Boot Selection Failed Because A Required Device Is Inaccessible Error in Windows 10
If you have or are currently getting a troublesome error saying, “The boot selection failed because a required device is inaccessible” when you boot your computer, then continue reading as this post will give you some suggestions that may help you resolve the error.
This pesky error pops up during the booting process of your computer and prevents you from booting to your Windows 10 PC and displays the error message on a black screen instead. To fix this problem, here are some suggestions you need to check out.
Option 1 – Try checking the boot order in BIOS
Turn on your PC and repeatedly tap the Setup key right away about once every second until you see the Computer Setup Utility or the BIOS settings.
Then use the right arrow key to select the Security menu and then use the down arrow key to select the Secure Boot Configuration option and then tap Enter.
Just a heads up, before you can use Secure Boot Configuration, a warning will pop up. Simply tap F10 to continue to the menu. After opening it, use the down arrow key to select Secure Boot and then the right arrow key to set the setting to Disable.
Next, select the Legacy Support option using the down arrow key and then the right key to set the setting to Enable.
Now tap F10 to confirm the changes and then use the arrow key to select File menu and then the down arrow key to select Save Changes and then Exit and tap Enter to select Yes. From there, your computer should restart and once it does, use the power button to switch it off.
If you are now able to boot from your hard drive, you need to know which option to choose once the boot menu pulls up. Refer to the steps below to easily boot from your hard drive.
Tap the power button to boot your PC. Once your PC starts, a message will appear indicating that the boot mode has now changed.
Next, you’ll see a security screen displaying a four-digit code. Type in this four-digit code and tap Enter.
After that, tap the power button to turn the computer off and wait for a couple of seconds and then turn your PC on and tap the ESC key right away repeatedly until you see the Startup menu.
Now tap F9 to open the Boot Menu and use the down arrow key to select the hard disk and make sure to select it by tapping Enter on your keyboard.
Restart your PC and check.
Option 2 – Try running the DSKCHK Check from the Recovery Media.
The DSKCHK utility scans your hard drive for any errors, bad files, or corrupt sectors so this should help in fixing the problem.
The first thing you need to do is to download the Media Creation Tool from Microsoft and then open it after the download. The file should be “MediaCreationTool.exe”.
Then tap Accept to agree to the terms and conditions and then from the initial screen, select the “Create installation media (USB flash drive, DVD, or ISO file) for another PC” option. Keep in mind that the language, architecture, and edition of the bootable drive will be selected based on your PC’s settings but you have to uncheck the Use the recommended options for this PC in order to choose the correct settings for your own computer that’s getting the error.
Now click Next and then click the USB drive or DVD option once prompted to select between USB or DVD depending on what device you are using to store this image on. Then click Next and select the required drivers from the list of storage devices currently connected to the computer.
Click Next. After that, the Media Creation Tool will proceed to download the files needed to install and create the installation device.
The next thing you have to do is to insert the installation drive.
After that, you will see the “Choose your keyboard layout” window so select the one you prefer and then the Choose an option screen will pop up.
Go to Troubleshoot > Advanced Options > Command Prompt. After opening Command Prompt, input the following command and hit Enter.
CHKDSK /R /X C:
Now boot your PC without the recovery drive and check if the problem’s fixed or not.
Option 3 – Try resetting the BIOS
Open the computer case and then look for the battery in the motherboard. If you can’t find it, you can seek out the motherboard or computer documentation of your PC as well as browse the web or contact the manufacturer for further assistance.
Removing the battery should be easy especially if your computer uses a coin cell battery. Just use your fingers to grab on the edge of the battery then pull it up and out of the socket that’s holding it in place.
Keep the battery removed for about 10 minutes and then insert it back and try booting into the BIOS.
Option 4 – Try using the Startup Repair
Inject the installation drive you created earlier and boot your PC.
Select the keyboard layout from the Choose your keyboard layout window.
From there, the Choose an option screen pops up. Navigate to Troubleshoot > Advanced Options > Startup Repair.
When your computer is slow, you don’t have much choice but to wait until it gets done with a task at its own pace, albeit a slow one. So if you want to switch user accounts on your computer a couple of times daily, then a slow computer can get really irritating. What makes system processes slow is that the accounts have some programs or applications running and resources allocated to them. And besides, if your computer is already low on performance, it will kill the natural fluidic flow of the user. But worry not, for this post will guide you in switching user accounts with the help of some minor tweaks in your Windows 10 computer.
