Enable or Disable Automatic Encryption

You might be familiar with the Encryption File System or EFS algorithm if you rather keep your files and folders encrypted. Encryption File System is a built-in feature in Windows 10 which allows users to secure their important files. Although there is an alternative way for you to secure your data on your Windows 10 computer, you can’t ignore the fact that the main advantage of an Encryption File System over BitLocker is that the former can help you encrypt a particular folder rather than encrypting the whole hard drive partition.

If you move a file inside a folder encrypted with the Encrypting File System it will automatically get encrypted. There are some users who like this feature but unsurprisingly, there are some that don’t. So if whether you want your files encrypted when you place them in an encrypted folder or if you want to keep it as it is, read on as to how you can do it either way. You can enable or disable automatic encryption of files moved to encrypted folders in Windows 10 using the Registry Editor or the Group Policy Editor.

Before you proceed, make sure to create a System Restore Point first because the modifications you’re about to make in your computer might affect its overall functioning so if anything goes wrong, you can always undo the changes. Once you have that covered, refer to the options given below to enable or disable automatic encryption in Windows 10.

Option 1 – Enable or disable automatic encryption using Registry Editor

  • Press the Win key + R key at the same time to open the Run dialog box.
  • Then type “Regedit” in the field and press Enter to open the Registry Editor and if a User Account Control or UAC prompt appears, just click Yes to proceed.
  • After opening the Registry Editor, navigate to this key location: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorer
  • Next, right-click on Explorer and select New > DWORD (32-bit) Value and then name the newly create DWORD to “NoEncryptOnMove” and press Enter to save it.
  • After that, double click on the NoEncryptOnMove DWORD and set its value to the following preferences:
    • 1 – Disable Auto Encryption of files moved to encrypted folders.
    • 0 – Enable Auto Encryption of files moved to encrypted folders.
  • Now close the Registry Editor and restart your computer to successfully apply the changes made.

Option 2 – Enable or disable automatic encryption using the Group Policy Editor

  • Press the Win + R keys to open the Run box and type “gpedit.msc” in the field and press Enter to open the Group Policy Editor.
  • After that, navigate to this path: Computer ConfigurationAdministrative TemplatesSystem
  • Next, look for the “Do not automatically encrypt files moved to encrypted folders” option and double click on it to set the policy. From there, you will see the following description:

“This policy setting prevents File Explorer from encrypting files that are moved to an encrypted folder. If you enable this policy setting, File Explorer will not automatically encrypt files that are moved to an encrypted folder. If you disable or do not configure this policy setting, File Explorer automatically encrypts files that are moved to an encrypted folder. This setting applies only to files moved within a volume. When files are moved to other volumes, or if you create a new file in an encrypted folder, File Explorer encrypts those files automatically.”

  • Now select one of the radio buttons below depending on your preference:
    • Not Configured or Disabled: Enable Auto Encrypt of files moved to EFS Encrypted folders.
    • Enabled: Disable Auto Encrypt of files moved to EFS Encrypted folders.
  • Then click on the Apply and OK buttons to save the changes made.
  • Exit the Group Policy Editor and restart your computer.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Fix Windows Update Error 0x8007001E
This post will provide you a couple of fixes you can try to resolve the Windows Update Error 0x8007001E in Windows 10. So if you are one of the users who encountered this particular Windows Update error then you’ve come to the right place. The error code in this error message also happens to be linked to some random BSOD crashes. The error code 0x8007001E is related to a storage space error or out-of-memory-type error. On the other hand, there are also instances when this error has nothing to do with your computer’s space or shortage of memory – it could be that there are broken software components or corrupted system files that are causing this error. Whichever your case is, refer to the options given below to fix the Windows Update Error 0x8007001E.

Option 1 – Run the Windows Update Troubleshooter

Running the built-in Windows Update troubleshooter is one of the things you can first check out as it is known to automatically resolve any Windows Update errors like Error 0x8007001E. To run it, go to Settings and then select Troubleshoot from the options. From there, click on Windows Update and then click the “Run the troubleshooter” button. After that, follow the next on-screen instructions and you should be good to go.

Option 2 – Free up some space on your drive

As mentioned, storage space error or out-of-memory-type error might have something to do with this problem so you need to free up some space on your drive. Make sure that you have enough space on your drive (15GB or so should do) and then restart your computer. After your computer reboots, ensure that all the major RAM hoggers are closed before you try to install the update or upgrade again.

Option 3 – Run the SFC scan

The SFC or System File Checker scan could detect and automatically repair damaged system files that could be causing the Windows Update Error 0x8007001E to appear. SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files with good system files. To run the SFC command, follow the steps given below.
  • Tap Win + R to launch Run.
  • Type in cmd in the field and tap Enter.
  • After opening Command Prompt, type in sfc /scannow and hit Enter.
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.

