Logo

Create Custom Views in Event Viewer

The Event Viewer in the Windows operating system is used to troubleshoot any computer issues. It is one of the most useful tools that keep logs of both security and system events. It also monitors for both software and hardware problems in the computer. This tool is the only one with amazing features that maintain logs about everything that’s going on in the computer system. It keeps track of all the information to the point where going over them will take a lot of time.

Luckily, the Event Viewer tool now allows users to create custom views where you can set the filters and sort the data recorded to limit the information details to only what you’re interested in seeing. For instance, if you want to troubleshoot with one hard drive, you can just create a special custom view to display only the hard drive warnings in the security logs. This will save you hassle and time.

Take note that the logs in the Event Viewer are divided into two main categories namely the Window logs and the Application and Services logs. You can just set the filter to the logs by their event id, specific date, and many other events when you have to troubleshoot some problem in your computer. So if you are trying to troubleshoot a problem in your Windows 10 computer and you’re checking the Event Viewer, read on as this post will guide you in creating custom event views in the Event Viewer. To get started, refer to the instructions given below.

Step 1: Go to the Start menu and in the search box, type “event viewer” and then click on Event Viewer from the search results to open it.

Step 2: After opening Event Viewer, click on Custom Views located in the left pane of the window.

Step 3: Next, click on the Administrative events under the Custom View to create special log views.

Step 4: Then on the right side of the window, click on Create Custom View to open the Create Custom View window.

Step 5: There is a logged drop-down list under Filter. From there, you have the option to choose an appropriate predefined time or use a custom time range for your Custom log views.

Step 6: After that, select an appropriate event level for your custom view. You have fine entry-level options to choose from such as critical event level, error, warning, information and verbose.

  • Critical – select this if you want to see the events that require your immediate attention in the custom view.
  • Error – select this if you want your Event Viewer to display the events that are less critical but hints at the problems.
  • Warning – select this event-level if you want to see the event with the potential problem but may not bound to happen.
  • Verbose – select this if you want to see detailed information about all the events.

Step 7: After you’ve selected the event level, you now have to select how you want the events to be filtered. They can either be filtered By the log or By the source.

  • By the log – you can select two options called Windows log and, Application and Service logs. The Windows logs allow you to filter the logs created during events like setup, security, applications, and system events. While the Application and Service logs filter the log created by the installed applications in your system.
  • By the source – select this if you want your Custom View to search for information in event sources. It allows you to view events in detail for various applications and devices.

Note: You have the option to further customize the event logs with more filters like Event IDs, task category, keywords, User, and Computer. Using these additional filters, you can choose to filter the events in the special views by specifying event id numbers in the Event IDs, entering predefined Windows words in the Keyword, specify the user accounts in the User field, as well as choose the system from the server to maintain logs in the Computer field.

Step 8: Once you’re done customizing the log filter, click on OK to apply the changes made.

Step 9: After that, a Save Filter should be displayed in the Custom View window. Just enter the Custom View name and select the Event Viewer folder where you want to save the Custom view. The folder name should be Custom View by default. And if you want, you can also create your own folder if you want your custom views to be visible to all the system users.

Step 10: Next, check all the Users box located in the lower corner of the window and then click the OK button after you’re done.

You should now see the customized filter you just created on the left side of the window. Just click on it to check your filtered events in the center of the Event Viewer window. And for you to save the custom view logs, simply right-click on the Custom views you created and then click on Save All Events in the Custom View As from the drop-down menu. Then put a name on the file and select the appropriate location where you want to save the logs and click on the Save button. Note that the log file is saved with the “.EVTX” file extension and when you double click on it, it will open the file in the Event Viewer.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Fix igfxem.exe application error in Windows 10
When you get an igfxem.exe error in Windows, it is not really clear what does this means, usually, Windows throw us some code or we get a DLL error, rarely we get an EXE error. So what does this error means? Intel Graphics Executable Main Module, shortly called as IgfxEM module is a part of the Windows operating system. When you run Microsoft .NET Framework applications that use the AS/400 Data Queue ActiveX control (Mseigdq.dll) to read from and to write to IBM iSeries (AS/400) data queues, you may experience this error. In order to overcome this error and cope with it try the following things:
  1. Increase Virtual Memory

    Go to the Start Menu and click on Settings. Type performance. Choose Adjust the appearance and performance of Windows. In the new window, go to the Advanced tab and under the Virtual memory section, click on Change. At the bottom of the new window, check what the Recommended value is and how it compares to Currently allocated. If the current setting is significantly less than the recommended, uncheck the Automatically manage paging file size for all drives box at the top of the same windows and then click on Custom size. Enter the Recommended value in the Initial Size box, and a larger figure in the Maximum size box. Click OK to save the new settings.
  2. Download and update .NET framework

    Go to the Microsoft website and download the latest .NET framework. Once the download is complete, install the package following onscreen instructions.
  3. Reinstall INTEL graphic drivers

    Go to the intel website and download the latest graphic drivers for your graphic card model. Once the download is complete, install the package following onscreen instructions.
  4. Run SCF scan

    If all else fails, run command prompt and inside type sfc /scannow
Read More
How To Fix The "Referenced Memory At" Error Code

Referenced Memory at - What is it?

