Logo

Fix Chrome Error ERR_ICANN_NAME_COLLISION

If you are browsing the internet using the Google Chrome browser in your Windows 10 computer but you suddenly encounter an error message that states, “ERR_ICAN_NAME_COLLISION”, read on as this post will walk you through in fixing the problem. Here’s the full content of the error message:

“The site can’t be reached, This site on the company, organization, or school intranet has the same URL as an external website. Try contacting your system administrator. ERR ICAN NAME COLLISION.”

This kind of error is caused by an error in a private namespace or a random redirection to an incorrect proxy server. There are several ways to fix this error. You can try to check the integrity of the Hosts file or check the proxy. You could also try to use the Registry Editor and apply some tweaks or remove any conflicting browser extensions or flush the DNS cache, as well as run a malware scan.

Option 1 – Try to check the integrity of the Hosts file

To check the integrity of the Hosts file, refer to the following steps:

  • You have to navigate to this path inside File Explorer: C:/Windows/System32/driversetc
  • After that, look for a file named “Hosts” and right-click on it, and open it with the Notepad app.
  • Next, make sure that you write the block URLs in your computer in the list and then save the file.

Note: There are times when you are logged in with administrator credentials and you may receive an error message. In such case, type “notepad” in the Start Search and right-click on Notepad from the search results, and then select the “Run as administrator” option. After that, open the Hosts file and make the necessary changes and save it.

Option 2 – Try to check the Proxy server

There are some users who reported that they’ve fixed the problem after they’ve disabled the use of a proxy server using the built-in way. Follow the steps below to disable the proxy server.

  • Tap the Win + R keys to open the Run dialog box.
  • Then type “inetcpl.cpl” in the field and hit Enter to pull up the Internet Properties.
  • After that, go to the Connections tab and select the LAN settings.
  • From there. Uncheck the “Use a Proxy Server” option for your LAN and then make sure that the “Automatically detect settings” option is checked.
  • Now click the OK and the Apply buttons.
  • Restart your PC.

Note: If you are using a third-party proxy service, you have to disable it.

Option 3 – Try to use the Registry Editor

Before you apply some registry tweaks, make sure that you create a System Restore point. Once you have that covered, follow these steps:

  • Tap the Win + R keys to open the Run utility and type “Regedit” in the field and tap Enter to open the Registry Editor.
  • After that, navigate to this registry key: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersDataBasePath
  • Look for the default key and double click on it and make sure that its Value data is set as “C:/Windows/System32/driversetc”.
  • Now exit the Registry Editor and restart your computer to apply the changes made

Option 4 – Flush the DNS cache

You could also try to flush the DNS cache to fix the “ERR_ICAN_NAME_COLLISION” error. All you have to do is open Command Prompt as an administrator and then execute each one of the following commands sequentially to flush the DNS cache:

  • ipconfig/release
  • ipconfig/renew
  • ipconfig/flushdns

Option 5 – Get rid of any conflicting browser extensions

  • Open Chrome and press Alt + F keys.
  • Go to More tools and click Extensions to look for any suspicious browser extensions or toolbars.
  • Click the Recycle bin and select Remove.
  • Restart Chrome and press Alt + F keys again.
  • Proceed to On Startup and mark Open a specific page or set of pages.
  • To check if the browser hijacker is still active, click Set pages, if it is active, overwrite the URL.

Note: If removing the browser extensions or toolbars didn’t work, you can also try to reset your Google Chrome browser.

  • Open Google Chrome, then tap the Alt + F keys.
  • After that, click on Settings.
  • Next, scroll down until you see the Advanced option, once you see it, click on it.
  • After clicking the Advanced option, go to the “Restore and clean up option and click on the “Restore settings to their original defaults” option to reset Google Chrome.
  • Now restart Google Chrome.

Option 6 – Run a malware scan using Windows Defender

It is possible that your computer is infected with malware which could be why you’re getting the “ERR_ICAN_NAME_COLLISION” error. Thus, you need to scan your computer using Windows Defender.

  • Tap the Win + I keys to open Update & Security.
  • Then click on the Windows Security option and open Windows Defender Security Center.
  • Next, click on Virus & threat protection > Run a new advanced scan.
  • Now make sure that Full Scan is selected from the menu and then click the Scan Now button to get started.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

DNS_PROBE_FINISHED_BAD_CONFIG error in Chrome
If you always use Google Chrome when browsing the internet, then you might have come across an error saying, “This webpage is not available, DNS PROBE FINISHED BAD CONFIG”. If you do, then this problem certainly has something to do with the DNS since any error code which has “DNS” in it points out a network issue in the computer. Getting the DNS_PROBE_FINISHED_BAD_CONFIG error indicates that your computer is not able to connect the website because the Domain Name Server or DNS wasn’t able to resolve the website name into IP address or it is not available at all. So in this guide, we’ll help you sort out this issue in Chrome on your Windows 10 PC.

Option 1 – Check the Network Cables and restart your router then reconnect

The most obvious thing you can do first is to try checking if the network cables connected to your computer or router are properly connected or not. If it turns out that some network cables are not connected properly, then it’s probably why you’re getting the DNS_PROBE_FINISHED_BAD_CONFIG error in Chrome. And if your computer is connected via Wi-Fi, you need to make sure to restart your router once. In addition, you can also forget the Wi-Fi your computer is currently connected to and then try reconnecting again to see if it would work.

