • Open the Notepad app and paste the following details and save it as “Restore Pinned Taskbar Items.bat”.
REGEDIT /S “E:Pinned Items Backuptb-pinned-items.reg” xcopy “E:Pinned Items Backuppinnedshortcuts” “%AppData%MicrosoftInternet ExplorerQuick LaunchUser PinnedTaskBar” /E /C /H /R /K /Y
  • After that, run the bat file with admin privileges.
Note: Just so you know, there is a drawback to this process as we’ve noticed that any pinned apps that were downloaded from the Windows Store don’t appear in these places and any items downloaded and installed separately from the internet and then pinned.
Read More
A Simple Guide to Fixing Error Code 0x80070424

Error Code 0x80070424 - What is it?

The error code 0x80070424 is a Windows PC error. It may occur when using Windows Update, Microsoft Update or while trying to change Windows Firewall settings. This error does not allow you to enable or disable the Firewall on your PC. It is quite common on Windows 7 and Vista. Symptoms of error code 0x80070424 include Windows Firewall may not be listed on Services.msc, inability to change Windows Firewall settings and you may come across this error message when restarting your PC, “Base Filtering Engine Service could not be found in the system”.

Solution

Restoro box imageError Causes

Some of the common causes of the error code 0x80070424 include:
  • Base Filtering Engine Service file corruption
  • Registry issues
When you encounter this error code on your system, it is recommended to fix it immediately as this error can lead to serious PC damages.

Further Information and Manual Repair

To resolve the error code 0x80070424 here are some of the best DIY solutions for you. By following these solutions, you can fix the error all by yourself. These are simple, easy, and quick PC fixers that require no technical expertise. Just follow the simple steps and the error will be resolved in the shortest time.

Re-Install Windows Firewall & Filtering Engine

If the underlying cause of the error 0x80070424 is Base Filtering Engine Service file corruption, then the best way to resolve it is to download the Firewall and register file from a reliable website. Once you download it extract the zip on your desktop.
  • Double click on both files one by one to confirm their installation on your PC. Once installed, restart your PC and click on the start button. Search file type and run and then press enter.
  • When the Run window opens, type REGEDIT and click OK. After that, from the left sidebar navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetservicesBFE.
  • Now simply right-click on BFE folder and choose permission. Once that’s done, click on add button and type everyone then press OK to confirm settings.  Here you will see the ‘everyone’ added field.
  • After that in the below permission panel, tick the box that says Full Control and confirm. Now close the window and go to the menu and type services MSC.
This will open the service window. From the list search for ‘Base Filtering engine file’ right-click on it. Now search for Windows Firewall and see if you can change the settings. This procedure is most likely to resolve the error code 0x80070424 on your PC. It is time-consuming but worth it.

Use a Registry Cleaner

None the less, if the error is triggered by registry issues, then it is advisable to download Restoro. This is an advanced and highly functional PC fixer integrated with multiple utilities including a powerful registry cleaner. The registry cleaner utility detects all registry issues on your system and fixes them in seconds. It wipes out the excess, unnecessary, and obsolete registry entries and files corrupting your system cleans, and restores the registry. It is user-friendly and compatible with all Windows versions. So whether you are using Windows 7, 8, XP or Vista, you can run it on all versions with ease and resolve the error code 0x80070424 generated by registry issues. This software also includes other functional and value-added features like antivirus and a system optimizer. Click here to download Restoro and resolve error code 0x80070424  on your PC today!
Read More
How to get rid of DailyProductivityTools

The DailyProductivityTools Toolbar is packed as a browser extension that claims to increase your productivity with access to free online tools and developed by Mindspark Inc. This extension may seem handy at first, however, while browsing the internet with it active you will experience additional ads, sponsored content, and pop-up ads throughout your browsing sessions and search results.

When installed DailyProductivityTools changed your default new tab page to Search.MyWay.com disguising as a ‘Enhanced Google Search Engine’. This extension monitors your browsing activity, visited websites and links, then uses this information to better target Ads.

DailyProductivityTools has been marked as a Potentially Unwanted Program, and is recommended for removal by many anti-virus applications.