0x Referenced Memory at 0x is an error code that occurs when the random memory addresses conflict. This error causes running programs or browsers to crash. Referenced memory at error code is considered as a service violation error. It is displayed as the following:

“The instruction at 0xf77041d24 referenced memory at 0×00000000. The memory could not be read.”

Solution

Restoro box imageError Causes

The ‘referenced memory at’ errors is either triggered by:
  • Hardware failure
  • Problems with the RAM and the registry
Hardware failure may result if the driver is not installed properly. The problems in the RAM indicate registry issues that occur due to data overload in the hard disk and poor PC maintenance. The registry saves all the information and activities you perform on your system on the hard disk. This includes the junk files, temporary files, invalid registry entries, and files of both installed and uninstalled programs.  These files accumulate and take over a lot of RAM space. Also, the referenced memory at error can be considered to be a form of memory leak where unknown third-party software can take up the memory space that has been reserved for a particular program. For example, if you have toolbars and add-ons installed in your browser, it can also lead to invalid registry storage in the registry. If you don’t clean the registry, these unnecessary files can overload your data and lead to hard disk/RAM damage and corruption triggering obscure error messages like referenced memory at error.

Further Information and Manual Repair

Referenced memory is a critical error; if not resolved it can lead to serious PC damages like a system failure. To avoid this, it is advisable to fix it right away. Here are a couple of ways to repair this issue on your system:

Cause: Hardware Failure

Solution: If the referenced memory at error is generated due to hardware failure then to resolve this error you must reinstall the driver that has caused the error to appear. Let’s say if the error pops up because of the printer driver, reinstall it. For re-installation of the driver, simply go to the control panel and click on the Device Manager option. Once you click it you will see a detailed page with a list of devices. Now click on the printer (the problematic driver in this situation) to reinstall the driver software. Double click on it to open the properties dialog box and then click the driver tab and update the driver. Once you have updated the driver, try using the printer. Check if it works. If it works and the referenced memory at the error code does not appear on the screen, this means the problem was with the hardware. However, if the error still pops up then this means the problem is deeper. It’s related to the registry.

Cause: Problems with the RAM and the registry

Solution: If the problem is with the RAM and the registry, then it is advisable to download Restoro. Restoro is a new, next-generation, and highly functional registry cleaner. It detects and removes all the registry issues, unnecessary and obsolete files saved in the hard disk taking up a lot of RAM space. It clears the RAM and cleans up the disk. Furthermore, it repairs the damaged files, fragmented disk, and the corrupt registry in seconds enabling you to resume the program that you were running before the error occurred. Restoro has a user-friendly interface and easy navigation. To run and operate this system you don’t need any kind of technical expertise. In just a few clicks you can resolve the critical referenced memory at error on your PC. It is compatible with all Windows versions Click here to download and install Restoro on your PC and fix the referenced memory error code now.
Read More
10 Worst Computer Viruses in history
Computers viruses, worms, ransomware, etc. are kinds of malicious software that no user should take lightly. On several occasions, we have touched upon security steps that each user should take in order to protect its identity and data. Sadly sometimes even when all precautions are taken some malware can still slip through and wreak havoc. Today we are looking at some of the worst or the best, depending on your view that has indeed wreaked plenty of havoc.

viruses10 worst computer viruses in history

In the list of the 10 most famous computer viruses below, we show the costs, dates, reach, and other key facts. First a note about terms: we use the words “virus” and “worm” interchangeably because most readers search for them that way. But there’s a subtle difference that we explain after the list.

1. Mydoom – $38 billion

The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent. Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server. Mydoom is still around today, generating 1% of all phishing emails. That’s no small feat considering the 3.4 billion phishing emails sent each day. By that figure, Mydoom has taken on a life of its own, infecting enough poorly-protected machines to send 1.2 billion copies of itself per year, 16 years after its creation. Though a $250,000 reward was offered, the developer of this dangerous computer worm was never caught. Wondering what makes the world’s most secure computers so safe? See the Tech@Work guide: Upgrade to the World's Most Secure and Manageable PC

2. Sobig – $30 billion

The 2003 Sobig computer virus is actually another worm. It is second only to the Mydoom virus in its scope. The $30 billion figure is a worldwide total, including Canada, the U.K., the U.S., mainland Europe, and Asia. Several versions of the worm were released in quick succession, named Sobig.A through Sobig.F, with Sobig.F being the most damaging. This cybercriminal program masqueraded as legitimate computer software attached to emails. It disrupted ticketing at Air Canada and interfered with countless other businesses. Despite its widespread damage, the creator of the successful bug was never caught.

3. Klez – $19.8 billion

Klez is a close third on the list of the worst computer viruses ever created. With nearly $20 billion in estimated damages, it infected about 7.2% of all computers in 2001, or 7 million PCs. The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses. As with other viruses and worms, Klez was released in several variants. It infected files, copied itself, and spread throughout each victim’s network. It hung around for years, with each version more destructive than the last. Windows has come a long way since most of the computer viruses on this list hit the web. Thankfully, built-in protection with Microsoft Defender is always on the watch.