To disable or enable Fast User Switching, you have two methods to do that using the Registry Editor and the Group Policy Editor. Either way, refer to the instructions laid out below.
Option 1 – Enable or disable Fast User Switching via Registry Editor
Tap the Win + R keys to open the Run dialog box.
After that, type “Regedit” in the field and tap Enter to open the Registry Editor.
Next, go to this registry key: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystem
Then right-click on System and select New > DWORD (32-bit) Value and name this newly created DWORD as “HideFastUserSwitching”.
Now double click on it. If you want to enable Fast User Switching, input “0” as the value, and if you want to disable it, input “1” as its value.
Restart your PC to successfully apply the changes made.
Option 2 – Enable or disable Fast User Switching via Group Policy Editor
Take note that this option will not work if you are using the Windows 10 Home edition since the Group Policy Editor does not come with Windows 10 Home. Refer to the steps below to enable or disable Fast User Switching using Group Policy Editor.
Tap the Win + R keys to open the Run dialog box and then type in “gpedit.msc” in the field and hit Enter to open the Group Policy Editor.
Next, navigate to this path inside the Group Policy Editor: Computer ConfigurationAdministrative TemplatesSystemLogon
Now double click on the configuration listing labeled as “Hide entry points for Fast User Switching” to open the configuration page.
Note: On the configuration page, you will see the following description:
“This policy setting allows you to hide the Switch User interface in the Logon UI, the Start menu, and the Task Manager. If you enable this policy setting, the Switch User interface is hidden from the user who is attempting to log on or is logged on to the computer that has this policy applied. The locations that the Switch User interface appears in the Logon UI, the Start menu, and the Task Manager. If you disable or do not configure this policy setting, the Switch User interface is accessible to the user in the three locations.”
From there, you can choose to enable or disable the Fast User Switching depending on your preferences. After you’ve selected, click OK and exit the Group Policy Editor.
Now restart your PC to apply the changes made successfully.
If you are trying to install or update Microsoft Edge on your Windows 10 computer but ended up getting HTTP Error 500 or Error 0x8004xxxx or 0x8007xxxx, then you’ve come to the right place as this post will help you sort this problem out.
The aforementioned errors when either installing or updating the Edge browser occur due to a Network issue. There is actually a range of error codes that are associated with the network connection issue. These error codes include Error 500 or 0x80010108, 0x80040801, 0x80042193, 0x80042194, 0x800421F4, 0x800421F6, 0x800421F7, 0x800421F8, 0x80072742, 0x80072EE2, 0x80072EE7, 0x80072EFD, and 0x80072EFE. To fix them, there are several options you can try. You can try to run the Network Adapter troubleshooter or update or reset the Network Adapter as well as check and the proxy configuration.
Option 1- Try updating the Network Adapter Driver
Follow the steps below to update your Network Adapter Driver:
Tap the Win + R keys to launch the Run window and then type in the “MSC” command and hit Enter to open the Device Manager window.
From there, expand the list of all the network drives and update each one of them.
Note: If updating the network drivers didn’t help in fixing the problem, you can also try to uninstall the very same drivers and restart your Windows 10 PC. After that, the system itself will reinstall the drivers you just uninstalled. Alternatively, you can also download and install the drivers from the manufacturer’s website directly.
Option 2 – Run the Network Adapter troubleshooter
To run the Network Troubleshooter, refer to these steps:
Open the Search bar on your computer and type in “troubleshoot” to open the Troubleshoot settings.
Next, scroll down and select the “Network Adapter” option from the right pane.
Then click on the Run Troubleshooter” button.
After that, your computer will check for any possible errors and will pinpoint the root cause of the problem if possible.
Restart your computer.
Option 3 – Try to reset the Network Adapter
You can also try to perform a Network Reset to resolve the problem. This will reset the entire network configuration including your IP address. To perform Network Reset, follow these steps:
Tap the Win + I keys to open Settings.
From there, go to the Network and Internet section.
Next, scroll down and look for “Network Reset” under the status pane.
After that, click on Network Reset and then on Reset now to start resetting the network configuration. Once done, check if it is able to fix the error or not.