About Browser Hijackers

Browser hijacking is a type of unwanted software, often a web browser add-on or extension, which causes modifications in the browser’s settings. Browser hijacker malware is designed for a variety of reasons. Generally, the idea is to force users visit certain sites that are aiming to increase their site visitor traffic and produce higher ad revenue. Many people believe that the browser hijacker is only a harmless website but that is incorrect. Almost every browser hijacker pose an actual threat to your on-line safety and it is important to classify them under privacy risks. What’s more, hijackers can make the entire infected system vulnerable – other harmful malware and viruses will grab these opportunities to intrude into your computer system very easily.

How one can identify a browser hijack

The following are some symptoms that suggest you have been hijacked: you find unauthorized modifications to your internet browser’s homepage; your internet browser is constantly being redirected to adult sites; the default web browser configurations have been modified and/or your default search engine is altered; you find many toolbars on the web browser; you see lots of pop-ups on your computer screen; your browser has become unstable or starts running slowly; you’re blocked to access those sites of antivirus solution providers.

So how does a PC get infected with a browser hijacker?

A browser hijacker can be installed on your computer if you check out an infected site, click on an email attachment, or download something from a file-sharing site. They could also come from add-on programs, also known as browser helper objects (BHO), browser plug-ins, or toolbars. Browser hijackers sneak into your pc along with free software downloads also that you unwittingly install alongside the original. Examples of popular browser hijackers are Fireball, Ask Toolbar, GoSave, CoolWebSearch, RocketTab and Babylon Toolbar. Browser hijacking can lead to severe privacy problems and even identity theft, disrupt your browsing experience by taking control of outbound traffic, considerably slows down your PC by consuming lots of resources, and lead to system instability also.

Browser Hijacker Malware – Removal

Certain browser hijacking can be easily corrected by finding and removing the corresponding malware program through your control panel. But, many hijackers will be more difficult to locate or remove since it might get itself connected with certain important computer files that enable it to operate as a necessary operating system process. Novice PC users shouldn’t ever attempt for the manual form of removal, as it demands comprehensive system knowledge to do repairs on the system registry and HOSTS file. Professionals always recommend users remove any malicious software including browser hijacker by using an automatic malware removal tool, which is better, safer, and faster than the manual removal method. Among the best tools for repairing browser hijacker malware is SafeBytes Anti-Malware. It can help you eliminate any pre-existing malware on your computer and provides you real-time monitoring and protection against new internet threats. Along with anti-virus software, a system optimizer program, similar to Total System Care, can help you repair Windows registry errors, eliminate unwanted toolbars, secure your internet privacy, and stabilize software programs installed on your computer.

Malware Blocking Access To Safebytes Site And Anti-Malware Downloads - What To Do?

Malware can cause many kinds of damage to computer systems, networks, and data. Some malware types modify internet browser settings by including a proxy server or modify the PC’s DNS settings. In such cases, you’ll be unable to visit certain or all of the websites, and therefore unable to download or install the necessary security software to eliminate the malware. If you are reading this article, chances are you’re stuck with a virus infection that is preventing you to download and install Safebytes Anti-Malware program on your PC. Although this kind of issue will be tougher to get around, there are a few actions you can take.

Install in Safe Mode

In the event the malware is set to run at Windows start-up, then booting in Safe Mode should prevent it. Since only the minimum applications and services start-up in safe mode, there are hardly any reasons for conflicts to take place. The following are the steps you should follow to remove viruses in Safemode. 1) After switching on the computer, hit the F8 key while the Windows splash screen begins to load. This would invoke the “Advanced Boot Options” menu. 2) Select Safe Mode with Networking with arrow keys and press ENTER. 3) When this mode loads, you should have the internet. Now, utilize your internet browser normally and go to https://safebytes.com/products/anti-malware/ to download Safebytes Anti-Malware. 4) Immediately after installation, run a full scan and allow the software to get rid of the threats it detects.

Switch over to an alternate internet browser

Certain viruses may target vulnerabilities of a specific browser that block the downloading process. In case you suspect that your Internet Explorer has been hijacked by a virus or otherwise compromised by online hackers, the best course of action is to switch over to a different web browser like Firefox, Chrome, or Safari to download your favorite security software – Safebytes Anti-Malware.