4. ILOVEYOU – $15 billion

The year 2000’s ILOVEYOU virus worked by sending a bogus “love letter” that looked like a harmless text file. Like Mydoom, this attacker sent copies of itself to every email address in the infected machine’s contact list. Shortly after its May 4 release, it had spread to more than 10 million PCs. The virus was created by a college student in the Philippines named Onel de Guzman. Lacking funds, he wrote the virus to steal passwords so he could log into online services he wanted to use for free. He reportedly had no idea how far his creation would spread. This virus is also known as Loveletter. Need to up your remote work security game before there’s another entry on the list of most deadly computer viruses? See our guide: How to Work Remotely and Securely

5. WannaCry – $4 billion

The 2017 WannaCry computer virus is ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. The WannaCry ransomware ripped through computers in 150 countries, causing massive productivity losses as businesses, hospitals, and government organizations that didn’t pay were forced to rebuild systems from scratch. The malware raged like wildfire through 200,000 computers worldwide. It stopped when a 22-year-old security researcher in the U.K. found a way to turn it off. Computers with out-of-date operating systems were hit especially hard. That’s why security experts always recommend updating your systems frequently.

Ransomware strikes again

In September 2020, one of the potentially largest computer virus attacks in medical history hit Universal Health Services. The U.S. hospital chain, which has more than 400 locations, was reportedly struck by damaging ransomware. The attack forced the cancellation of surgeries and made healthcare workers switch to paper records.

6. Zeus – $3 billion

The Zeus computer virus is an online theft tool that hit the web in 2007. A whitepaper by Unisys three years later estimated that it was behind 44% of all banking malware attacks. By then, it had breached 88% of all Fortune 500 companies, 2,500 organizations total, and 76,000 computers in 196 countries. The Zeus botnet was a group of programs that worked together to take over machines for a remote “bot master.” It originated in Eastern Europe and was used to transfer money to secret bank accounts. More than 100 members of the crime ring behind the virus, mostly in the U.S., were arrested in 2010. It’s not as prominent today, but some of the virus’ source code lives on in newer botnet viruses and worms. Zeus caused documented damage of $100 million. But the real cost in terms of lost productivity, removal, and undocumented theft is undoubtedly much higher. A $3 billion estimate, adjusted for inflation, puts this virus at a cost of $3.7 billion in today’s dollars.

7. Code Red – $2.4 billion

First observed in 2001, the Code Red computer virus was yet another worm that penetrated 975,000 hosts. It displayed the words “Hacked by Chinese!” across infected web pages, and it ran entirely in each machine’s memory. In most cases it left no trace in hard drives or other storage. Financial costs are pegged at $2.4 billion. The virus attacked websites of infected computers and delivered a distributed denial of service (DDoS) attack on the U.S. White House’s website, www.whitehouse.gov. In fact, the White House had to change its IP address to defend against Cod Red. Can your printer get a virus? See our cool infographic: The State of Printer Security

8. Slammer – $1.2 billion

The SQL Slammer worm cost an estimated $750 million across 200,000 computer users in 2003. This computer virus randomly selected IP addresses, exploiting vulnerabilities and sending itself on to other machines. It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic. The Slammer worm hit banks in the U.S. and Canada especially hard, taking ATMs offline in many locations. Customers of Toronto’s Imperial Bank of Commerce found themselves unable to access funds. The attack reared its ugly head again in 2016, launching from IP addresses in Ukraine, China, and Mexico.

9. CryptoLocker – $665 million

Thankfully, ransomware attacks like the 2013 CryptoLocker virus have dipped since their 2017 peak. This malware attacked upwards of 250,000 machines by encrypting their files. It displayed a red ransom note informing users that “your important files encryption produced on this computer.” A payment window accompanied the note. The virus’ creators used a worm called the Gameover Zeus botnet to make and send copies of the CryptoLocker virus. According to a report by security firm Sophos, the average ransomware attack costs a business $133,000. If we estimate that CryptoLocker hit 5,000 companies, that would put its total cost at $665 million. Where will cybersecurity go next? See our guide: The Future of Cybersecurity