Option 4 – Run the DISM tool

Running the DISM Tool helps in repairing the Windows System Image as well as the Windows Component Store in Windows 10 which might be the reason behind the Windows Update error 0x8007001E. Using this built-in tool, you have various options such as the “/ScanHealth”, “/CheckHealth”, and “/RestoreHealth”.
  • Open the Command Prompt as admin.
  • Then type in this command: exe /Online /Cleanup-image /Restorehealth
  • Do not close the window if the process takes a while as it will probably take a few minutes to finish.
  • Once it’s done, restart your computer and then check if the issue is resolved or not on the next startup.

Option 5 – Perform a System Restore

You can also try to perform a System Restore as it can also help you fix the Windows Update error 0x8007001E. You can do this option either by booting into Safe Mode or in System Restore. If you are already in the Advanced Startup Options, just directly select System Restore and proceed with the next steps. And if you have just booted your PC into Safe Mode, refer to the steps below.
  • Tap the Win + R keys to open the Run dialog box.
  • After that, type in “sysdm.cpl” in the field and tap Enter.
  • Next, go to the System Protection tab then click the System Restore button. This will open a new window where you have to select your preferred System Restore point.
  • After that, follow the on-screen instructions to finish the process and then restart your computer and check if the problem is fixed or not.

Option 6 – Try running Microsoft’s online troubleshooter

You also have the option to run Microsoft’s online troubleshooter which could help you fix Windows Update errors including the Windows Update error 0x8007001E.
Read More
10 Worst Computer Viruses in history
Computers viruses, worms, ransomware, etc. are kinds of malicious software that no user should take lightly. On several occasions, we have touched upon security steps that each user should take in order to protect its identity and data. Sadly sometimes even when all precautions are taken some malware can still slip through and wreak havoc. Today we are looking at some of the worst or the best, depending on your view that has indeed wreaked plenty of havoc.

viruses10 worst computer viruses in history

In the list of the 10 most famous computer viruses below, we show the costs, dates, reach, and other key facts. First a note about terms: we use the words “virus” and “worm” interchangeably because most readers search for them that way. But there’s a subtle difference that we explain after the list.

1. Mydoom – $38 billion

The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent. Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server. Mydoom is still around today, generating 1% of all phishing emails. That’s no small feat considering the 3.4 billion phishing emails sent each day. By that figure, Mydoom has taken on a life of its own, infecting enough poorly-protected machines to send 1.2 billion copies of itself per year, 16 years after its creation. Though a $250,000 reward was offered, the developer of this dangerous computer worm was never caught. Wondering what makes the world’s most secure computers so safe? See the Tech@Work guide: Upgrade to the World's Most Secure and Manageable PC

2. Sobig – $30 billion

The 2003 Sobig computer virus is actually another worm. It is second only to the Mydoom virus in its scope. The $30 billion figure is a worldwide total, including Canada, the U.K., the U.S., mainland Europe, and Asia. Several versions of the worm were released in quick succession, named Sobig.A through Sobig.F, with Sobig.F being the most damaging. This cybercriminal program masqueraded as legitimate computer software attached to emails. It disrupted ticketing at Air Canada and interfered with countless other businesses. Despite its widespread damage, the creator of the successful bug was never caught.

3. Klez – $19.8 billion

Klez is a close third on the list of the worst computer viruses ever created. With nearly $20 billion in estimated damages, it infected about 7.2% of all computers in 2001, or 7 million PCs. The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses. As with other viruses and worms, Klez was released in several variants. It infected files, copied itself, and spread throughout each victim’s network. It hung around for years, with each version more destructive than the last. Windows has come a long way since most of the computer viruses on this list hit the web. Thankfully, built-in protection with Microsoft Defender is always on the watch.

4. ILOVEYOU – $15 billion

The year 2000’s ILOVEYOU virus worked by sending a bogus “love letter” that looked like a harmless text file. Like Mydoom, this attacker sent copies of itself to every email address in the infected machine’s contact list. Shortly after its May 4 release, it had spread to more than 10 million PCs. The virus was created by a college student in the Philippines named Onel de Guzman. Lacking funds, he wrote the virus to steal passwords so he could log into online services he wanted to use for free. He reportedly had no idea how far his creation would spread. This virus is also known as Loveletter. Need to up your remote work security game before there’s another entry on the list of most deadly computer viruses? See our guide: How to Work Remotely and Securely

5. WannaCry – $4 billion

The 2017 WannaCry computer virus is ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. The WannaCry ransomware ripped through computers in 150 countries, causing massive productivity losses as businesses, hospitals, and government organizations that didn’t pay were forced to rebuild systems from scratch. The malware raged like wildfire through 200,000 computers worldwide. It stopped when a 22-year-old security researcher in the U.K. found a way to turn it off. Computers with out-of-date operating systems were hit especially hard. That’s why security experts always recommend updating your systems frequently.