Run anti-malware from your USB drive

Here’s yet another solution which is using a portable USB antivirus software that can scan your system for malicious software without needing installation. Follow these steps to run the anti-malware on the infected computer. 1) On a clean computer, download and install Safebytes Anti-Malware. 2) Plug in the USB flash drive to a USB slot on the clean computer. 3) Run the setup program by double-clicking the executable file of the downloaded application, with an .exe file extension. 4) When asked, choose the location of the USB drive as the place where you would like to store the software files. Follow the instructions on the screen to finish off the installation process. 5) Now, transfer the flash drive to the infected PC. 6) Run the Safebytes Anti-malware directly from the pen drive by double-clicking the icon. 7) Run Full System Scan to detect and clean-up up all kinds of malware.

SafeBytes Anti-Malware: Light-weight Malware Protection for Windows Computer

Nowadays, anti-malware software can protect your computer from different types of online threats. But how to select the best one amongst many malware protection application that’s available in the market? Perhaps you might be aware, there are many anti-malware companies and tools for you to consider. Some of them are good, some are ok types, while some will affect your PC themselves! It is important to choose a company that creates industry-best anti-malware and it has attained a reputation as reliable. On the list of highly recommended software programs is SafeBytes Anti-Malware. SafeBytes carries a superb reputation for quality service, and clients seem to be happy with it. SafeBytes antimalware is a highly effective and user-friendly protection tool which is suitable for users of all levels of computer literacy. Using its cutting-edge technology, this software will help you eradicate several types of malware including computer viruses, PUPs, trojans, worms, adware, ransomware, and browser hijackers.

SafeBytes has got a variety of wonderful features that can help you protect your PC from malware attack and damage. Some of them are listed as below:

Antimalware Protection: This deep-cleaning antimalware software goes much deeper than most antivirus tools to clean your computer system. Its critically acclaimed virus engine finds and disables hard to remove malware that hides deep inside your personal computer. Real-time Active Protection: SafeBytes gives round the clock protection for your computer restricting the malware attacks instantly. This software will continuously monitor your PC for suspicious activity and updates itself continuously to keep current with the latest threats. Web Filtering: SafeBytes gives instant safety rating about the pages you’re going to check out, automatically blocking harmful sites and make sure that you’re certain of your online safety while browsing the internet. Low CPU Usage: SafeBytes is well known for its low influence on computer resources and great detection rate of diverse threats. It runs silently and efficiently in the background so you are free to use your computer at full power all the time. 24/7 Customer Support: SafeBytes provides you with 24/7 technical support, automatic maintenance and updates for best user experience. SafeBytes has come up with a wonderful anti-malware solution that can help you conquer the latest computer threats and virus attacks. There is no doubt that your computer system will be protected in real-time as soon as you put this software to use. So if you’re searching for the very best malware removal application out there, and if you don’t mind paying out some dollars for it, opt for SafeBytes Anti-Malware.

Technical Details and Manual Removal (Advanced Users)