Option 4 – Try to fix the Proxy Settings
In the Cortana search box, search for Internet Explorer and then click on the related search result.
After that, tap the Win + T keys on your keyboard and click on Internet Options.
Next, navigate to the Connections tab and click on LAN Settings.
Then click on the Advanced button and delete all the entries in the list generated in the Exceptions section. And if the Advanced button is disabled because the “Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections)” option is disabled then you are good to go. Now proceed to the next step.
Tap the Win + X keys or right-click on the Start button and select Command Prompt (Admin) or you could also search for “cmd” in the Cortana search box and right-click on Command Prompt from the search results and select the “Run as administrator” option.
If a User Account Control appears, click on Yes to proceed. After that, type each one of the commands listed below, and don’t forget to hit Enter after you type each one of them.
netsh winhttp reset proxy
net stop wuauserv
net start wuauserv
Now restart your computer and check if the problem is fixed or not by installing or updating Microsoft Edge again.
The GDI32.DLL is a DLL (Dynamic Link Library) file that was developed by Microsoft. It is an essential file of the Windows OS as it contains instructions and information for exe files to follow.
These DLL files also use to store the various procedures and codes for the Windows programs. It is considered an essential component of Windows because it ensures that all the programs on Windows are operating properly.
So, if the gdi32.dll not found on your computer, then it can negatively impact your computer and the associated programs. Though DLL files used to be so efficient and convenient, they are extremely vulnerable to errors and issues.
Perform SFC scan
Press ⊞ WINDOWS + X to open the Windows menu
From the menu choose command prompt (admin)In command prompt type sfc /scannow and press ENTER
Leave the computer for the operation to be completed and Reboot your computer
Run DISM
Press ⊞ WINDOWS + X to open the Windows menu
From the menu choose command prompt (admin)in command prompt type: DISM.exe /Online /Cleanup-image /Restorehealth and press ENTER
wait for the process to be finished and Reboot your computer
Update device driver
Go to your manufacturer's website and update drivers for your components with the latest versions.
Update Windows
If you have an update ready for Windows, update it and see if this will remove the error
Scan computer for malware
Perform a full PC scan for malware to see if this is causing issues with the GDI32.DLL error.
Download file
One solution is to download a file from the official site and place it in the corresponding folder.
Perform System restore
Rollback system restore before the issue happened and your Windows will be working as intended
Photoviewer.dll is a shared library for SampleRes.dll and x3daudio1_1.dll in computers installed with Microsoft Windows 7, 8, Vista, and XP including 32 bit and 64 bit operating systems. Photoviewer.dll is associated with 1728000 system files.
The Photoviewer.dll error occurs when you upgrade your Windows operating system to a new version like Windows 7 or 8 on which this shared library is used. Once you upgrade the Windows and you right-click on JPG images, the Photoviewer.dll error pops up.
This error message is displayed as the following:
Photoviewer.dll missing/not found
Photovewer.dll entry point not found/application can’t initiate
Solution
Error Causes
Photoviewer.dll error can pop up due to several reasons. These include:
Modification of .dll files during Windows installation
Infection of Trojan virus
Photoviewer.dll missing /broken
Photo Gallery was earlier your default image editor before you upgraded your system
It is advisable to repair this issue timely to avoid inconvenience and serious PC threats especially if the cause of this issue is viral infection or registry damage.
Further Information and Manual Repair
Here are some of the best ways to help you resolve Photoviewer.dll error on your system:
1. Rebuild the Windows Photo Gallery
If you were previously using Vista and then you upgraded your system to Windows 7, then try this:
Go to the Start menu, click on the control panel and go to the folder options.
Then select the view tab option. Here you’ll find the Advanced setting window, select the show hidden files and folders tab.
Now click Ok to continue. Navigate to the following folder( %user% is the name of the account with the problem) C:\Usersusername\AppData\Local\Microsoft\Windows\Photo Gallery.
Then copy files to another location as a backup and delete them from the Windows Photo directory. Once the files have been deleted, try to start Windows Photo Gallery again. If this seems difficult, install Windows Photo Gallery application from the internet on your system.
2. Repair Broken Photoviewer.dll files and Remove Malware
Another way to fix the photoviewer.dll error is to download Restoro.