Option 2 – Flush the DNS and reset TCP/IP

Flushing the DNS and reset TCP/IP could also help in fixing the DNS_PROBE_FINISHED_BAD_CONFIG error in Chrome. To do so, refer to these steps:
  • Click the Start button and type in “command prompt” in the field.
  • From the search results that appear, right-click on Command Prompt and select the “Run as administrator” option.
  • After opening Command Prompt, you have to type each one of the commands listed below. Just make sure that after you type each command, you hit Enter
    • ipconfig /release
    • ipconfig /all
    • ipconfig /flushdns
    • ipconfig /renew
    • netsh int ip set dns
    • netsh winsock reset
After you key in the commands listed above, the DNS cache will be flushed and the Winsock, as well as the TCP/IP, will reset.

Option 3 – Try to remove the Proxy

You can also try to remove the Proxy as it might also help you in fixing the DNS_PROBE_FINISHED_BAD_CONFIG error. Here’s how you can do it:
  • Tap the Win + R keys to open the Run dialog box.
  • Then type “inetcpl.cpl” in the field and hit Enter to pull up the Internet Properties.
  • After that, go to the Connections tab and select the LAN settings.
  • From there. Uncheck the “Use a Proxy Server” option for your LAN and then make sure that the “Automatically detect settings” option is checked.
  • Now click the OK and the Apply buttons.
  • Restart your PC.
Note: If you are using a third-party proxy service, you have to disable it.

Option 4 – Change the DNS

Try to use the Google Public DNS If the first option didn’t work, you can try to use the Public DNS by Google and see if it can help fix the DNS error. You have to modify the DNS settings in your system explicitly and use the DNS IP addresses.
  • The first thing you have to do is right-click on the network icon in the Taskbar and select Network and Sharing Center.
  • Next, click on the “Change Adapter Settings” option.
  • After that, search for the network connection that you are using to connect to the internet. Note that the option might be “Wireless Connection” or “Local Area Connection”.
  • Right-click on your network connection and click on Properties.
  • Then select the new window to choose the “Internet Protocol 4 (TCP/IPv4)” option.
  • After that, click on the Properties button and click the checkbox in the new window for the option “Use the following DNS server addresses”.
  • Type in “8.8.8” and “8.8.4.4” and click OK and exit.

Option 5 – Clear Chrome’s browsing data

If your browsing data in Chrome hasn’t been cleared for some time now then that might be the reason why you’re suddenly getting the DNS_PROBE_FINISHED_BAD_CONFIG error when you browse the web. To fix this error, you need to clear your web browsing data. Refer to the following steps to do so.
  • Tap the Ctrl + Shift + Delete buttons to go to the Clear browsing data section in Chrome.
  • Next, set the time range to “All time” and tick all the boxes and then click on the Clear data button.
  • After that, restart the Chrome browser and try to open the website you were trying to open earlier.

Option 6 – Try running the Chrome Cleanup tool

In case you don’t know, there is actually a built-in malware scanner and cleanup tool in Chrome that helps you get rid of any unwanted ads, pop-ups, and even malware, as well as unusual startup pages, toolbars, and other things that could affect the performance of the browser.
Read More
A Quick Fix Guide to Error 0x8004060c

What's Error 0x8004060c?

If you use Ms-Outlook. You may experience the malfunction 0x8004060c sooner or later. This malfunction was proven to arise in nearly every MS Outlook variation be it 2010 or 2,000, 2007. The malfunction 0x8004060c hinders your capacity to deliver and get e-mails from and your MS-Outlook account and happens without any forewarning. The error happens when the PST file grows too big and there's almost no memory to handle the increase (Which is rather rare nowadays). Generally, the PST file has about 2 gigabytes upper limit and when you reach that, this error is unavoidable. This error happens when you attempt incorporating data that is fresh into your MS-OUTLOOK Account.

Solution

Restoro box imageError Causes

This malfunction might generate difficulties for you personally as your e-mails vanish and can happen suddenly. The system could also crash at times unpredictably. You may not be able to see fresh notifications and attachments in your e-mail. Also, it's also possible to drop significant contact details. What's more, this malfunction could stop e-mails that are fresh to arrive in your inbox. Therefore, it is undoubtedly a significant issue that has to be repaired immediately. The following may be some of the causes for error 0x8004060c:-
  • This error might occur when OST/PST file got corrupt.
  • OST file becomes inaccessible due to Exchange connectivity or synchronization issue.
  • OST/PST file exceeded its default maximum file size.

Further Information and Manual Repair

In the event that you find the malfunction 0x8004060c at any stage, you should do the repair instead of risking dropping connections and all the significant data in your account. The easiest way to repair this malfunction and to handle this issue would be to download the Restoro. Click here to obtain this fix tool on your computer. After installing, click your mouse's left button after which can use the application. It repairs the error code 0x8004060c in the least period and walks you through the entire repair procedure quickly.
Read More
Fix Chrome Error ERR_ICANN_NAME_COLLISION
If you are browsing the internet using the Google Chrome browser in your Windows 10 computer but you suddenly encounter an error message that states, “ERR_ICAN_NAME_COLLISION”, read on as this post will walk you through in fixing the problem. Here’s the full content of the error message:
“The site can’t be reached, This site on the company, organization, or school intranet has the same URL as an external website. Try contacting your system administrator. ERR ICAN NAME COLLISION.”
This kind of error is caused by an error in a private namespace or a random redirection to an incorrect proxy server. There are several ways to fix this error. You can try to check the integrity of the Hosts file or check the proxy. You could also try to use the Registry Editor and apply some tweaks or remove any conflicting browser extensions or flush the DNS cache, as well as run a malware scan.