Ransomware strikes again

In September 2020, one of the potentially largest computer virus attacks in medical history hit Universal Health Services. The U.S. hospital chain, which has more than 400 locations, was reportedly struck by damaging ransomware. The attack forced the cancellation of surgeries and made healthcare workers switch to paper records.

6. Zeus – $3 billion

The Zeus computer virus is an online theft tool that hit the web in 2007. A whitepaper by Unisys three years later estimated that it was behind 44% of all banking malware attacks. By then, it had breached 88% of all Fortune 500 companies, 2,500 organizations total, and 76,000 computers in 196 countries. The Zeus botnet was a group of programs that worked together to take over machines for a remote “bot master.” It originated in Eastern Europe and was used to transfer money to secret bank accounts. More than 100 members of the crime ring behind the virus, mostly in the U.S., were arrested in 2010. It’s not as prominent today, but some of the virus’ source code lives on in newer botnet viruses and worms. Zeus caused documented damage of $100 million. But the real cost in terms of lost productivity, removal, and undocumented theft is undoubtedly much higher. A $3 billion estimate, adjusted for inflation, puts this virus at a cost of $3.7 billion in today’s dollars.

7. Code Red – $2.4 billion

First observed in 2001, the Code Red computer virus was yet another worm that penetrated 975,000 hosts. It displayed the words “Hacked by Chinese!” across infected web pages, and it ran entirely in each machine’s memory. In most cases it left no trace in hard drives or other storage. Financial costs are pegged at $2.4 billion. The virus attacked websites of infected computers and delivered a distributed denial of service (DDoS) attack on the U.S. White House’s website, www.whitehouse.gov. In fact, the White House had to change its IP address to defend against Cod Red. Can your printer get a virus? See our cool infographic: The State of Printer Security

8. Slammer – $1.2 billion

The SQL Slammer worm cost an estimated $750 million across 200,000 computer users in 2003. This computer virus randomly selected IP addresses, exploiting vulnerabilities and sending itself on to other machines. It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic. The Slammer worm hit banks in the U.S. and Canada especially hard, taking ATMs offline in many locations. Customers of Toronto’s Imperial Bank of Commerce found themselves unable to access funds. The attack reared its ugly head again in 2016, launching from IP addresses in Ukraine, China, and Mexico.

9. CryptoLocker – $665 million

Thankfully, ransomware attacks like the 2013 CryptoLocker virus have dipped since their 2017 peak. This malware attacked upwards of 250,000 machines by encrypting their files. It displayed a red ransom note informing users that “your important files encryption produced on this computer.” A payment window accompanied the note. The virus’ creators used a worm called the Gameover Zeus botnet to make and send copies of the CryptoLocker virus. According to a report by security firm Sophos, the average ransomware attack costs a business $133,000. If we estimate that CryptoLocker hit 5,000 companies, that would put its total cost at $665 million. Where will cybersecurity go next? See our guide: The Future of Cybersecurity

10. Sasser – $500 million

The Sasser worm was written by a 17-year-old German computer science student named Sven Jaschan. He was arrested at the age of 18 in 2004 after a $250,000 bounty was posted for the computer virus’ creator. A friend of Jaschan’s tipped authorities that the youth had penned not only the Sasser worm but also the damaging Netsky.AC attack. Jaschan was given a suspended sentence after it was found he was a minor when he wrote the malware. The Sasser worm crashed millions of PCs, and though some reports put damages at $18 billion, the relatively low infection rate suggests a more likely cost of $500 million. Other notable viruses The top 10 worst computer viruses above are just the ugly tip of a gargantuan digital iceberg. With a million new malware programs popping up every 3 years, we may miss the forest for a few outstanding trees. Here are just a few more viruses that have wreaked havoc over the years: Mimail: This worm tried to harvest data from infected machines to launch a string of DDoS attacks, but was relatively easy to remove. Yaha: Yet another worm with several variants, thought to be the result of a cyber-war between Pakistan and India. Swen: Written in C++, the Swen computer worm disguised itself to look like a 2003 OS update. Its financial cost has been pegged at $10.4 billion, but not reliably. Storm Worm: This worm showed up in 2007 and attacked millions of computers with an email about approaching bad weather. Tanatos/Bugbear: A 2002 keylogger virus that targeted financial institutions and spread to 150 countries. Sircam: A computer worm from 2001 that used counterfeit emails with the subject line, “I send you this file in order to have your advice.” Explorezip: This worm used fake emails to spread to every machine on thousands of local networks. Melissa: The most dangerous computer virus in 1999, Melissa sent copies of itself that looked like NSFW pics. The U.S. FBI estimated cleanup and repair costs at $80 million. Flashback: A Mac-only virus, Flashback infected over 600,000 Macs in 2012 and even infected Apple’s home base in Cupertino, Calif. In 2020, there’s now more malware on Macs than on PCs. Conficker: This 2009 virus still infects many legacy systems and could do significant damage if it ever activates. Stuxnet: This worm is reported to have destroyed Iranian nuclear centrifuges by sending damaging instructions.
Read More
How to Remove FileShareFanatic

FileShareFanatic is a browser extension developed by Mindspark Inc. This extension offers users the ability to quickly access some of the most popular file-sharing websites. While this may sound tempting and useful at start, using this extension might prove more annoying then useful.