10. Sasser – $500 million

The Sasser worm was written by a 17-year-old German computer science student named Sven Jaschan. He was arrested at the age of 18 in 2004 after a $250,000 bounty was posted for the computer virus’ creator. A friend of Jaschan’s tipped authorities that the youth had penned not only the Sasser worm but also the damaging Netsky.AC attack. Jaschan was given a suspended sentence after it was found he was a minor when he wrote the malware. The Sasser worm crashed millions of PCs, and though some reports put damages at $18 billion, the relatively low infection rate suggests a more likely cost of $500 million. Other notable viruses The top 10 worst computer viruses above are just the ugly tip of a gargantuan digital iceberg. With a million new malware programs popping up every 3 years, we may miss the forest for a few outstanding trees. Here are just a few more viruses that have wreaked havoc over the years: Mimail: This worm tried to harvest data from infected machines to launch a string of DDoS attacks, but was relatively easy to remove. Yaha: Yet another worm with several variants, thought to be the result of a cyber-war between Pakistan and India. Swen: Written in C++, the Swen computer worm disguised itself to look like a 2003 OS update. Its financial cost has been pegged at $10.4 billion, but not reliably. Storm Worm: This worm showed up in 2007 and attacked millions of computers with an email about approaching bad weather. Tanatos/Bugbear: A 2002 keylogger virus that targeted financial institutions and spread to 150 countries. Sircam: A computer worm from 2001 that used counterfeit emails with the subject line, “I send you this file in order to have your advice.” Explorezip: This worm used fake emails to spread to every machine on thousands of local networks. Melissa: The most dangerous computer virus in 1999, Melissa sent copies of itself that looked like NSFW pics. The U.S. FBI estimated cleanup and repair costs at $80 million. Flashback: A Mac-only virus, Flashback infected over 600,000 Macs in 2012 and even infected Apple’s home base in Cupertino, Calif. In 2020, there’s now more malware on Macs than on PCs. Conficker: This 2009 virus still infects many legacy systems and could do significant damage if it ever activates. Stuxnet: This worm is reported to have destroyed Iranian nuclear centrifuges by sending damaging instructions.
Read More
Steam beta introduces no rollback game updates
The latest steam beta update has introduced code that will prevent downloading and installing previous game versions via the steam client. steamFor many people that are playing online games, this is not such a big deal since they always must have the latest version in order to play their games but for other ones, this has arrived as a bit of a problem. Many people preferred older game versions since often updates can change certain mechanics inside the game making it different as an experience or introduce some elements that not everyone likes. So far, people could use the steamDB site to find depo of the game versions you would like to play and download it but if this beta code goes live that will not be an option anymore. Now, playing old games without updates could also be used for nostalgic reasons and these people have also been cut off with this update. It is important to point that update is still in beta client only but users have already started to voice their opinions asking Valve not to place it live. In the end, it will all depend on Valve’s decision will they listen to their customers or decide to push updates on live service.
Read More
Fix can not open EXE file in Windows 10
Can not open and run EXE file in Windows is not a new issue and sadly it can still happen from time to time, luckily this step by step solution will help you to resolve this problem fast and effective in no time. Try the below solutions in no particular order and I hope that you will solve the issue fast and be able to return to using the computer like it never happened
  1. Run SFC scan

    As the EXE file not opening issue lies in the Windows OS, the SFC tool will be able to identify the cause and fix this issue. Press ⊞ WINDOWS + X and choose command prompt (admin) in command prompt type: sfc /scannow Press ENTER
  2. Check registry and modify if needed

    Sometimes value in the registry key is wrong and can cause this error, in order to check if this is the case, we will open the registry editor and find out Press ⊞ WINDOWS + R to bring run dialog up type in it: RegEdit and press ENTER In the left pane of the Registry Editor window, click on the HKEY_CLASSES_ROOT to expand the section Scroll down to find out the .exe registry and click on it Go to the right pane of the window and double-click on the Default and set the Value Data as exefile Click on the OK button Next, located the given in the window: HKEY_CLASSES_ROOT>exefile>shell>open>command Click on the “Command” in the left pane of the window In the right pane of the window double-click on the Default and set Value Data as “%1” %* Click on the OK button Restart your computer and check if the issue persists
  3. Turn off Firewall and defender

    If you have a firewall and antivirus active there might be a chance of a conflict and that firewall or antivirus is preventing the EXE file from starting, disable your firewall and anti-virus and try again to open the EXE file.
  4. Turn off user account control

    User account control can also like a firewall prevent some files from executing, go into accounts and turn off user account control to see if this might be an issue preventing you from opening the file.
Read More
Screensaver Timeout Settings
One of the cool and interesting features in Windows is the Screensaver which allows users to display animation or change the wallpaper automatically when the computer is not being used. This feature can also time out and lock your computer when it remains idle for quite some time. However, if you notice that the screensaver of your computer turns on a lot earlier, then you’ve come to the right place as this post will guide you on how you can change the timeout settings of the screensaver of your Windows 10 computer. Usually, the screensaver in Windows 10 is turned off by default, however, if some other user has turned it on or if you have turned it on, you can actually change the timeout settings of the screensaver using several methods. You can do it through the Personalization settings, Registry Editor, as well as the Group Policy Editor. Before you proceed with the instructions provided below, make sure that you create a System Restore point first. Once done, follow each one of the suggestions carefully to successfully change the Screensaver timeout settings in Windows 10.

Option 1 – Modify the timeout settings of Screensaver via Personalization settings

  • Open the Start menu and type “screen saver” in the field.
  • On the search results that appear, click on the “Change Screen Saver” option.
  • From there, you have the option to change the screen saver type, preview, open settings, change the wait time, as well as choose to display lock screen on your resume.
  • Now to change the timeout settings of your screensaver, you have to increase the wait time from 1 to 15 or anything that works for you.
  • Once done, click OK and exit to save the changes made.

Option 2 – Try to change the screensaver time via Registry Editor

The next option you can try to change the timeout settings in the screensaver is using the Registry Editor. To get started, follow these steps:
  • Tap the Win + R keys to launch the Run utility and type “regedit” in the field and hit Enter to open the Registry Editor.
  • Next, navigate to this registry path: ComputerHKEY_CURRENT_USERSoftwarePoliciesMicrosoftWindows
  • From there, right-click on Windows located in the right pane and select New > Key.
  • Name the key as “Control Panel” and right-click on it and select New > Key and then name it as “Desktop”.
  • Once done, click on the newly created Desktop key to highlight it.
  • After that, right-click on any empty space in the right pane and select New > String Value and then type “ScreenSaveTimeOut” and hit Enter to save it.
  • Now right-click on ScreenSaveTimeOut and select Modify and then set its value data in seconds.
  • Click on OK and exit the Registry Editor to save the changes made.