This is an advanced, user-friendly, and multi-functional PC fixer smoothly integrated with a registry cleaner. By running it on your system you can resolve all Photoviewer.dll error causes in seconds.
Restoro has an easy-to-use interface and a neat layout. It is safe, efficient, and bug-free. In addition to this, it is compatible with all Windows versions.
The registry cleaning utility is deployed with an automated algorithm that scans your entire PC and detects Photoviewer.dll file errors in seconds.
It fixes damaged, misconfigured, and broken Photoviewer.dll files, clears up disk space from unnecessary and obsolete files like the files from the uninstalled Windows programs which could be generating Photoviewer.dll error on your system.
It repairs the registry and modifies the registry keys to their correct configuration thus repairing the Photoviewer.dll error on your PC.
The powerful privacy error detector is integrated with all the properties and characteristics of an anti-virus. It scans for malware and viruses like Trojans and removes them from your system right away.
Besides these utilities, other features integrated into this repair tool include a system stability scanner and Active X and class error detector. It resolves Photoviewer.dll error while optimizing your computer’s speed and performance.
Click here to download Total System Care on your system to resolve the Photoviewer.dll file error today!
If your printer has been working just fine and you suddenly get an error message saying, Printer not activated, error code 30”, then something is definitely wrong and it’s not good especially if you have lots of things to do. Worry not, as this post will help you resolve the printer issue. Simply follow each one of the given options below carefully.
Option 1 – Try running the Printer Troubleshooter
The first thing you can to resolve the printer issue is running the Printer Troubleshooter. This built-in troubleshooter can detect and automatically fix the problem for you. To use it, follow these steps:
Tap the Win + R keys to open the Run dialog box.
Next, type “msdt.exe /id PrinterDiagnostic” in the field and click OK or hit Enter to open the Printer Troubleshooter.
Then click the Next button and follow the next on-screen instructions to fix the issue with the printer.
Option 2 – Check if the concerned printer is set as the default one
It could be that the printer you are trying to use is not set as the default printer. This is mostly the case so to fix the issue, you need to set the concerned printer as default. To do that, follow the steps below.
Tap the Win + I keys to open the Settings app.
After opening Settings, select Devices from the menu and then click the Printers and scanners option.
From there, look for the printer you are using among the list of options. After you find it, click on it and select the Manage option.
Now click on the “Set as Default” option to set the printer as default.
Option 3 – Try updating the driver for USB Composite Device
The problem with your printer might also be caused by the USB Composite Device. It could be that the USB Composite Device is acting up. Thus, you need to remove and reinstall it. How? Follow the steps below.
First, click the Start button and type “device manager”.
Then click on the “Device Manager” from the search results to open it.
From there, look for the USB Composite Device option and right-click on it, and select the Update Driver from the options.
Restart your PC and then click the “Search automatically for updated driver software” option.
Now uninstall and remove the printer driver software and reinstall it then refresh.
Option 4 – Try updating all the drivers for your Printer
Tap the Win + R keys to launch Run.
Type in devmgmt.msc into the box and tap Enter or click OK to open the Device Manager.
After that, a list of device drivers will be displayed. Look for Print queues from the list of drivers displayed and click on it to see all the Printer drivers.
Next, right-click on each one of the drivers and select “Update driver” to update the driver. Do it for all the Printer drivers
After that, select the “Search automatically for updated driver software” option and then follow the instructions to complete the process.
Restart your PC and try printing a document again and see if the “Printer not activated, error code -30” no longer pops up.
Note: You also have the option to go directly to the website of your printer manufacturer and check if there’s a new update – if there is, download it.
Often when we connect to the internet were browsing indexed pages through some well-known search engine, usually Google. But beneath the so-called normal internet lurks deep and dark web. You might have heard of the deep web and dark web if you have some geeky friends and we are here to explain what exactly is the deep and dark web.
The first thing to know is that the deep and dark web is not the same thing and they coexist separately from one another, you could say that beneath the deep web lies the dark web, yet another layer of the internet.
So let us explore first the deep web. What is exactly a deep web?
Deep web, hidden web, or invisible web
as sometimes referenced are part of worldwide web not indexed by search engines, meaning that engines do not basically see and index content of deep web sites.