When installed FileShareFanatic hijacks your new tab page changing your default search engine to search.myway.com. Additionally it monitors user activity, recording visited websites, clicked links, viewed products, and whatever other information that can be used by the Ad network to display targeted Ads.

While browsing the internet with this extension you will notice an increase of ads on pages, especially in search results. This extension injects additional ads, sponsored links, and even displays pop-up ads in order to gain revenue.

FileShareFanatic has been marked as a Browser Hijacker by several top anti-virus scanners, and is scheduled for deletion.

About Browser Hijackers

Browser hijacking is considered the web’s constant danger that targets browsers. It is a kind of malicious software that modifies your internet browser’s configuration settings so that you are redirected to websites or pages that you had no intention of visiting. Browser hijackers can do more than simply modifying homepages. It redirects you to the sponsored sites and inserts advertisements on your browser which helps its developer generate earnings. It might appear naive, but most of these websites are not legitimate and will pose a major risk to your online safety. Browser hijackers can even let other vicious programs without your knowledge to further damage your PC.

Symptoms of browser hijack

There are numerous symptoms of browser hijacking: 1. you see unauthorized modifications to your internet browser’s homepage 2. you get re-directed to internet sites you never meant to visit 3. default online search engine is modified 4. discover new toolbars which you did not add 5. you observe lots of pop-ups on your screen 6. your web browser gets slow, buggy, and crashes frequently 7. Inability to navigate to certain sites, especially anti-malware as well as other security software webpages.

How they infect computers

Browser hijackers attack computers via malicious email attachments, downloaded infected documents, or by visiting infected internet sites. Many internet browser hijackings originate from add-on software, i.e., browser helper objects (BHO), toolbars, or extensions added to browsers to give them extra features. A browser hijacker could also be installed as a part of freeware, demoware, shareware and pirated programs. Browser hijackers can interrupt the user’s web browsing experience significantly, track the websites visited by users and steal sensitive information, cause difficulty in connecting to the internet, and eventually create stability problems, making software programs and computer to crash.

Removal

The one thing you can try to get rid of a browser hijacker is to find the malware within the “Add or Remove Programs” list in the Microsoft Windows Control Panel. It may or may not be there. If it is, try to uninstall it. But, most hijacking codes aren’t very easy to eliminate manually, as they go deeper into your operating system. Besides, browser hijackers could modify the Computer registry so that it could be very hard to repair manually, especially when you’re not a very tech-savvy individual. You can choose automatic browser hijacker removal by just installing and running reliable anti-malware software. If you need to get rid of persistent browser hijackers effectively, install the top-rated Anti-Malware software Safebytes Anti-Malware.

Find Out How To Install Safebytes Anti-Malware On An Infected PC

Malware can cause a lot of damage to your PC. Some malware types alter internet browser settings by including a proxy server or change the PC’s DNS configuration settings. When this happens, you’ll be unable to visit certain or all of the sites, and thus unable to download or install the required security software to remove the infection. If you are reading this, you may have infected by a virus that prevents you from downloading a security program such as Safebytes Antimalware on your PC. There are some actions you can take to circumvent this issue.

Download the application in Safe Mode with Networking

If the virus is set to load immediately when Microsoft Windows starts, entering Safe Mode could very well block the attempt. Since only the bare minimum programs and services launch in safe mode, there are hardly any reasons for conflicts to occur. To start your Windows XP, Vista or 7 computer in Safe Mode with Networking, please do as instructed below. 1) At power on, hit the F8 key before the Windows splash screen starts to load. This will bring up the Advanced Boot Options menu. 2) Choose Safe Mode with Networking with arrow keys and hit ENTER. 3) Once this mode loads, you will have the internet. Now, utilize your browser to download and install Safebytes Anti-malware. 4) As soon as the application is installed, allow the scan run to eliminate viruses and other malware automatically.

Switch to an alternate internet browser

Web-based viruses can be environment-specific, aiming for a particular web browser or attacking specific versions of the browser. The best solution to avoid this problem is to opt for a browser that is known for their security measures. Firefox comprises built-in Phishing and Malware Protection to keep you safe online.