Option 3 – Change Screensaver timeout settings via Group Policy Editor

  • Tap the Win + R keys to open the Run dialog box and type “gpedit.msc” in the field and hit Enter to open the Group Policy Editor.
  • Next, navigate to User Configuration > Administrative Templates > Control Panel > Personalization.
  • Then look for a policy setting named “Screen saver timeout” and double click on it and then click on the Enabled option to enable it.
  • Add the screen timeout in seconds and click on the Apply and OK buttons to save the changes.
  • Restart your computer.
Note: If you want to disable the screensaver feature in your computer, you can always do so by disabling a policy setting named “Enable Screen Saver”.
Read More
Can’t connect to this network Windows issue
Can’t connect to this network Internet connectivity issues present a complex problem with simple solutions for PC and laptop users. First, it is usually recommended that users rule out problems with the internet connection, router, and Wi-Fi settings before proceeding to troubleshoot settings on your PC/laptop. Once the rest are ruled out, we can then proceed with the following troubleshooting steps and guidelines to fix your wifi connection issue: The first step is to update your windows network adapter driver. Connectivity problems may arise if your network driver is not updated or if it is incompatible with the network adapter. To do so, you may resort to any third-party driver scanning and installing programs found online. This solution should have resorted if users don’t want the hassle of perusing through windows settings that users may not be familiar with. However, this solution requires a pre-existing internet connection other than wifi, so it is recommended you have a backup internet connection via ethernet.

The second step is to uninstall the driver for your network adapter. This solution is to be reported if there is an issue with the driver as restarting the PC after the following steps let windows reinstall the driver again:

  • Open the quick access menu on your keyboard by pressing the Windows key and X key at the same time and select “Device Manager” from the menu list.
  • From the list of devices, select “Network Adapters”
  • Usually on the top of the list is the Wireless Network Adapter
  • Right-click the Wireless Network Adapter and select the option to “Uninstall device”
  • You will be given a confirmation in a new separate window to proceed. Click “Uninstall” to proceed.
  • After completing the previous steps, try rebooting your Windows PC and reconnecting to see if it works.

A third step is to disable the 802.1 1n modes of your network adapter by following the next steps:

  • First press the Windows logo key and the X key at the same time to bring up the quick-access menu. And like the previous step, select “Device Manager”
  • From the list of devices, select “Network Adapters”
  • Right-click the Wireless Network Adapter from the drop-down menu and select properties
  • Under properties, select the “Advanced” tab then select the 802.1 1n Mode. To the right drop-down menu change the option to  “Disabled” and click “Ok”
  • After, try to re-establish the connection to see if the steps have worked.
In the event that any of the preceding did not fix your problem, it helps to take a second look at the router and network settings using the interface provided by your ISP. A simple reset to the back of your router often fixes the issue. Also, try to check if you have any other administrative capabilities over the network to determine whether your device, in particular, has been MAC filtered or if the frequency of your wireless adapter is not compatible with the broadcast frequency of your router.
Read More
Windows is stuck in Airplane Mode
As of late, a number of users reported experiencing a problem where their Windows 10 computers get stuck on Airplane mode for some unknown reason. According to the affected users, they were unable to turn off the Airplane mode which means that their computers are also not able to connect to the internet. One of the possible reasons why this kind of issue occurs is that there could be a bug with the airplane mode or it could also be the doing of faulty network drivers or physical switch that’s turned on, and so on. If you are one of the few users who experience the same issue, then read on as this post will guide you on what to do if your Windows 10 computer gets stuck on Airplane mode. There are a couple of suggestions you can check out to resolve the problem. You can try to check the status of the Radio Management service, flush the DNS cache or you could turn off the airplane mode via system settings. You could also update the network drivers or turn off the physical switch for airplane mode or make some adjustments in the Windows Registry. For more details, refer to each one of the suggestions provided below.

Option 1 – Try to check the Radio Management Service status

  • First, tap the Win + R keys to open the Run dialog box and type “services.msc” in the field, and hit Enter to open the Windows Services Manager.
  • Next, look for the Radio Management service and select Properties.
  • From there, change its Startup type to Disabled and click on the Apply and OK buttons to save the changes made.
  • Once done, restart your computer and check if you can now turn off the airplane mode.

Option 2 – Flush the DNS cache

You could also try to flush the DNS cache to fix the “ERR_ICAN_NAME_COLLISION” error. All you have to do is open Command Prompt as an administrator and then execute each one of the following commands sequentially to flush the DNS cache:
  • ipconfig/release
  • ipconfig/renew
  • ipconfig/flushdns

Option 3 – Try turning off the airplane mode via System settings

If flushing the DNS cache did not help in fixing the problem, then you might want to turn off airplane mode via system settings.
  • In the Windows Search bar, type “airplane mode”.
  • From the search results that appear, click on Airplane mode.
  • After that, a window will appear where you have to turn off the toggle button for Airplane mode.