The content of the deep web is hidden behind HTTP forms and includes many very common uses such as webmail, online banking, private or otherwise restricted access social-media pages and profiles, some web forums that require registration for viewing content, and services that users must pay for, and which are protected by paywalls, such as video on demand and some online magazines and newspapers.
The content of the deep web can be located and accessed by a direct URL or IP address but may require a password or other security access to get past public website pages.
While it is not always possible to directly discover a specific web server's content so that it may be indexed, a site potentially can be accessed indirectly (due to computer vulnerabilities).
To discover content on the web, search engines use web crawlers that follow hyperlinks through known protocol virtual port numbers. This technique is ideal for discovering content on the surface web but is often ineffective at finding deep web content. For example, these crawlers do not attempt to find dynamic pages that are the result of database queries due to the indeterminate number of queries that are possible. It has been noted that this can be (partially) overcome by providing links to query results, but this could unintentionally inflate the popularity of a member of the deep web.
Dark WEB
The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.
The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature. The Tor dark web or Onionland uses the traffic anonymization technique of onion routing under the network's top-level domain suffix .onion.
Dark & Deep WEB difference
The dark web has often been conflated with the deep web, the parts of the web not indexed (searchable) by search engines. The dark web forms a small part of the deep web but requires custom software in order to access its content. This confusion dates back to at least 2009. Since then, especially in reporting on Silk Road, the two terms have often been conflated, despite recommendations that they should be distinguished.
Darknet websites are accessible only through networks such as Tor ("The Onion Routing" project) and I2P ("Invisible Internet Project"). Tor browser and Tor-accessible sites are widely used among darknet users and can be identified by the domain ".onion". While Tor focuses on providing anonymous access to the Internet, I2P specializes in allowing anonymous hosting of websites. Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered encryption system. The darknet encryption technology routes users' data through a large number of intermediate servers, which protects the users' identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent node in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer. Due to the high level of encryption, websites are not able to track the geolocation and IP of their users, and users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.
Darknet
The darknet is also used for illegal activity such as illegal trade, forums, and media exchange for pedophiles and terrorists. At the same time, traditional websites have created alternative accessibility for the Tor browser in an effort to connect with their users. ProPublica, for example, launched a new version of its website available exclusively to Tor users.
Universal Windows Platform (UWP) applications are the modern application in the windows store that can be used in all the Window devices like Xbox, Hololens, Tablet, PC or Phone. Basically, UWP provides a common platform for every device that runs Windows 10. When attempting to login into these applications and receive this error:
Can’t sign in with a Microsoft accountThis program is blocked by group policy. For more information, contact your system administrator.0x8000704ec
Then this post is for you. We will guide you on how to easily resolve issues, please follow the steps provided.
Local group policy editor solution
Press ⊞ WINDOWS + R to open the Run dialog.
In the Run dialog box type gpedit.msc and press ENTER to open Group Policy Editor.
Inside the Local Group Policy Editor, navigate to the path below:
Computer Configuration > Windows Settings > Security Settings > Local Polices > Security Options
On the right pane, double-click on Accounts: Block Microsoft accounts to edit its properties.
Under Local Security Setting tab, click on the drop-down and select This policy is disabled.
Click Apply > OK to save the changes.
Exit Group Policy Editor.
Registry editor solution
As always, it is highly recommended to make a backup of the registry editor just in case that something goes wrong.
Press ⊞ WINDOWS + R to open the Run dialog.
In the Run dialog box, type regedit and hit ENTER to open Registry Editor.
Ever gotten an e-mail offer that seemed just a little bit too good to be true? Might’ve been a phishing attempt! These are everywhere and can come in many different forms.
So what’s phishing exactly, how can you detect it and how can you keep safe?
What is phishing?
Phishing (pronounced like fishing) is a type of cyberattack that tricks the user into trusting the source and revealing sensitive information. Fishing being the perfect analogy, the bait is a legitimate-looking site, e-mail or file and when you take a bite, your identity, banking information and much more can be revealed and stolen.
Credit: Anne Nygård on Unsplash
Some phishing attempts are incredibly obvious, others are super elaborate. Like with most types of malware, cybercriminals have become extremely well-versed in phishing and anyone can fall for it. To help you recognize and avoid it, we’ll take you through a couple of phishing types and give you tips on what to do if faced with them.