If you’d like to carry out the removal of DailyProductivityTools manually instead of using an automated tool, you may follow these simple steps: Navigate to the Windows Control Panel, click the “Add/Remove Programs” and there, choose the offending program to uninstall. In case of suspicious versions of web browser plug-ins, you can actually get rid of it through your web browser’s extension manager. You will likely also want to reset your internet browser. If you opt to manually delete the system files and Windows registry entries, utilize the following checklist to make sure you know exactly what files to remove before carrying out any actions. But bear in mind, this can be a difficult task and only computer experts can perform it safely. Furthermore, certain malicious programs have the capability to defend against its removal. It is advisable that you carry out the removal procedure in Safe Mode.
Files: %UserProfile%\Local Settings\Application Data\DailyProductivityToolsTooltab %LOCALAPPDATA%\DailyProductivityToolsTooltab %UserProfile%\Local Settings\Application Data\Google\Chrome\User Data\Default\Sync Extension Settings\difcnlhbpohkmlhkpkimihocbagbijii %LOCALAPPDATA%\Google\Chrome\User Data\Default\Sync Extension Settings\difcnlhbpohkmlhkpkimihocbagbijii %UserProfile%\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Extension Settings\difcnlhbpohkmlhkpkimihocbagbijii %LOCALAPPDATA%\Google\Chrome\User Data\Default\Extensions\difcnlhbpohkmlhkpkimihocbagbijii Registry: HKEY_LOCAL_MACHINESoftware\Wow6432Node\DailyProductivityTools HKEY_LOCAL_MACHINESoftware\DailyProductivityTools HKEY_LOCAL_MACHINESoftware\Microsoft\Internet Explorer\DOMStorage\dailyproductivitytools.dl.myway.com HKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..Uninstaller DailyProductivityToolsTooltab Uninstall Internet Explorer
Read More
Android malware spies while posing as a Update
New malware with extensive spyware capabilities steals data from infected Android devices and is designed to automatically trigger whenever new info is read to be exfiltrated. The spyware can only be installed as a 'System Update' app available via third-party Android app stores as it was never available on Google's Play Store. This drastically limits the number of devices it can infect, given that most experienced users will most likely avoid installing it in the first place. The malware also lacks a method to infect other Android devices on its own, adding to its limited spreading capabilities. However, when it comes to stealing your data, this remote access trojan (RAT) can collect and exfiltrate an extensive array of information to its command-and-control server. Zimperium researchers who spotted it observed it while "stealing data, messages, images and taking control of Android phones."

What happens when malicious software is installed

"Once in control, hackers can record audio and phone calls, take photos, review browser history, access WhatsApp messages, and more," they added. Zimperium said its extensive range of data theft capabilities includes:
  • Stealing instant messenger messages;
  • Stealing instant messenger database files (if the root is available);
  • Inspecting the default browser's bookmarks and searches;
  • Inspecting the bookmark and search history from Google Chrome, Mozilla Firefox, and Samsung Internet Browser;
  • Searching for files with specific extensions (including .pdf, .doc, .docx, and .xls, .xlsx);
  • Inspecting the clipboard data;
  • Inspecting the content of the notifications;
  • Recording audio;
  • Recording phone calls;
  • Periodically take pictures (either through the front or back cameras);
  • Listing of the installed applications;
  • Stealing images and videos;
  • Monitoring the GPS location;
  • Stealing SMS messages;
  • Stealing phone contacts;
  • Stealing call logs;
  • Exfiltrating device information (e.g., installed applications, device name, storage stats).

How does it work?

Once installed on an Android device, the malware will send several pieces of info to its Firebase command-and-control (C2) server, including storage stats, the internet connection type, and the presence of various apps such as WhatsApp. The spyware harvests data directly if it has root access or will use Accessibility Services after tricking the victims into enabling the feature on the compromised device. It will also scan the external storage for any stored or cached data, harvest it, and deliver it to the C2 servers when the user connects to a Wi-Fi network. Unlike other malware designed to steal data, this one will get triggered using Android's contentObserver and Broadcast receivers only when some conditions are met, like the addition of a new contact, new text messages, or new apps being installed. "Commands received through the Firebase messaging service initiate actions such as recording of audio from the microphone and exfiltration of data such as SMS messages," Zimperium said. "The Firebase communication is only used to issue the commands, and a dedicated C&C server is used to collect the stolen data by using a POST request."

Camouflage

The malware will also display fake "Searching for the update.." system update notifications when it receives new commands from its masters to camouflage its malicious activity. The spyware also conceals its presence on infected Android devices by hiding the icon from the drawer/menu. To further evade detection, it will only steal thumbnails of videos and images it finds, thus reducing the victims' bandwidth consumption to avoid drawing their attention to the background data exfiltration activity. Unlike other malware that harvests data in bulk, this one will also make sure that it exfiltrates only the most recent data, collecting location data created and photos taken within the last few minutes. If you would like to read more helpful articles and tips about various software and hardware visit errortools.com daily.
Read More
Do-It-Yourself Guide to Fixing Runtime Error 5

Runtime Error 5 - What Is It?

Runtime Error 5 is one of those errors that Windows users encounter at least once in their life. Generally, when Runtime Error 5 occurs, the message that appears says ‘Invalid Procedure Call or Argument’. Runtime Error 5 occurs because the Quality Analyst function that resides within the Operating System behaves in an abnormal manner and the user receives a warning.