Option 1 – Try to check the integrity of the Hosts file

To check the integrity of the Hosts file, refer to the following steps:
  • You have to navigate to this path inside File Explorer: C:/Windows/System32/driversetc
  • After that, look for a file named “Hosts” and right-click on it, and open it with the Notepad app.
  • Next, make sure that you write the block URLs in your computer in the list and then save the file.
Note: There are times when you are logged in with administrator credentials and you may receive an error message. In such case, type “notepad” in the Start Search and right-click on Notepad from the search results, and then select the “Run as administrator” option. After that, open the Hosts file and make the necessary changes and save it.

Option 2 – Try to check the Proxy server

There are some users who reported that they’ve fixed the problem after they’ve disabled the use of a proxy server using the built-in way. Follow the steps below to disable the proxy server.
  • Tap the Win + R keys to open the Run dialog box.
  • Then type “inetcpl.cpl” in the field and hit Enter to pull up the Internet Properties.
  • After that, go to the Connections tab and select the LAN settings.
  • From there. Uncheck the “Use a Proxy Server” option for your LAN and then make sure that the “Automatically detect settings” option is checked.
  • Now click the OK and the Apply buttons.
  • Restart your PC.
Note: If you are using a third-party proxy service, you have to disable it.

Option 3 – Try to use the Registry Editor

Before you apply some registry tweaks, make sure that you create a System Restore point. Once you have that covered, follow these steps:
  • Tap the Win + R keys to open the Run utility and type “Regedit” in the field and tap Enter to open the Registry Editor.
  • After that, navigate to this registry key: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersDataBasePath
  • Look for the default key and double click on it and make sure that its Value data is set as “C:/Windows/System32/driversetc”.
  • Now exit the Registry Editor and restart your computer to apply the changes made

Option 4 – Flush the DNS cache

You could also try to flush the DNS cache to fix the “ERR_ICAN_NAME_COLLISION” error. All you have to do is open Command Prompt as an administrator and then execute each one of the following commands sequentially to flush the DNS cache:
  • ipconfig/release
  • ipconfig/renew
  • ipconfig/flushdns

Option 5 – Get rid of any conflicting browser extensions

  • Open Chrome and press Alt + F keys.
  • Go to More tools and click Extensions to look for any suspicious browser extensions or toolbars.
  • Click the Recycle bin and select Remove.
  • Restart Chrome and press Alt + F keys again.
  • Proceed to On Startup and mark Open a specific page or set of pages.
  • To check if the browser hijacker is still active, click Set pages, if it is active, overwrite the URL.
Note: If removing the browser extensions or toolbars didn’t work, you can also try to reset your Google Chrome browser.
  • Open Google Chrome, then tap the Alt + F keys.
  • After that, click on Settings.
  • Next, scroll down until you see the Advanced option, once you see it, click on it.
  • After clicking the Advanced option, go to the “Restore and clean up option and click on the “Restore settings to their original defaults” option to reset Google Chrome.
  • Now restart Google Chrome.

Option 6 – Run a malware scan using Windows Defender

It is possible that your computer is infected with malware which could be why you’re getting the “ERR_ICAN_NAME_COLLISION” error. Thus, you need to scan your computer using Windows Defender.
  • Tap the Win + I keys to open Update & Security.
  • Then click on the Windows Security option and open Windows Defender Security Center.
  • Next, click on Virus & threat protection > Run a new advanced scan.
  • Now make sure that Full Scan is selected from the menu and then click the Scan Now button to get started.
Read More
Fix cannot open IPv4 Properties in Windows 10
Many Windows 10 users often change the IP addresses of their computers’ network adapter in order to connect to the internet or network they belong to in times when there is no automatic connection for their computers. In most cases, access to modifying this setting is restricted for some odd reason even if you are an administrator. So if you are one of the users whose Windows 10 VPN IPv4 Properties are not working, this post can help you remedy that so that you can open and edit the IPv4 Properties on your Windows 10 PC. The common way to change IP settings is by going to Settings > Network and then to Internet > Change adapter options > Select Network adapter > right click and open Properties. From there, you can select TCP/IP 4 and modify it. If you aren’t able to do this, refer to the instructions laid out below to troubleshoot the problem in accessing the IPv4 Properties.

Option 1 – Try using PowerShell to manually set the IPv4 properties

As you are not able to set it using the interface, you can do so using PowerShell instead. Note that this option will only work for you if you run PowerShell with administrator privileges. After opening PowerShell, according to many users, you have to run the this command – set-DnsClientServerAddress -InterfaceAlias “Ethernet” -ServerAddresses xxx.xx.xxx.xxx,x.x.x.x,xxx.xx.xxx.xxx,x.x.x.x Usually, Ethernet is the name of your network adapter which is set by default. If you want to see the actual name of your network adapter, you can just type this command and tap Enter after doing so – Get-NetAdapter -physical | where status -eq 'up' After entering the given command, you will see a list of active Ethernet adapter in your computer as you can see on the image above. Note that the 4 sets of X like the one on the image below should match with the sequence:

Option 2 – Try editing the rasphone.pbk files

The rasphone.pbk files stores property for the connections and since you are not able to access the IPv4 properties, it is most likely that it has been disabled here. The good thing is that you can open these files and edit them using Notepad. Refer to the steps below to do so.
  • Open the Windows Explorer and then enable the show hidden files option.
  • After that, look for the files at this location – C:Users <username>AppDataRoamingMicrosoftNetworkConnectionsPbk_hiddenPbkrasphone.pbk
  • Then right-click on it and select the “Open with” option and choose the Notepad app.
  • After opening the file, look for “IpPrioritizeRemote” from the long list.
  • Once you found it, set its value from “1” to “0”.
  • After that, look for “IPInterfaceMetric” and set its value to “1” and tap Ctrl + S to save the changes you’ve made, and then exit and try accessing the IPv4 properties again. It should work, but if you’re still unable to access it, try the next option below.