Option 4 – Try to update, rollback or reinstall the Network adapter drivers

The next thing you can do to resolve the problem is to update the Network Adapter drivers by following these steps:
  • Tap the Win + R keys to launch the Run window and then type in the “devmgmt.msc” command and hit Enter to open the Device Manager window.
  • Under the Device Manager, you will see a list of drivers. From there, look for the Network Adapters and expand them.
  • Look for the Broadcom Network Adapter and right-click on it, as well as other network adapters that have an exclamation icon, and update them all.
  • Restart your PC and see if it helped in fixing the problem.
Note: If updating the network drivers didn’t help in fixing the problem, you can also try to roll back the very same drivers from their previous versions and restart your Windows 10 PC. After that, the system itself will reinstall the drivers you just uninstalled. Alternatively, you can also download and install the drivers from the manufacturer’s website directly. To reinstall the network adapter drivers, refer to these steps:
  • Open the Devices Manager from the Win X Menu.
  • Then locate the device drivers and right-click on them to open the Properties.
  • After that, switch to the Driver tab and click on the Uninstall Device button.
  • Follow the screen option to completely uninstall it.
  • Finally, restart your computer. It will just reinstall the device drivers automatically.

Option 5 – Try to turn off the physical switch for Airplane mode

If your computer has a physical switch to turn on or off the airplane mode, then you might want to check that switch if you have one. Chances are, it could be the reason why you’re unable to turn off Airplane mode on your computer.

Option 6 – Try to make some adjustments in the Registry

  • Tap the Win + R keys to launch the Run utility.
  • Then type “Regedit” in the field and hit Enter to open the Registry Editor.
  • Next, navigate to this registry path: HKEY_LOCAL_MACHINESystemCurrentControlSetControlClass
  • From there, edit the registry value of “RadioEnable” to “1”.
  • Exit the Registry Editor once done, and restart your computer.
Read More
Remove EmailAccountLogin PUP Removal Tutorial

EmailAccountLogin is a browser extension for Google Chrome, Mozilla, and Internet Explorer. This extension enables you one-click access to your favorite email providers, allowing you to easily check your email without typing the web address.

From the author: One-Click Access to quick links to the most popular email providers.

The Email Account Login new tab extension provides convenient, one-click access to several popular email services including Gmail, Yahoo, Facebook, Outlook, and Live mail along with providing direct access to a web search.

EmailAccountLogin is a browser hijacker, this extension hijacks your home page and replaces it with its own search engine. While active this extension monitors your website visits, links, clicks, and personal information. This information is later sold/forwarded to better server ads across its network. While using EmailAccountLogin you will see additional unwanted ads injected into your search results, sponsored links, and even sometimes pop-up ads. Several anti-virus scanners have categorized EmailAccountLogin as a Browser Hijacker and therefore, for security reasons, it is not recommended to keep it on your computer.

About Browser Hijackers

Browser hijack is a very common type of online fraud where your internet browser configuration settings are modified to make it do things you don’t intend. Browser hijacker malware is developed for many different reasons. It redirects you to the sponsored sites and inserts advertisements on the browser that helps its developer generate earnings. It may seem harmless, but most of these sites are not legitimate and could present a significant threat to your online safety. As soon as the program attacks your laptop or computer, it starts to mess things up a whole that slows your PC down to a crawl. In the worst-case scenario, you may be pushed to tackle serious malware threats as well.

Browser hijacking signs and symptoms

Signs that your internet browser is hijacked include: 1. your homepage has been reset to some mysterious webpage 2. when you key in a URL, you find yourself regularly directed to a different webpage than the one you actually meant 3. default web engine is modified 4. you’re getting new toolbars you haven’t witnessed before 5. you notice numerous ads pop up on your browsers or display screen 6. your web browser starts running slowly or displays frequent errors 7. you are blocked to access the websites of computer security solution providers.

How they get into your PC

Browser hijackers may use drive-by downloads or file-sharing networks or perhaps an e-mail attachment in order to reach a targeted computer. Many browser hijackings originate from add-on applications, i.e., toolbars, browser helper objects (BHO), or extensions added to web browsers to provide them additional functionality. A browser hijacker may also come bundled up with some freeware that you inadvertently download to your computer, compromising your internet security. A good example of some notorious browser hijackers includes Anyprotect, Conduit, Babylon, SweetPage, DefaultTab, Delta Search, and RocketTab, but the names are constantly changing. Browser hijacking can bring about severe privacy issues and even identity theft, disrupt your browsing experience by taking control over outbound traffic, considerably slows down your computer by depleting lots of resources and result in system instability also.

How to repair a browser hijack

Certain hijackers can be removed by simply uninstalling the corresponding free software or add-ons from the Add or Remove Programs in the Microsoft Windows control panel. Yet, some hijackers are far harder to find or get rid of as they might get themselves connected with some critical system files which allow it to operate as a necessary operating-system process. Furthermore, manual removal demands you to execute several time-consuming and complex actions which are very difficult to do for novice computer users. Browser hijackers can be effectively removed by installing and running anti-malware software on the affected PC. Safebytes Anti-Malware has a cutting-edge anti-malware engine to help you avoid browser hijacking in the first place, and mop up any existing issues. Along with anti-virus software, a PC optimizer tool will help you repair Windows registry errors, eliminate unwanted toolbars, secure your internet privacy, and improve overall system performance.

Find Out How To Install Safebytes Anti-Malware On An Infected Computer system

All malware is bad and the effects of the damage can vary according to the specific type of malware. Some malware variants modify browser settings by adding a proxy server or change the PC’s DNS configurations. In these cases, you will be unable to visit some or all of the websites, and thus unable to download or install the necessary security software to get rid of the malware. So what should you do if malicious software keeps you from downloading or installing Safebytes Anti-Malware? Follow the instructions below to get rid of malware through alternate methods.