Phishing techniques
E-mail phishing
This is actually the most common type of phishing. A cybercriminal creates an e-mail containing stuff like attractive offers, legitimate-looking attachments or links and makes it appear as though it’s coming from a trusted source.
Credit: Justin Morgan on Unsplash
For example, it looks like it’s coming from your bank or your favorite retailer. The logo looks legit and the structure of the e-mail seems familiar, so you might get tricked into clicking on whatever clickable content is in it.
Unfortunately this exposes your device to malware that hands your data off to the hacker, who can decide what to do with it further.
SMS and social media phishing
Like the above example, you could be approached with lucrative offers or links via text messages or social media messages. Typically, the messages seem relevant to the user as they will be made to look like they’re related to apps or services you’re using.
Voice phishing
Voice phishing attacks are schemes that appear as though they’re coming from a credible number. Normally, you’ll get a call about something related to credit cards or taxes to get you into a state of worry, leading you to disclose personal information on the phone.
Spear phishing, whaling and BEC
Spear phishing normally targets specific individuals within a company who are likely to have access to sensitive data. Spear phishers spend time collecting information they can use to reach out to the individual looking as trustworthy as possible. They’ll typically lead with something relevant, for example mentioning an upcoming company event, and make a seemingly legitimate request.
Whaling is a more elaborate form of spear phishing, which targets people in even stronger positions such as executives or high-value individuals. The ultimate goal is to get them to transfer financial or other sensitive information that can be used to compromise the entire business.
Credit: Azamat E on Unsplash
BEC, or Business e-mail compromise, is a specific spear phishing technique carried out via e-mail. While there are many ways this is done, most commonly you’ll see instances where the phisher poses as a CEO or similar executive, or as a lower-level employee in specific positions (e.g. sales managers or financial controllers).
In the first situation, the impersonator reaches out to employees requesting them to transfer certain files or pay invoices. In the second situation, the phisher takes control of the employee’s e-mail account and sends false instructions to other employees in order to obtain data and information from them.
What can you do?
There are many ways you can be aware and spot a phishing attempt. Here are some tips:
Always check the sender’s address in your e-mails, even when they seem to come from a familiar source.
In any instance where payment information is requested, be very, very careful.
If you are receiving attachments you never asked for and definitely didn’t expect, better not click on them.
Beware of content that transmits a sense of urgency (sales deals, urgent updates to login credentials, etc.).
Bad spelling and grammar are usually a telltale sign of phishing.
Links that look shortened (e.g. Bit.ly) or just suspicious in general - if you have a bad feeling, do not click on them.
If you are receiving threats, you probably shouldn’t be clicking on anything in that message.
Always examine first-time senders in detail.
Block suspicious e-mail addresses, numbers and social media accounts.
If you are receiving a coupon for free stuff… You aren’t.
If you’re being asked to update your payment details by a service you use, such as Netflix, chances are it’s an impersonator.
Those are some of the ways to identify and prevent phishing attacks. However, sometimes phishers disguise themselves a little too well or a misclick happens and there you go - you’ve been exposed to malware.
Credit: FLY:D on Unsplash
This won’t happen if you invest in powerful protection software from the get-go, though. A good antivirus program like Bitdefender will keep you safe from becoming a victim of phishing scams. In fact, it will protect you from malicious attacks overall.
Be it your household or your business you’re concerned about, there are a bunch of different packages and options available, providing different kinds of cybersecurity services. That’s the only way you can ever really be sure you aren’t at risk of a digital attack.
Summary
Have you ever been targeted by phishers and didn’t know that’s what it was until you read this article? Many can relate. Protect yourself before it’s too late!
When you update or upgrade your computer to Windows 10, the setup will look for the compatibility of both the hardware and software. And in this process, if suddenly got an error message saying, “Some apps need to be uninstalled” or “You need to uninstall a program in order to continue”, you have to look for the program(s) that might be causing the compatibility issues. But worry not as this post will help you resolve the issue. Simply follow the given suggestions below.
Option 1 – Look for the incompatible programs
There are times when Windows 10 will point out the programs that are incompatible with Windows 10. In this situation, just click on the Uninstall and continue button and then wait for the process to be completed.
For more information, you can check out the official site Ready for Windows by Microsoft. This site can help you determine which software versions are compatible with Windows 10 and which ones are not. All you have to do is select the Windows 10 version and type your App name, after that, you will see the results about its compatibility. Thus, it’s now easier for you to figure out which software is causing an issue and if there is a new updated version available that you can install instead.