Option 3 – Enable the Split Tunneling if you use VPN

All data goes back and forth when you are using a VPN service on your computer. And since you are using VPN, it could be that it disables the IPv4 interface. If that’s the case, you need to stay connected with both the local network and VPN and to do so, you have to enable Split Tunneling. How? Follow these steps:
  • Open PowerShell with administrator privileges.
  • Next, type in “Get-VpnConnection” and tap Enter. After doing so, it will give you the exact name of your VPN.
  • After that, type in “Set-VpnConnection -Name “yourVPNName” -SplitTunneling $True” and tap Enter. Once you enter the command, it will free your IPv5 settings so that you can change it to connect with your local network if you prefer it to.
Read More
How to Fix athwbx.sys Blue Screen error
Athwbx.sys or the Qualcomm Atheros driver file is known to trigger several Blue Screen of Death errors. This occurs when the driver gets corrupted or when the operating system is unable to access or find it. In addition, bad sectors in the hard disk or RAM can also cause BSOD errors. The athwbx.sys file is known to cause the following BSOD errors listed below:
  • SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (athwbx.sys)
  • STOP 0x0000000A: IRQL_NOT_LESS_EQUAL (athwbx.sys)
  • STOP 0x0000001E: KMODE_EXCEPTION_NOT_HANDLED (athwbx.sys)
  • STOP 0×00000050: PAGE_FAULT_IN_NONPAGED_AREA (athwbx.sys)
  • Your PC ran into a problem and needs to restart. You can search online later for this error: athwbx.sys
Before you proceed with the troubleshooting tips given below, you might want to try performing System Restore as it could resolve Blue Screen errors caused by the athwbx.sys file. To run System Restore, follow these steps:
  • Tap the Win + R keys to open the Run dialog box.
  • After that, type in “sysdm.cpl” in the field and tap Enter.
  • Next, go to the System Protection tab then click the System Restore button. This will open a new window where you have to select your preferred System Restore point.
  • After that, follow the on-screen instructions to finish the process and then restart your computer and check if the problem is fixed or not.
If System Restore didn’t help in fixing the Blue Screen error, now’s the time for you to resort to the troubleshooting tips provided below but before you get started, make sure that you create a System Restore point first.

Option 1 – Try recreating the athwbx.sys file

The first thing you can try is to recreate the athwbx.sys file. Every time your Windows 10 PC boots up, it looks for all the system drivers in place and if it is unable to find them, it tries to create them. This is why if you remove your corrupt driver file, chances are, you might get a fixed file recreated just for you. How? Refer to the steps below.
  • Boot your Windows 10 PC in Safe Mode.
  • Then open File Explorer and navigate to this location: C:/Windows/System32/drivers
  • From there, look for the file named sys and rename it to athwbx.old.
Note: As you can see, the file’s extension has changed from .sys to .old.
  • Now restart your computer and check if the athwbx.sys Blue Screen error is now fixed.

Option 2 – Try to update or rollback your device drivers

If the first option didn’t work for you, then it’s time to either update or roll back the device drivers. It is most likely that after you updated your Windows computer that your driver also needs a refresh. On the other hand, if you have just updated your device drivers then you need to roll back the drivers to their previous versions. Whichever applies to you, refer to the steps below.
  • Open the Devices Manager from the Win X Menu.
  • Then locate the device drivers and right-click on them to open the Properties.
  • After that, switch to the Driver tab and click on the Uninstall Device button.
  • Follow the screen option to completely uninstall it.
  • Finally, restart your computer. It will just reinstall the device drivers automatically.
Note: You can install a dedicated driver on your computer in case you have it or you could also look for it directly from the website of the manufacturer.

Option 3 – Run the System File Checker Scan

System File Checker or SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files with good system files. To run the SFC command, follow the steps given below.
  • Tap Win + R to launch Run.
  • Type in cmd in the field and tap Enter.
  • After opening Command Prompt, type in sfc /scannow
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.
  • Restart your computer.

Option 4 – Try to run the CHKDSK utility

Running the CHKDSK utility might also help you resolve the athwbx.sys Blue Screen error. If your hard drive has issues with integrity, the update will really fail as the system will think that it’s not healthy and that’s where the CHKDSK utility comes in. The CHKDSK utility repairs hard drive errors that might be causing the problem.
  • Open Command Prompt with admin privileges.
  • After opening Command Prompt, execute the following command and hit Enter:
chkdsk /f /r
  • Wait for the process to be completed and then restart your computer.

Option 5 – Run the Memory Diagnostic Tool

Running the Windows Memory Diagnostic tool in Windows 10 might also help you in fixing the athwbx.sys Blue Screen error. Refer to the steps below on how to run this tool:
  • Tap the Win + R keys to open Run and type exe and hit Enter to open the Windows Memory Diagnostic Tool.
  • After that, it will give two options such as:
    • Restart now and check for problems (Recommended)
    • Check for problems the next time I start my computer
  • Once your computer has restarted, perform a basic scan or you could also go for the “Advanced” options such as “Test mix” or “Pass count”. Simply tap the F10 key to start the test.
Note: After you select the option, your PC will restart and check for memory-based issues. If it finds any issues, it will automatically fix them and if there’s no issue found, then it’s most likely not a memory-based issue so you should try the other options given below.