Run antivirus from a USB drive

Another option is to make a portable antivirus program onto your USB thumb drive. To run antivirus from a thumb drive, follow these simple steps: 1) Download Safebytes Anti-Malware or Microsoft Windows Defender Offline onto a clean computer system. 2) Plug the Thumb drive into the uninfected computer. 3) Double-click the Setup icon of the anti-malware software to run the Installation Wizard. 4) Select the drive letter of the USB drive as the place when the wizard asks you exactly where you would like to install the anti-virus. Follow the directions to finish the installation process. 5) Unplug the pen drive. Now you can utilize this portable antivirus on the affected computer. 6) Double-click the anti-malware program EXE file on the thumb drive. 7) Simply click “Scan Now” to run a complete scan on the infected computer for malware.

SafeBytes Anti-Malware Features

To protect your personal computer from many different internet-based threats, it’s important to install an anti-malware application on your computer system. However, with countless numbers of anti-malware companies in the marketplace, nowadays it is challenging to decide which one you should purchase for your PC. Some are good ones, some are decent, and some are simply just fake anti-malware applications that could harm your personal computer themselves! You should choose one that is trustworthy, practical and has a strong reputation for its malware source protection. On the list of strongly recommended software by industry analysts is SafeBytes Anti-Malware, the most dependable program for Windows computers. SafeBytes anti-malware is a powerful, very effective protection application made to help users of all levels of computer literacy in finding and eliminating malicious threats from their computer. Once you’ve installed this program, SafeBytes state-of-the-art protection system will ensure that absolutely no viruses or malware can seep through your PC.

SafeBytes anti-malware takes PC protection to a totally new level with its enhanced features. These are some of the highlighted features included in the software.

World-class AntiMalware Protection: Built on a greatly acclaimed anti-virus engine, this malware removal tool can identify and get rid of several obstinate malware threats such as browser hijackers, potentially unwanted programs, and ransomware that other typical antivirus programs will miss. Real-time Threat Response: Malware programs attempting to get into the computer are discovered and stopped as and when detected by the SafeBytes active protection shields. It’ll examine your PC for suspicious activity at all times and its unrivaled firewall protects your computer from unauthorized access by the outside world. Safe Browsing: Safebytes assigns all sites a unique safety ranking that helps you to get an idea of whether the webpage you’re just about to visit is safe to browse or known to be a phishing site. Lowest Memory/CPU Usage: SafeBytes is a lightweight tool. It consumes a really small amount of processing power as it operates in the background therefore you will not see any computer performance difficulties. 24/7 Guidance: SafeBytes provides 24/7 technical support, automatic maintenance and updates for best user experience. All in all, SafeBytes Anti-Malware is a solid program as it has lots of features and could identify and remove any potential threats. Once you have downloaded and installed this software, you no longer need to worry about malware or any other security worries. So if you’re searching for the best anti-malware subscription for your Windows-based computer, we recommend SafeBytes Anti-Malware tool.

Technical Details and Manual Removal (Advanced Users)