Option 2 – Try to install the Windows Update in a Clean Boot State
Putting your PC in a Clean Boot state can also help you install Windows Updates or Upgrades without any trouble because, during this state, you can start the system with a minimum number of drivers and startup programs that will surely help you in isolating the root cause of the issue.
Log onto your PC as an administrator.
Type in MSConfig in the Start Search to open the System Configuration utility.
From there, go to the General tab and click “Selective startup”.
Clear the “Load Startup items” checkbox and make sure that the “Load System Services” and “Use Original boot configuration” options are checked.
Next, click the Services tab and select the “Hide All Microsoft Services” check box.
Click Disable all.
Click on Apply/OK and restart your PC. (This will put your PC into a Clean Boot State. And configure Windows to use the usual startup, just simply undo the changes.)
After that, try to install the Windows Updates or upgrade again.
Option 3 – Try creating a new user account
Creating a new user account can resolve the “Some apps need to be uninstalled” error when upgrading or updating your Windows 10 PC. All you have to do is create a new admin account and initiate the setup. And this is a new user account, there will be no third-party applications installed on your computer. Thus, the installation should go through without any trouble. And in case you’ve already installed programs for that user, you just have to uninstall them all and then re-run the setup.
Option 4 – Perform a clean install
If none of the options worked, you can try to clean install Windows 10. Just make sure that you have the ISO from the official Microsoft Website and then a bootable USB drive to install Windows 10 again. Take note that this will delete all the data from your drive where Windows 10 was installed previously.
USB storage devices, peripherals, and other devices are almost used on a daily basis. And as you know, when removing the USB storage devices, it is recommended to always use the “Safely remove the USB storage device” option in order to prevent data corruption in the USB storage device. However, there are times when you may see the following error message after you use the “Safely remove the USB storage device” option:
“Problem ejecting USB Mass Storage – This device is currently in use, close any programs or windows that might be using this device, and then try again.”
This kind of error message occurs when the device is still interacting with the operating system in the background. There are several ways you can fix this error but before you check them out below, you need to close all the open windows and programs that may be using the USB storage device and then wait for a couple of seconds and then try safely removing it again. However, if you are still getting the same error message, then here are some tips you should try:
Option 1 – Try to use the Task Manager
Tap the Ctrl + Shift + Esc keys on your keyboard to open the Task Manager.
After that, look for the running processes and programs hogging on your USB Storage device. The error could be due to a program or process that’s using the USB device. This program or process will hog onto some Disk or CPU while transferring data and interacting with the device.
Once you find the culprits, right-click on each one of them and select End Process or End Task. You could also try to restart the process for “Explorer.exe” and see if it fixes the problem.
Option 2 – Try using DISKPART
The next thing you can try to resolve the issue is to use DISKPART. Refer to the given steps below to do so.
Tap the Win + R keys to launch Run and then type “cmd” in the field and tap Enter or click OK to open an elevated Command Prompt.
Next, type and enter this command to execute it: diskpart
The command you entered will initiate the DISKPART utility. After that, type and enter this second command: list disk
Next, type and enter this third command: list volume
The commands you just executed will help you in either listing all the Disk connects or all the partitions on those disks formed and from there, you need to select one command depending on the “list” command you entered. You can execute either of the two following commands:
select disk #
select volume #
After that, it will select the Disk or Partition you want to select.
Now type either one of the following commands:
offline disk #offline volume #
The command you entered will mark the selected disk is Offline. Afterward, try to safely remove your USB Storage device. Just remember that when you plug it back in again, you have to carry out the same method except for the last given command as this time you will have to enter either of these commands in order to get your USB storage device back online:
online disk #
online volume #
Option 3– Try using the Disk Management utility
Tap the Win + R keys to open Run.
Then type “diskmgmt.msc” in the field and hit Enter to open the Disk Management utility.
Next, look for the entry for your USB Storage device and once you’ve found it, right-click on it and select Offline.
After that, try to safely remove your USB Storage device again and see if the error is fixed. Note that you need to go over the same steps again if you want to plug your USB Storage device back in but make sure to select the Online option instead of Offline to get your device back online.