Option 6 – Run the Blue Screen Troubleshooter

The Blue Screen troubleshooter is a built-in tool in Windows 10 that helps users in fixing BSOD errors like athwbx.sys. It can be found on the Settings Troubleshooters page. To use it, refer to these steps:
  • Tap the Win + I keys to open the Settings panel.
  • Then go to Update & Security > Troubleshoot.
  • From there, look for the option called “Blue Screen” on your right-hand side and then click the “Run the troubleshooter” button to run the Blue Screen Troubleshooter and then follow the next on-screen options. Note that you might have to boot your PC into Safe Mode.
Read More
Should you use the Faraday bag

Faraday bag is a new take on security and privacy for people using a lot of electronic devices and credit cards. So what is exactly a Faraday bag?

faraday bag

Faraday bag explained

Faraday bag is designed in the same manner as the Faraday cage which was invented by Michael Faraday, who was an English scientist who contributed to the study of electromagnetism and electrochemistry. His main discoveries include the principles underlying electromagnetic induction, diamagnetism, and electrolysis.

The idea of the Faraday cage is that anything inside a cage that is made of specific grid size is completely isolated from outside current and magnetic fields since the cage itself will pick up everything upon itself. This means that for example, a human could be inside a cage that is struck by lightning and be perfectly safe and fine.

This idea led to the Faraday bag design, which takes this concept and places a wiring pattern inside clothing in order to isolate all magnetic fields from the outside so your devices and cards are completely cut off from any kind of influence and electromagnetic waves. If the pattern and quality of material for the bag are good, you have a fully safe placeholder for your stuff.

Advantages of Faraday bag

The main advantages, of course, are the privacy and safety of mobile phones and credit cards from outside influences and this is why this bag has been designed in the first place. If the bag is designed properly your phone would not be able to be hacked nor accessed from any outside source, GPS tracking will also be disabled and your phone location will not be visible. Credit cards will also be completely safe from any malicious attack via wi-fi signals.

Disadvantages of bag

Well, the disadvantage of using this bag is a very simple one, since your phone is isolated from outside influence that will also mean that you will not be able to take messages or calls on it while it is in the bag. Notifications from the internet would also be disabled so it is security vs usability deal.

Read More
Fix The selected disk is not a fixed MBR disk
Both the DISKPART utility and the Disk Management are useful tools in Windows 10 that manage the disk space allocation, and so on. But these tools are not without errors as you could also encounter some when you run them. Recently, some users reported getting an error that says, “The selected disk is not a fixed MBR disk when trying to use the DISKPART utility”. Here’s the exact message of the error:
“The selected disk is not a fixed MBR disk. The ACTIVE command can only be used on fixed MBR disks.”
This kind of error only occurs when you try to activate a disk partition on a UEFI system partition. However, the command works only if your computer is based on BIOS/MBR. The UEFI method has no concept of the active partition and since you have a UEFI system, the disk type is GPT instead of MBR. To simply put it, your BIOS needs the MBR disk type while the UEFI needs the GPT disk type. To fix the “The selected disk is not a fixed MBR disk when trying to use the DISKPART utility” error, there are various potential fixes you can try. You might have to disable Secure Boot, convert the disk to MBR or fix the Boot Manager. For more instructions, follow the options provided below.

Option 1 – Disable the Secure Boot in the BIOS

Disabling the Secure Boot in the BIOS settings is definitely recommended to resolve the issue. To disable Secure Boot, here’s what you have to do:
  • First, boot your computer into Windows 10.
  • Next, go to Settings > Windows Update. From there, check if there is anything that you have to download and install if you see any available updates. Usually, OEMs send and update the list of trusted hardware, drivers, and operating systems for your computer.
  • After that, go to the BIOS of your computer.
  • Then go to Settings > Update & Security > Advanced Startup options. If you click on Restart Now, it will restart your computer and give you all the advanced options.
  • Next, select Troubleshoot > Advanced Options. As you can see, this screen offers you further options including System restore, Startup repair, Go back to the previous version, Command Prompt, System Image Recovery, and UEFI Firmware Settings.
  • Select the UEFI Firmware Settings which will take you to the BIOS.
  • From there, go to the Security > Boot > Authentication tab where you should see Secure Boot. Note that every OEM has its own way of implementing the options so it varies.
  • Next, set Secure Boot to Disabled and set Legacy Support to On or Enabled.
  • Save the changes made and exit. Afterward, your computer will reboot.

Option 2 – Try converting the disk to MBR

You can try to change the File System of the drive from GPT to MBR but before you do so, make sure that you create a backup copy of your data to an external drive. Once you have that covered, follow the steps below.
  • Create a bootable Windows 10 media and boot your computer from it.
  • Next, click on the “Repair your computer” option on the first Windows 10 installation setup window.
  • Afterward, select the operating system partition from the given options and click on Next.
  • Now select Command Prompt within the System Recovery options box and execute this command to initiate the Diskpart utility: diskpart
  • Then type either one of these commands to view the list of all the Disk connects or the partitions on those disks formed: list disk or list volume
  • After that, execute another one of these commands depending on the command you previously entered to select the disk or partition you want to select: select disk # or select volume #
  • Now execute this command to clean your drive: clean
  • Finally, execute this last command to convert the selected disk or partition as MBR: Convert MBR
  • Restart your computer and check if the error is fixed.