If you wish to carry out the removal of FileShareFanatic manually instead of using an automated software tool, you may follow these measures: Proceed to the Windows Control Panel, click the “Add or Remove Programs” and there, choose the offending application to uninstall. In cases of suspicious versions of web browser plug-ins, you can easily get rid of it via your web browser’s extension manager. You’ll probably also want to reset your browser. To be certain of complete removal, find the following registry entries on your computer and remove it or reset the values appropriately. Having said that, editing the registry can be a complicated job that only advanced users and professionals should try to fix it. Furthermore, some malware is capable of replicating or preventing removal. It is advisable that you carry out the removal process in Windows Safe Mode.
Files: %UserProfile%\Local Settings\Application Data\FileShareFanaticTooltab %LOCALAPPDATA%\FileShareFanaticTooltab Registry: HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Approved Extensions, value: FB8C7587-6C03-425D-821D-65339B3E249E HKEY_CURRENT_USER\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\FB8C7587-6C03-425D-821D-65339B3E249E HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\FB8C7587-6C03-425D-821D-65339B3E249E HKEY_CURRENT_USER\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\EA89EC10-2255-42A6-9AA7-84B4441C2DCA HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\EA89EC10-2255-42A6-9AA7-84B4441C2DCA HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\FB8C7587-6C03-425D-821D-65339B3E249E HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\EA89EC10-2255-42A6-9AA7-84B4441C2DCA HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\6E4DF5E6-A1D8-48E0-BA5A-91C5DBD6AAF1 HKEY_CURRENT_USER\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\BDF4A303-E4F0-42F0-B235-351F6C8F6C1A HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\BDF4A303-E4F0-42F0-B235-351F6C8F6C1A HKEY_CURRENT_USER\SOFTWARE\Wow6432Node\Microsoft\Tracing\FileShareFanatic_RASMANCS HKEY_CURRENT_USER\SOFTWARE\Microsoft\Tracing\FileShareFanatic_RASMANCS HKEY_CURRENT_USER\SOFTWARE\Wow6432Node\Microsoft\Tracing\FileShareFanatic_RASAPI32 HKEY_CURRENT_USER\SOFTWARE\Microsoft\Tracing\FileShareFanatic_RASAPI32 HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\filesharefanatic.dl.myway.com HKEY_LOCAL_MACHINE\Software\FileShareFanatic
Read More
Fixing “The .NET Framework 4.7 is not supported on this operating system” Error in Windows 10
In case you don’t know, the .Net Framework is a programming infrastructure introduced by Microsoft. You will need it to run on lots of services and applications. Note that most of the applications that require the .Net Framework are packed with their installation files which is why it will be installed automatically on your computer when you install an application. However, there are instances when you’ll get an error message saying, “The .NET Framework 4.7 is not supported on this operating system” while trying to install the .NET Framework as a standalone service. The very reason why this error message appears is stated in the error message itself. Although the .Net Framework is supported on Windows 10, it is not actually compatible with some other Windows 10 versions. So it is most likely that you are seeing this error message because the .Net Framework in your computer is not compatible with the Windows 10 version you are running. Since that’s the case, you need to update Windows 10 to fix the problem. Updating your Windows 10 computer is the only solution you can try to fix this problem. Thus, it is advised that you check for Windows Updates even if you are now using the latest version of Windows 10. And since the issue is caused by an incompatible operating system version, once you install the exact version of Windows 10 required by the .Net Framework, the problem will be fixed. Simply follow the steps given below to do so.
  • Step 1: Tap the Win + R keys to open the Run dialog box.
  • Step 2: After that, type in “winver” in the field and tap Enter.
  • Step 3: Next, your Windows 10 version should be given in the new window that appears. Take note that the number after the Version which is in the second line is your version number of Windows 10. And that the number must be 1507 or 1709. The first two digits in these numbers are the year while the second two represent the month when the update was released. So if you are running a 1709 version, this means that the Windows 10 version you are using was released in September 2017.
  • Step 4: The next thing you have to do is to make sure that you have the Windows 10 version that’s compatible with the .Net Framework. To verify, you need to click here and click on the System Requirements.
After opening the link, take a look at the Supported Operating System section where it says, “Windows 10 Anniversary Update” and “Windows 10 Creators Update”. Since there are users who are not familiar with the version numbers related to both the Anniversary and Creators updates, refer to the list given below.
  • November Update (1511)
  • Anniversary Update (14393)
  • Creators Update (1703)
  • Fall Creators Update (1709)
  • Spring Creators Update (1803)
As you can see, the Creators Update has version 1703 while the Anniversary Update has version number 14393 so if you are using a version lower than the 14393 version then it’s no wonder you aren’t able to install the .Net Framework 4.7 on your Windows 10 PC. Now all that’s left to do is to update your Windows 10 version and make sure that you will be updating it to the latest version available and then try installing the .Net Framework again.
Read More
Fixing netio.sys Blue Screen error in Windows
One of the most important components of a computer in the network. The network, with the help of network devices, makes it possible for all kinds of devices to exchange information. One of the files associated with the network driver is the netio.sys file. It is a system file used by third-party programs to interact with the devices on the network. If you encounter a Blue Screen of Death error that’s related to the netio.sys file then you’ve come to the right place as this post will guide you in fixing it. Here are some of the Blue Screen errors related to the netio.sys file:
  • KMODE EXCEPTION NOT HANDLED
  • PAGE FAULT IN A NONPAGED AREA
  • IRQL NOT LESS EQUAL
  • SYSTEM_SERVICE_EXCEPTION
  • DRIVER IRQL NOT LESS OR EQUAL
  • SYSTEM THREAD EXCEPTION NOT HANDLED
To fix the netio.sys Blue Screen errors on your Windows 10 computer, you can check out each one of the following suggestions.

Option 1 – Try to use the System File Checker

One of the built-in tools in Windows that you can use to fix Blue Screen errors is the System File Checker. This built-in command utility can help you restore corrupted or missing files as well as replace bad and corrupted system files. Chances are, the netio.sys file might be corrupted so to fix it, use System File Checker.
  • First, right-click on the Start button and click on the “Command Prompt (Admin) option.
  • Next, type in the sfc /scannow command and hit Enter to execute it.
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.
  • Finally, restart your computer.