Solution

Restoro box imageError Causes

As explained above, Runtime Error 5 is caused because of the unexplained behavior of the Quality Analyst function. The problem occurs when the function is lost and is not mapped to any drive. As a result, Windows is unable to find and load it and displays the error message. Runtime Error 5 is also caused by other reasons listed below as follows.
  • When files of programs like Visual Basic use bad entries in the registry.
  • When a user attempts to load Internet Explorer and a global cash of browser occurs, this also causes Runtime Error 5.
Since these types of errors can easily be fixed, it is strongly advised that a user takes the necessary actions to keep them from occurring in the future.

Further Information and Manual Repair

Some instructions for users to fix Runtime Error 5 as soon as it appears are listed below as follows.
  1. Users are recommended to restart their computers. However, prior to doing so, it is advised that any programs that are opened are closed and work is saved to prevent data loss. Once the computer restarts, users should load the program that triggered Runtime Error 5 once again to determine whether or not the error recurs.
  2. If the problem persists, the best approach is to uninstall the program causing the error. This can be accomplished by going to the ‘Control Panel’ and selecting the ‘Add/Remove programs’ option if one is using Windows XP or Windows 95. However, if a user is running Windows 7, the same task can be accomplished in the ‘Program and Features’ option. If there’s an option that allows you to clear personal settings and preferences, the box should be checked.
  3. Now reinstall the program using the latest version of the installer to stop encountering this error. Use any patch for the program if available. Run installer while following the instructions on the screen. Check the default settings as well.  It is suggested to instantly install any patches if available.
  4. Another piece of advice is to simultaneously press ‘Ctrl, Shift, and Esc’. Windows task manager will appear. Go to the “processes” tab and select a process that doesn’t look familiar to you. Note the filename and click on the ‘End Process’ button. Load the program again and find out if the error occurs. Once the program causing the error is identified, the user can perform the steps listed above to resolve the problem.
Read More
How to turn off Live Photo on iPhone

Apple introduced the Live Photo feature way with iPhone 6S in their iOS9. Live Photo idea was that each time you take a photo, your phone will capture a few seconds of video along with sound and all of that is sent when you share your photo. This of course can sometimes be really bad when some not wanted audio gets recorded in the background.

live photo

Since the feature was introduced it has been set as the default option when taking pictures so each time you snap one you just capture a small amount of video and audio along. Good thing is that this feature can be turned off and the even better news is that you can edit your old photos to remove back video and audio.

How to share only photo

You can keep your Live Photos but share only a single still typical photo if you wish. Go to the photos app on your phone and select the photo you wish to share. Press the Share button on the bottom left part of the screen and once the Share menu appears tap on the Live button in the upper left corner of the selected photo. The button should turn grey and become slashed and now you can share only still photo. This is only temporary for this one specific share so next time you want to do this you will have to go through the process again.

How to disable Live Photo

If you are not happy with the previous solution and really do not want to turn off the Live feature each time you want to share a photo or you just simply do not want the feature at all there is way to turn if off for good. Take note that you can temporarily not use this feature just by opening the camera, switching to photo mode, and then tapping on the Live photo button on the toolbar that looks like three circles one inside another. This will temporarily turn the Live Photo feature for this session but next time when you open the camera by default it will be turned on again. This is a good approach if you want the feature but sometimes you just want not to use it.

In order to turn it off completely go to the settings of your phone and go to Camera and then preserve settings. inside the preserve setting turn the switch Live Photo to ON position, now go-to camera and again click on the live photo button to turn it off but this time setting will be saved and next time you open the camera it will not be ON.

Editing old Live Photos

As stated before you can edit your old pictures in order to make them stills. You can edit them to remove audio only but keep the video part, or you can completely remove everything and convert them into typical still images.

In order to only remove audio from your Live Photos go to pictures and select one that you wish to change, click on edit, and inside edit tap on the Live Photo icon (three circles). Next tap on the audio icon located in the top left corner of your screen and it will change into the mute icon. Click on done and you are finished.