Option 3 – Try to fix the Boot Manager

  • You can start by booting into the installation environment for Windows 10 from an installation media.
  • After that, click on Repair your computer and on the blue screen, select Troubleshoot and then select the Advanced options menu.
  • From there, select Command Prompt and once you open it, enter each one of the commands given below by sequence.
    • bootrec /FixMbr
    • bootrec /FixBoot
    • bootrec /RebuildBcd
  • Once you’re done executing the commands given above, type “exit” to close the Command Prompt window and then restart your computer and see if it fixed error code 0xc000014c.
Read More
Change Font Size in Sticky Notes in Windows
Sticky Notes is one of the useful programs and in the early days, the option is available for users to change the font size of the text a lot easier. However, for some unknown reason, Microsoft decided to get rid of this feature in the latest Windows Update. One would expect that the feature will be replaced by an even more useful feature but it’s not which makes the Sticky Notes app worse than before. Worry not though for it doesn’t have to stay that way as there is another thing you can try to change the font size in your Sticky Notes app and that’s what we’re going to cover in this post. As mentioned, Microsoft removing this font feature is quite strange and in the past, users asked for this feature and since it’s no longer available, you can try following the steps given below to bring it back. And for that, you need to go to the Ease of Access section in the Settings app. Refer to the steps given below for more instructions. Step 1: First, tap the Win + I keys to open Settings and then go to the Ease of Access section. Step 2: After going to the Ease of Access menu and select Display from the list of options. Step 3: From there, you should see an option that says “Make text bigger”. And then use your mouse to navigate to the slider to change the size of the font. Note: Take note that after doing all the steps above, it will change not just the Sticky Notes app but also everything in Windows 10. This method is actually the best since it only changes the size of the apps rather than a wholesale change in your Windows 10 computer. Step 4: Next, scroll under Display until you see the “Change the size of apps and text on the main display” option where you’ll see that the option is 100% but you’ll want to change that to 125%. Step 5: After that, click on the drop-down menu and select 125% and then restart your Windows 10 computer. Step 6: Now open the Sticky Notes app and check if you can now change the font size in the Sticky Notes app.
Read More
BuzzDock Removal Guide

What is BuzzDock?

Buzzdock is a browser extension. Buzzdock will be automatically enabled on IE and Chrome following installation, and you may begin using Buzzdock with no further action required. If you elect to optimize Buzzdock performance, the settings preferences of your browser may be adjusted after installation. This browser extension changes your default search provider to Buzzdock.com custom search. It displays additional unwanted ads, banners & sponsored links on web pages that you visit, and it hijacks your browser home page. This browser extension has been flagged as malware by many anti-virus scanning programs.

About Browser Hijackers

Browser hijackers (sometimes called hijackware) are a type of malicious software that modifies web browser configuration settings without the user’s knowledge or consent. These hijacks are rising at an alarming rate worldwide, and it could be actually nefarious and sometimes dangerous too. They’re created to interfere with web browser programs for many different reasons. In most cases, hijackers are made for the benefit of online hackers often through income generation from forced ad clicks and site visits. Nonetheless, it’s not that harmless. Your online safety is jeopardized and it is extremely irritating. They not only screw up your browsers, but browser hijackers can even modify the computer registry, leaving your PC susceptible to other attacks.

Symptoms of browser hijacker malware

There are several signs that indicate the web browser is hijacked: 1. the home page of your browser is changed unexpectedly 2. you find new unwanted bookmarks or favorites added, typically directed to ad-filled or porn sites 3. The default search page of your web browser is changed 4. you see unsolicited new toolbars added 5. you notice a lot of pop-ups on your computer screen 6. your web browser gets slow, buggy crashes frequently 7. you are prohibited access to specific web pages, including the site of an anti-malware software firm like SafeBytes. Exactly how browser hijacker finds its way onto your computer system Browser hijackers infect computer systems in numerous ways, including through a file-share, a drive-by download, or an infected email. They are usually included with toolbars, BHO, add-ons, plug-ins, or browser extensions. Browser hijackers sneak to your computer along with free software downloads also that you unknowingly install alongside the original. Some of the most well-known hijackers are BuzzDock, Babylon Toolbar, Conduit Search, Sweet Page, OneWebSearch, and CoolWebSearch. Browser hijacking can cause severe privacy problems and even identity theft, affect your web browsing experience by taking command over outbound traffic, substantially slows down your computer by consuming lots of resources, and result in system instability as well.

The best ways to get rid of browser hijackers

Certain browser hijacking can be quite easily corrected by discovering and removing the corresponding malware application from your control panel. However, most hijackers are hard to remove manually. No matter how much you try to get rid of it, it may keep returning over and over again. You should consider doing manual fixes only if you’re a tech-savvy person because there are potential risks associated with fiddling around with the system registry and HOSTS file. Browser hijackers could be effectively removed by installing and running anti-malware software on the affected PC. Safebytes Anti-Malware can counter relentless browser hijackers and provide you proactive computer protection against all kinds of malware. Together with anti-malware, a system optimizer program, similar to Safebytes Anti-Malware, can help you correct registry errors, remove unwanted toolbars, secure online privacy, and enhance overall system performance.

Find Out How to Get rid of Malware that is Blocking Websites or Preventing Downloads

Malware could cause all sorts of damage when they invade your computer, starting from stealing your personal information to erasing files on your PC. Some malware sits in between the computer and the internet connection and blocks a few or all internet sites which you want to visit. It might also block you from adding anything to your system, especially anti-malware applications. So what should you do when malicious software prevents you from downloading or installing Safebytes Anti-Malware? There are a few fixes you can attempt to get around with this problem.