Option 2 – Try checking the Memory for any errors

The first thing you can do to check the memory for errors is to run the CHKDSK utility. The CHKDSK utility repairs hard drive errors that might be causing the problem.
  • You need to open “This PC” first.
  • And then right-click on your operating system partition for Windows.
  • Next, click on Properties and navigate to the Tools tab.
  • After that, click on the Check button under the Error Checking section.
  • A new mini window will appear and from there, click on Scan drive.
  • Now let it scan your disk drive partition to check for errors and then restart your computer.
After running the CHKDSK utility, it’s now time to fix issues with your RAM by running the Memory Diagnostic tool. This tool in windows can help resolve the Blue Screen errors related to the netio.sys file by checking and automatically fixing any memory-based issues. To run it, refer to these steps:
  • Tap the Win + R keys to open Run and type mdsched.exe and hit Enter to open the Windows Memory Diagnostic Tool.
  • After that, it will give two options such as:
    • Restart now and check for problems (Recommended)
    • Check for problems the next time I start my computer
  • Once your computer has restarted, perform a basic scan or you could also go for the “Advanced” options such as “Test mix” or “Pass count”. Simply tap the F10 key to start the test.
Note: After you select your preferred option, your computer will restart and check for memory-based issues. If it finds any issues, it will automatically fix them and if there’s no issue found, then it’s most likely not a memory-based issue so you should try the other options given below.

Option 3 – Try to update or rollback or disable Network drivers

You might also want to update, roll back or disable your Network drivers to resolve the netio.sys Blue Screen errors.
  • Tap the Win + R keys to launch the Run window and then type in the “mdsched.msc” command and hit Enter to open the Device Manager window.
  • Under the Device Manager, you will see a list of drivers. From there, look for the Network Adapters and expand it.
  • Then right-click on each one of the Network drivers and depending on your preference, you can either select “Update driver”, “Disable device” or “Uninstall device”.
  • After that, restart your PC and see if it helped in fixing the netio.sys Blue Screen error.

Option 4 – Perform System Restore

Performing System Restore can also help fix BSOD errors, including the ones related to the netio.sys file. To run System Restore, follow the steps below.
  • First, tap the Win + R keys to open the Run dialog box.
  • After that, type in “sysdm.cpl” in the field and tap Enter.
  • Next, go to the System Protection tab then click the System Restore button. This will open a new window where you have to select your preferred System Restore point.
  • After that, follow the on-screen instructions to finish the process and then restart your computer and check if the problem is fixed or not.

Option 5 – Run the Blue Screen Troubleshooter

Troubleshooting Blue Screen of Death errors wouldn’t be complete without the Blue Screen troubleshooter. As you know, it is a built-in tool in Windows 10 that helps users in fixing BSOD errors like Storport.sys. It can be found on the Settings Troubleshooters page. To use it, refer to these steps:
  • Tap the Win + I keys to open the Settings panel.
  • Then go to Update & Security > Troubleshoot.
  • From there, look for the option called “Blue Screen” on your right-hand side and then click the “Run the troubleshooter” button to run the Blue Screen Troubleshooter and then follow the next on-screen options. Note that you might have to boot your PC into Safe Mode.
Read More
How to remove Aro 2012 from your Computer.

Aro2012 is a PC Optimizer Software that typically comes bundled with other software. Even though Aro2012 poses no threat itself, the programs that it comes bundled with may pose a problem to your computer.

From the Author: ARO is an advanced repair and optimization utility designed to help improve and maintain computers running the Windows operating system (both 32- and 64-bit). ARO focuses on finding errors that hide out in the Windows registry, identifying PC and web browser clutter that may be hindering PC performance, and ensuring computers have adequate security solutions installed and up to date. With its advanced scanning engine, ARO provides deep scanning capabilities to identify and repair registry errors. ARO also searches for and removes “junk” files that accumulate over time and can put a damper on PC performance.

When installed Aro2012 creates a startup entry that allows it to run each time the computer is started. It also adds a task scheduler that allows it to run at various times.

About Potentially Unwanted Applications

Have you ever found an unwanted program on your computer system and pondered how it got there since you are sure you didn’t purposefully download and never gave authorization to be installed? A PUA / PUP (potentially unwanted application / potentially unwanted program) is a piece of software that comes bundled with freeware/shareware and you agree to install on your computer. These are programs you definitely don’t want on your PC since it doesn’t give any beneficial service. The term PUP was first coined to outline this downloadable crapware as something other than malicious software. The reason is, most PUPs get into a PC not because they slip via the security holes, for instance, but because the users have installed them by themselves – 100 % unintentionally needless to say. PUPs might not be malware but nevertheless, they are dangerous programs for your laptop or computer. At best, these types of unwanted programs provide hardly any benefit, and at worst, they can be quite harmful to your computer.

What do PUPs do on your PC, precisely?