To completely remove the Live photo go to Photos, select picture, click on edit and select the live photo button again. This time tap and hold the Live button next to the sound until it turns gray with a strike through it. Click on done and you are finished.

Read More
Windows Upgrade/Activation error 0xc03f6506
There are a lot of home users that often get a computer that comes installed with the Windows 10 Home. And since Windows 10 Pro offers more features and utilities compared to Windows 10 Home, a lot of users also prefer to upgrade their Windows 10 Home computers to Windows 10 Pro. However, while doing so, a number of users reported that they encountered error 0xc03f6506 and they were not able to proceed with the upgrade. If you are one of these users, when you encounter error 0xc03f6506, you will see the following error message on your screen:
“The last product key you entered can’t be used on this copy of Windows (0xc03f6506).”
This particular error tends to occur when you go on to activate Windows 10 although it can also appear during the upgrade process. In such cases, you will see the following error message:
“Unable to upgrade your edition, We can’t upgrade your edition of Windows. Try upgrading your edition of Windows again. (0xc03f6506).”
To fix the Activation Error Code 0xc03f6506 in Windows 10, use the options provided below as references but before you proceed, make sure that you create a System Restore point first.

Option 1 – Try to use the Registry Editor

If you have already upgraded from Windows 10 Home to Windows 10 Pro and you’re having trouble with its Activation, then you might want to apply some registry tweaks to fix the problem. How? Refer to these steps:
  • Tap the Win + R key combination to open the Run dialog box.
  • Then type “Regedit” in the field and click OK or tap Enter to open the Registry Editor.
  • Next, navigate to this registry key: ComputerHKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersion
  • From there, look for a DWORD named “EditionID” and once you found it, double click on it and change its Value data to Windows 10 Professional.
  • After that, look for another DWORD named “ProductName” and double click on it to change its Value data to Windows 10 Professional.
  • Once you’re done, restart your computer to apply the changes made successfully.

Option 2 – Try to use Command Prompt

If the registry tweaks you applied didn’t fix the Activation error, then you can try using Command Prompt instead. Note that you can use this option in both scenarios pointed out above.
  • First, you have to insert a bootable drive of the Windows10 installer.
  • Next, tap the Win + X keys and select Command Prompt (Admin) from the menu.
  • After opening Command Prompt as admin, navigate to the root location of the bootable drive inside the Command Prompt command line.
  • Once you’re already there, type the following command and tap Enter:
setup.exe /auto upgrade /pkey <YOUR WINDOWS 10 PRO EDITION PRODUCT KEY>
After entering the command, check if it was able to fix the Windows Upgrade or Activation error 0xc03f6506. If not, refer to the next given option below.

Option 3 – Try to disable the Network Adapter

Just like the second option, you can also use this option for both the given scenarios above.
  • Tap the Win + X keys and select Network Connections from the menu.
  • This will open the settings for your network and on the left side panel, click on the “Change adapter settings” link. This will open Control Panel.
  • From there, click on the network your computer is connected to, and then right-click on the Network Adapter that you are using and select Disable.
  • After disabling the Network Adapter, try to switch to the edition of your copy of Windows 10 again and see if the problem is now fixed and don’t forget to double click on the disabled Network Adapter to get back on the Network.
Read More
How to Fix msrtn32.exe error or high CPU usage
If your Windows 10 computer slows down, the first thing you can do is to check the status of the resource usage in the Task Manager. In such cases, it shoots up to even 1000% which causes the system to either hang or freeze since some programs are using a major chunk of system resources. And this is the case with msrtn32.exe. Msrtn32.exe is a malicious file that may try to steal your digital currency. It can get installed on your computer when you install a browser plugin or extension that can modify the default settings of browsers, the content of web pages, search results, as well as display tons of intrusive ads. So if you see msrtn32.exe under the Processes tab of the Task Manager If you see msrtn32.exe under the Processes tab of your Task Manager, refer to the suggestions given below to get rid of it and restore your computer’s normal function. Before you proceed, take note that this executable file is found in the following location:
C:/Program Files(x86)msrtn32

Option 1 – Delete the folder where msrtn32.exe is located

The first thing you can do is to go to C:/Program Files(x86)/msrtn32. From there, look for the malicious executable file and delete its folder. If you are not able to delete the folder, make sure that you’re logged in as administrator and then try again.