Boot Windows in Safe Mode

The Windows OS includes a special mode called “Safe Mode” where only the minimum required programs and services are loaded. In the event, the malicious software is set to load automatically when the computer starts, shifting to this mode may well prevent it from doing so. To get into Safe Mode or Safe Mode with Networking, press the F8 key while the computer is booting up or run MSCONFIG and find the “Safe Boot” options in the “Boot” tab. After you restart the PC into Safe Mode with Networking, you could download, install, as well as update anti-malware software from there. Right after installation, run the malware scanner to eliminate standard infections.

Use an alternate internet browser to download the anti-malware application

Malicious program code might exploit vulnerabilities in a specific browser and block access to all antivirus software sites. In case you suspect that your Internet Explorer has been hijacked by malware or otherwise compromised by online hackers, the best plan of action would be to switch to an alternate internet browser like Mozilla Firefox, Google Chrome, or Apple Safari to download your favorite computer security program – Safebytes Anti-Malware.

Create a portable USB antivirus for removing malware

Another way is to download and transfer an anti-malware program from a clean PC to run a scan on the affected computer. Adopt these measures to run the antivirus on the affected computer. 1) Download Safebytes Anti-Malware or Windows Defender Offline onto a clean computer. 2) Plug the Thumb drive into the uninfected computer. 3) Double-click the executable file to run the installation wizard. 4) Pick a USB flash drive as the location when the wizard asks you where you intend to install the software. Follow the directions to finish the installation process. 5) Transfer the thumb drive from the uninfected computer to the infected PC. 6) Run the Safebytes Anti-malware directly from the pen drive by double-clicking the icon. 7) Run Full System Scan to identify and clean-up up all types of malware.

A Look at the Best AntiMalware Program

If you’re looking to download an anti-malware application for your PC, there are various tools out there to consider however, you just cannot trust blindly anyone, irrespective of whether it is free or paid software. Some of them are excellent, some are ok types, and some will harm your PC themselves! You need to pick a tool that has gained a good reputation and detects not just computer viruses but other types of malware as well. Amongst few good programs, SafeBytes Anti-Malware is the highly recommended program for the security-conscious individual. SafeBytes anti-malware is a trustworthy tool that not only secures your PC completely but is also quite user-friendly for people of all skill levels. This software could easily detect, remove, and protect your computer from the latest malware threats including spyware, adware, trojan horses, ransomware, worms, PUPs, along with other possibly damaging software programs. There are numerous great features you will get with this security product. The following are some of the great features included in the software. Robust Anti-malware Protection: With its advanced and sophisticated algorithm, this malware removal tool can find and eliminate the malware threats hiding within your PC effectively. Live Protection: SafeBytes gives real-time active monitoring and protection against all known computer viruses and malware. This software will continuously monitor your PC for any suspicious activity and updates itself regularly to keep current with the constantly changing threat landscape. Website Filtering: Safebytes assigns all websites a unique safety score that helps you to get an idea of whether the webpage you are going to visit is safe to view or known to be a phishing site. Low CPU and Memory Usage: SafeBytes is really a lightweight application. It consumes an extremely small amount of processing power as it runs in the background so you’re free to use your Windows-based PC the way you really want. 24/7 Online Tech Support: For any technical issues or product support, you could get 24/7 expert assistance through chat and email. To sum it up, SafeBytes Anti-Malware offers great protection combined with an acceptable low system resources usage with both great malware detection and prevention. You now may understand that this particular software does more than just scan and delete threats from your PC. For optimum protection and the best value for your money, you can’t get better than SafeBytes Anti-Malware.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove BuzzDock without the use of an automated tool, it may be possible to do so by removing the program from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. You will likely also want to reset your browser. To ensure the complete removal, manually check your hard drive and registry for all of the following and remove or reset the values accordingly. Please note that this is for advanced users only and may be difficult, with incorrect file removal causing additional PC errors. In addition, some malware is capable of replicating or preventing deletion. Doing this in Safe Mode is advised. The following files, folders, and registry entries are created or modified by BuzzDock
Files: File at $COMMONPROGRAMSBuzzdockBuzzdock Support Site.lnk. File at $COMMONPROGRAMSBuzzdockBuzzdock.lnk. File at $COMMONPROGRAMSBuzzdockUninstall.lnk. File at $PROGRAMFileSBuzzdockBuzzdock Support.url. File at $PROGRAMFileSBuzzdockBuzzdock.ico. File at $PROGRAMFileSBuzzdockBuzzdock.url. File at $PROGRAMFileSBuzzdockBuzzdockIEClient.dll. File at $PROGRAMFileSBuzzdockUninstall.url. Directory at $COMMONPROGRAMSBuzzdock. Directory at $LOCALAPPDATAGoogleChromeUser DataDefaultExtensionsejaodgecffaefnnoggjpogblnlpejkma.1.5_0. Directory at $LOCALAPPDATAGoogleChromeUser DataDefaultExtensionsejaodgecffaefnnoggjpogblnlpejkma. Directory at $PROGRAMFileSBuzzdock. Registry: A key in HKEY_CLASSES_ROOT named BuzzdockIEClient.Api.1 A key in HKEY_CLASSES_ROOT named BuzzdockIEClient.Api A key in HKEY_CLASSES_ROOT named BuzzdockIEClient.Layers.1 A key in HKEY_CLASSES_ROOT named BuzzdockIEClient.Layers Key 220EB34E-DC2B-4B04-AD40-A1C7C31731F2 at HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstall. Key 435D09AA-DDE4-4B40-9129-08F025ECA349 at HKEY_CLASSES_ROOTCLSID. Key 435D09AA-DDE4-4B40-9129-08F025ECA349 at HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects. Key 4A3DEECA-A579-44BC-BCF3-167F4B9E8E4C at HKEY_CLASSES_ROOTCLSID. Key 83C58580-EC6E-48CD-9521-B95874483BEB at HKEY_CLASSES_ROOTCLSID. Key BE3A76AC-F071-4C7F-9B7A-D974B4F52DCA at HKEY_CLASSES_ROOTAppID. Key C8C107B2-28C2-472D-9BD4-6A25776841D1 at HKEY_CLASSES_ROOTTypeLib. Key BuzzdockIEClient.DLL at HKEY_CLASSES_ROOTAppID. Key ejaodgecffaefnnoggjpogblnlpejkma at HKEY_LOCAL_MACHINESOFTWAREGoogleChromeExtensions.
Read More
How to Obliterate PyLocky Ransomware