Install the anti-malware in Safe Mode

In Safe Mode, you may adjust Windows settings, un-install or install some software, and eradicate hard-to-delete malware. In the event, the malware is set to load automatically when the PC starts, shifting to this mode may well prevent it from doing so. To start the computer into Safe Mode, hit the “F8” key on the keyboard just before the Windows logo screen comes up; Or right after normal Windows boot up, run MSConfig, look over the Safe Boot under the Boot tab, and then click Apply. After you restart into Safe Mode with Networking, you may download, install, as well as update the anti-malware program from there. At this point, you could run the antivirus scan to eliminate viruses and malware without any interference from another application.

Utilize an alternate internet browser to download security software

Some malware might target vulnerabilities of a specific browser that obstruct the downloading process. When you suspect that your Internet Explorer happens to be hijacked by a virus or otherwise compromised by online hackers, the most effective plan of action is to switch over to a different web browser such as Chrome, Firefox, or Safari to download your chosen computer security software – Safebytes Anti-Malware.

Install and run anti-virus from your flash drive

Another option is to save and run an antivirus software program entirely from a USB drive. Do these simple measures to clear up your affected PC using portable anti-malware. 1) On a virus-free PC, install Safebytes Anti-Malware. 2) Plug the Flash drive into the uninfected computer. 3) Double-click the Setup icon of the antivirus program to run the Installation Wizard. 4) Choose the drive letter of the pen drive as the location when the wizard asks you where you would like to install the anti-virus. Follow activation instructions. 5) Transfer the flash drive from the uninfected computer to the infected computer. 6) Double-click the antivirus software EXE file on the thumb drive. 7) Click on “Scan Now” to run a complete scan on the infected computer for malware. If no other method of downloading and installing an anti-malware program works, then you’ve no other choice than to hit the final resort: a full Windows reinstallation, which can get rid of that nasty virus and help you regain internet access. If you’re unsure which method to use, simply contact our toll-free number 1-844-377-4107 to speak to our technical team. Our experts will take you step-by-step through the malware removal process on the phone and also restore your computer remotely.

SafeBytes Anti-Malware: Lightweight Malware Protection for Windows PC

If you’re looking to download an anti-malware application for your computer, there are numerous tools out there to consider nonetheless, you just cannot trust blindly anyone, irrespective of whether it is paid or free software. Some of them are excellent, some are ok types, and some will harm your PC themselves! You need to choose one that is dependable, practical, and has a strong reputation for its malware source protection. On the list of recommended software programs is SafeBytes Anti-Malware. SafeBytes has a very good history of top-quality service, and customers are very happy with it. SafeBytes anti-malware is a very effective and easy-to-use protection tool that is made for end-users of all levels of IT literacy. With its cutting-edge technology, this application can help you get rid of multiples types of malware including computer viruses, worms, PUPs, trojans, adware, ransomware, and browser hijackers. There are numerous great features you will get with this particular security product. The following are some of the features you might like in SafeBytes. Robust Anti-malware Protection: This deep-cleaning antimalware software goes much deeper than most anti-virus tools to clean your computer system. Its critically acclaimed virus engine locates and disables hard to remove malware that conceals deep inside your computer. Real-time Active Protection: SafeBytes offers real-time active monitoring and protection from all known computer viruses and malware. This software will always keep track of your computer for any suspicious activity and updates itself regularly to keep current with the latest threats. Fast Scan: This computer software has one of the fastest and most efficient virus scanning engines in the industry. The scans are highly accurate and take a little time to complete. Internet Security: SafeBytes gives an instant safety rating on the web pages you are going to check out, automatically blocking harmful sites and making sure that you’re certain of your safety while browsing the net. Lightweight: This application is not “heavy” on the computer’s resources, so you’ll not notice any overall performance problems when SafeBytes is operating in the background. 24/7 Guidance: You can obtain high levels of support round the clock if you’re using their paid software.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove EmailAccountLogin without the use of an automated tool, it may be possible to do so by removing the program from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. You will likely also want to reset your browser. To ensure the complete removal, manually check your hard drive and registry for all of the following and remove or reset the values accordingly. Please note that this is for advanced users only and may be difficult, with incorrect file removal causing additional PC errors. In addition, some malware is capable of replicating or preventing deletion. Doing this in Safe Mode is advised.

The following files, folders, and registry entries are created or modified by EmailAccountLogin