Option 2 – Try scanning your computer using Windows Defender

Since you are dealing with a malicious file, if you weren’t able to delete the folder where the file is located, you can scan your computer using the built-in Windows Defender program and then eliminate the malicious file. Follow the steps below to do so:
  • Tap the Win + I keys to open Update & Security.
  • Then click on the Windows Security option and open Windows Defender Security Center.
  • Next, click on Virus & threat protection > Run a new advanced scan.
  • Now make sure that Full Scan is selected from the menu and then click the Scan Now button to get started.
Read More
A fast Guide to Fixing 2GB filesize Error

What exactly is the 2GB filesize Error?

The PST file could be around 2 gigabytes if you are using MS Outlook 2002 or any earlier versions for your own personal Folders. The 2GB filesize malfunction occurs when your PST memory both reaches or exceeds this limit. The 2GB size problem code is, in addition, referred to as an outsize PST file error. When this error happens you may be unable to deliver or receive e-mails via your Outlook account. Moreover, you'll likewise not be able to add any new data or even view your important calendar items, notes, and saved drafts. MS-Outlook shows several types of problem codes which indicate the 2GB file size dilemma. Listed below are some of the messages that can be displayed on your monitor:-
  • The file could not be added to the folder. The action could not be completed.
  • Task 'Microsoft Exchange Server - Receiving' reported error (0x8004060C): 'Unknown Error 0x8004060C'
  • Can't copy the item
  • Errors have been detected in the file xxxx.pst. Quit all mail-enabled applications.
  • Task 'Microsoft Exchange Server' reported error (0x00040820):'Errors in background synchronization. In most cases, further information is available in a synchronization log in the Deleted Items folder.'
  • xxxx.pst cannot be accessed - 0x80040116

Solution

Restoro box imageError Causes

The simple explanation for this malfunction is that you have maxed out the two gigabytes account limit. This happens in case you continue downloading fresh data and saving files and the old emails in your Outlook account. Over time, the space becomes limited and along with it the 2 GB file limit error. This error also presents a critical danger of data loss which is a possibility in your Outlook account, which hinders you as well from fully utilizing your email account. For regular Outlook customers, who utilize this program for practically all email communication within as well as outside the office, this error is annoying and frustrating as it causes a great deal of annoyance as well as decreases their performance and productivity.

What exactly are the Symptoms?

Below are a few signs that will help you recognize the 2GB file-size error:
  • Inability to fill and open the OST and PST files
  • Error messages pop-ups
  • Failure to send emails
  • Failure to make or edit new contacts
  • Inability to synchronize the file

Further Information and Manual Repair

It is desirable to fix this error code right away especially if this is the preferred strategy to carry out communication in your office. Fix it immediately or else you might not receive e-mails that are important from your colleagues. There are 3 ways to solve this issue.

Method 1

One is to remove the old e-mails and connections and replace them with new ones. This may not be the best option for you in case you don't wish to lose emails and your old contacts.

Method 2

The second alternative would be to install a fresh version of MS-Outlook like 2010. The file-size limits of OST and PST files in these editions are larger than in ms-outlook 2002. On the other hand, this is a good idea for the long run but may not be the best idea for today as you will not have the ability to recover your previous e-mails and contacts that are outdated.

Method 3

The third and maybe the method that is best to resolve the 2GB file size limit error while ensuring the restoration of your old e-mails and contacts as well as increasing the limit to 4GB, is Restoro program's installation. Here may be the best recovery program on the market. It is really easy to use, safe, exceptionally functional, secure, and especially can resolve this issue. Technical expertise isn't needed by you to perform your way around this device.

All you should do is:

Click here to download and install the Restoro repair tool on your computer. In your MS Outlook account, you can restore all your data in just a couple of clicks. Talking of data recovery, this software can also help you recover all those other e-mails before the PST malfunction happened, or that you may have deleted. So, if you have deleted any significant email that you want to recover, this will undoubtedly be of use for you. By installing it on your system you can double your Outlook account's quality to twice as much as the standard size.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status