What is PyLocky ransomware? And how does it execute its attack?

PyLocky ransomware is a file-locking malware created in order to lock important files and demand ransom from victims in exchange for data recovery. This new ransomware uses the .lockymap extension in marking the files it encrypts. It starts to execute its attack by dropping the following malicious payload in the system:
Name: facture_4739149_08.26.2018.exe SHA256:8655f8599b0892d55efc13fea404b520858d01812251b1d25dcf0afb4684dce9 Size: 5.3 MB
After dropping its malicious payload, this crypto-malware connects the infected computer to a remote server where it downloads more malicious files and places them on system folders. It then applies a data gathering module used to gather data about the user and the computer. The malicious files that were downloaded earlier along with the data obtained are used for another module called stealth protection. This allows PyLocky ransomware to execute its attack without detection from any security or antivirus programs installed in the system. It also modifies some registry keys and entries in the Windows Registry such as:
  • HKEY_CURRENT_USERControl PanelDesktop
  • HKEY_USERS.DEFAULTControl PanelDesktop
  • HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun
  • HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunOnce
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce
Once all the modifications are carried out, PyLocky ransomware will begin encrypting its targeted files using a sophisticated encryption cipher. Following the encryption, it adds the .lockymap extension to each one of the encrypted files and releases a ransom note named “LOCKY-README.txt” which contains the following content:
“Please be advised: All your files, pictures document and data has been encrypted with Military Grade Encryption RSA ABS-256. Your information is not lost. But Encrypted. In order for you to restore your files, you have to purchase a Decrypter. Follow these steps to restore your files. 1* Download the Tor Browser. ( Just type in google “Download Tor“ 2‘ Browse to URL: http://4wcgqlckaazungm.onion/index.php 3* Purchase the Decryptor to restore your files. It is very simple. If you don’t believe that we can restore your files, then you can restore 1 file of image format for free. Be aware the time is ticking. Price will be doubled every 96 hours so use it wisely. Your unique ID : CAUTION: Please do not try to modify or delete any encrypted file as it will be hard to restore it. SUPPORT: You can contact support to help decrypt your files for you. Click on support at http://4wcgqlckaazungm.onion/index.php”

How does PyLocky ransomware spread over the web?

PyLocky ransomware spreads using malicious spam email campaigns. Creators of this threat embed an infected attachment to spam emails and send them using a spambot. Crooks may even use deceptive tactics to trick you into opening the malware-laden immediately which is something you must not do. Thus, before opening any emails, make sure that you’ve thoroughly checked them. To successfully obliterate PyLocky ransomware from your computer, refer to the removal guide laid out below.
  • Step 1: Launch the Task Manager by simply tapping Ctrl + Shift + Esc keys on your keyboard.
  • Step 2: Under the Task Manager, go to the Processes tab and look for the process named facture_4739149_08.26.2018.exe and any suspicious-looking process which takes up most of your CPU’s resources and is most likely related to PyLocky ransomware.
  • Step 3: After that, close the Task Manager.
  • Step 4: Tap Win + R, type in appwiz.cpl and click OK or tap Enter to open Control Panel’s list of installed programs.
  • Step 5: Under the list of installed programs, look for PyLocky ransomware or anything similar, and then uninstall it.
  • Step 6: Next, close the Control Panel and tap Win + E keys to launch File Explorer.
  • Step 7: Navigate to the following locations below and look for PyLocky ransomware’s malicious components such as facture_4739149_08.26.2018.exe and LOCKY-README.txt as well as other suspicious files, then delete all of them.
%TEMP% %WINDIR%System32Tasks %APPDATA%MicrosoftWindowsTemplates %USERPROFILE%Downloads %USERPROFILE%Desktop
  • Step 8: Close the File Explorer.
  • Step 9: Tap Win + R to open Run and then type in Regedit in the field and tap enter to pull up Windows Registry.
  • Step 10: Navigate to the following path:
HKEY_CURRENT_USERControl PanelDesktop HKEY_USERS.DEFAULTControl PanelDesktop HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunOnce HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce
  • Step 11: Delete the registry keys and sub-keys created by PyLocky ransomware.
  • Step 12: Close the Registry Editor and empty the Recycle Bin.
Try to recover your encrypted files using the Shadow Volume copies Restoring your encrypted files using Windows Previous Versions feature will only be effective if PyLocky ransomware hasn’t deleted the shadow copies of your files. But still, this is one of the best and free methods there is, so it’s definitely worth a shot. To restore the encrypted file, right-click on it and select Properties, a new window will pop up, then proceed to Previous Versions. It will load the file’s previous version before it was modified. After it loads, select any of the previous versions displayed on the list like the one in the illustration below. And then click the Restore button.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status