Files: C:Program FilesEmail Account Login C:UserAppDataRoamingEmail Account Login C:ProgramDataEmail Account Login C:UsersUserAppDataLocalEmail Account Login %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677emailaccountlogin.exe %LOCALAPPDATA%MicrosoftInternet ExplorerRecoveryHighActiveRecoveryStore.E2864823-7CB8-11E7-989D-0A00278A626A.dat %LOCALAPPDATA%MicrosoftInternet ExplorerRecoveryHighActiveE2864824-7CB8-11E7-989D-0A00278A626A.dat %LOCALAPPDATA%MicrosoftInternet Explorerframeiconcache.dat %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677Commondbg.js %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677Commonimggreen-btn.png %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677Commonimggrey-btn.png %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677Commonjquery.min.js %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677Commonjson3.min.js %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677Commonstats.js %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677Finish.zip %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677Finishindex.html %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677Finishscript.js %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677Finishstyles.css %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677IES.zip %TEMP%CF49E01A-6F41-4B56-9743-DBC375176677IESie.png Registry: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWpm HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settingsrandom HKEY_LOCAL_MachineSoftwareClasses[adware name] HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun .exe HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings CertificateRevocation = 0 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionrunrandom HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain Default_Page_URL
Read More
15 Deep WEB sites you need to visit
Deep WEBA not long time ago we had an article about the deep WEB and dark WEB here on errortools.com explaining its origins and its purpose. The article can be found here if you are interested: https://errortools.com/windows/what-is-deep-and-dark-web/ Now at this point in time, we want to present you with 15 great Deep WEB sites that could offer you some information not found anywhere else, that could offer you some privacy, or simply to have some fun and safely explore how it is like to be part of deep WEB. Take notice that for successful visiting of given sites you will need to have installed TOR browser. More about Tor browser itself can be found here: https://errortools.com/blog/software-review-series-tor-browser/ and its official website for download here: https://www.torproject.org/download/ Make sure that you copy the onion link and paste it into your TOR browser in order to access the site. That being said, let’s begin.

Mail2Tor

http://mail2tor2zyjdctd.onion/ If you want secure and private ways of sending your emails then look no further. Mail2Tor uses a webmail client and encrypts each email received or sent, combine that for not storing IP addresses and you have a private and safe environment for your emails.

The Hidden Wiki

http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/index.php/Main_Page The Hidden Wiki is the go-to site if you want to explore more of deep WEB since it is the site of collected .onion sites. Think of it as a registry of onion sites that want to be accessed publicly but offer anonymity.

TorLinks

http://torlinksd6pdnihy.onion/ TorLinks is another site focusing on .onion site listings. Site themselves are divided into categories and are easy to find. Take note that .onion sites come and go so make sure to visit frequently both The Hidden Wiki and TorLinks in order to be updated.

Torch Search Engine

ttp://xmh57jrzrnw6insl.onion/ Torch is the oldest and most well-known search engine for dark web links, with its database of over a million .onion websites there is a chance that you will find what you are looking for on it.

DuckDuckGo

http://3g2upl4pq6kufc4m.onion/ Integrated into TOR itself as a default search engine DucDuckGo has proven itself to be a great competitor and challenger to Google. But unlike Google, DuckDuckGo will not track you nor store your search activities making it a great general private search engine.

Facebook

https://www.facebookwkhpilnemxj7asaniu7vnjjbiltxjqhye3mhbshg7kx5tfyd.onion/ Yup, Facebook has its own .onion version of its popular platform. Now since Facebook itself is a social media platform anonymity is out of the question but with .onion routing, you can have and maintain a Facebook account from locations where you normally could not like in some countries where Facebook.com is banned.

Galaxy3

http://galaxy3bhpzxecbywoa2j4tg43muepnhfalars4cce3fcx46qlc6t3id.onion/ Galaxy3 is also a social platform, the site is mostly populated with code experts and other individuals posting all kinds of stuff.

The Dark Lair

http://vrimutd6so6a565x.onion/index.php/Board Dark Lair was the first image exchange website that evolved into a social network. One difference from the other two mentioned is that you can engage in the website without registration as an anonymous user.

Pro Publica

https://www.propub3r6espa33w.onion/ The aim of the five-time Pulitzer Prize winner ProPublica is “To expose abuses of power and betrayals of the public trust by government, business, and other institutions, using the moral force of investigative journalism to spur reform through the sustained spotlighting of wrongdoing.” It’s the first major online publication to have a .onion address. The non-profit newsroom is funded by organizations such as the Sandler Foundation and has made countless contributions to the fight for free speech and privacy.

Soylent News

http://7rmath4ro2of2a42.onion/ Soylent news is an onion site that well brings news. The difference from other sites of the same content is that Soylent news is community moderated without any big names involved so it is authentic in its content.

CIA

ttp://ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion/ Tor’s history is an unlikely tale. It was created by the U.S Navy with the purpose of helping informants in foreign nations to communicate safely over the Internet. The Central Intelligence Agency (CIA), in that spirit, released a .onion site so that people from across the globe can browse their resources securely and anonymously.

Secure drop

https://secrdrop5wyphb5x.onion/ Secure drop is a platform for changing leaked information and for journalists to communicate with their leads in private. It is used by Washington Post, Pro Publica, and The Guardian.

Hidden Answers

http://answerszuvs3gg2l64e6hmnryudl5zgrmwm3vh65hzszdghblddvfiqd.onion/ Hidden Answers is Reddit or Quora of the dark web but as in the spirit of the dark web, all discussed topics and stories are in total anonymity.

SCI-HUB

http://scihub22266oqcxt.onion/ With over 50 million research papers in the domain of science shared freely, Sci-Hub eliminates all barriers of free knowledge and offers a unique approach to education and scientific information.

Smartmixer.IO

http://smrtmxdxognxhv64.onion/ Smartmixer is a bitcoin mixer. The service scrambles your bitcoin with other users making your purchases completely anonymous. And that's it. 15 dark WEB onion sites you need to visit. I hope that you enjoyed the list and found something useful in it. Also, note that onion links can change overnight so if any of provided links do not work just go to DuckDuckGo and search for the site with the onion at the end.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status