Most Potentially Unwanted Programs comes in the form of adware, which typically aims to exhibit lots of annoying pop-up ads, banners, coupons, and bargains on web pages you explore. PUPS also comes in the form of unwanted toolbars or browser plug-ins. Not only they entirely take up space on your computer screen, but toolbars could also manipulate search engine results, track your surfing activities, decrease your internet browser’s overall performance, and slow down your internet connection to a crawl. They could appear innocent but PUPs tend to be spyware. And in the large majority of the cases, end-users will not be aware that they’re installing an unwanted program. These are software programs that don’t do anything useful to you; in addition to taking up space on your hard disk drive, they will also slow down your computer, often modify settings without your permission, and the list of frustrating features goes on and on.

How can you avoid ‘crapware’

• Read the fine print so that the end-user license agreement (EULA) you’re accepting is only for the program you actually intend to download. • Always choose “Custom” or “Advanced” installation and never blindly click the Next button, which should let you uncheck any “foistware” software programs you do not want. • Have a solid anti-virus program such as Safebytes Anti-malware that can protect your computer from PUPs. As soon as you install this software, protection from malware and PUPs is already turned on. • Avoid installing a freeware application you will not use. Nowadays ‘freeware’ isn’t actually freeware – but “crapware” bundling nonsense. • Don’t download software programs from pop-ups, online advertisements, file sharing websites, as well as other unreliable sources; look out for any preset, unwanted options when downloading the program. Avoid visiting blogs and sites that support pirated programs.

What To Do When You Cannot Install Any Anti-Malware?

Practically all malware is inherently unsafe, but certain kinds of malicious software do a lot more damage to your computer than others. Some malware is designed to interfere with or prevent things that you’d like to do on your computer. It may well not permit you to download anything from the net or it will prevent you from accessing some or all of the websites, especially the antivirus sites. If you’re reading this, odds are you’re stuck with a malware infection that is preventing you to download and install the Safebytes Anti-Malware program on your computer. Although this type of issue will be harder to get around, there are some actions you can take.

Install in Safe Mode

If the malware is set to load at Windows startup, then booting in safe mode should avoid it. Only minimal required applications and services are loaded when you start your computer into Safe Mode. To launch your Windows XP, Vista, or 7 computers in Safe Mode with Networking, follow the instructions below. 1) At power-on/startup, hit the F8 key in 1-second intervals. This should bring up the Advanced Boot Options menu. 2) Use the arrow keys to select Safe Mode with Networking and hit ENTER. 3) Once this mode loads, you should have internet access. Now, get the virus removal application you need by using the internet browser. To install the program, follow the guidelines within the setup wizard. 4) Immediately after installation, do a complete scan and let the software get rid of the threats it detects.

Download the antivirus program in a different internet browser

Web-based viruses could be environment-specific, aiming for a particular internet browser or attacking specific versions of the browser. If you seem to have a trojan attached to Internet Explorer, then switch over to a different internet browser with built-in security features, such as Chrome or Firefox, to download your favorite antivirus program – Safebytes.

Install and run anti-malware from a Thumb drive

Another option is to create a portable antivirus program on your USB flash drive. Adopt these measures to use a thumb drive to clean your corrupted system. 1) Make use of another virus-free computer to download Safebytes Anti-Malware. 2) Insert the USB drive on the same computer. 3) Double-click the Setup icon of the antivirus software to run the Installation Wizard. 4) Select the USB flash drive as the destination for saving the software file. Follow the on-screen instructions to finish the installation process. 5) Now, insert the pen drive into the corrupted PC. 6) Run the Safebytes Anti-malware directly from the flash drive by double-clicking the icon. 7) Simply click “Scan Now” to run a scan on the affected computer for viruses.

SafeBytes Anti-Malware: Lightweight Malware Protection for Windows PC

Want to install the very best anti-malware software for your laptop or computer? There are plenty of applications available that come in paid and free versions for Windows systems. Some of them are excellent, some are ok types, and some will ruin your PC themselves! You need to pick out a product that has obtained a good reputation and detects not only viruses but other kinds of malware also. On the list of strongly recommended applications by industry experts is SafeBytes Anti-Malware, the most dependable program for Microsoft Windows. SafeBytes can be described as a powerful, real-time antivirus application that is designed to assist the typical computer user in protecting their computer from malicious threats. Using its outstanding protection system, this software will quickly detect and get rid of most of the security threats, including adware, viruses, browser hijackers, ransomware, trojans, worms, and PUPs. SafeBytes has got a plethora of wonderful features that can help you protect your computer from malware attacks and damage. A few of them are given as below: Active Protection: SafeBytes provides round-the-clock protection for your personal computer limiting malware attacks instantly. It’ll continuously monitor your laptop or computer for hacker activity and also gives users superior firewall protection. Most Reliable AntiMalware Protection: With a critically acclaimed malware engine, SafeBytes gives multilayered protection which is designed to catch and remove viruses and malware which are concealed deep in your computer. Extremely Speed Scanning: SafeBytes’s very fast malware scanning engine lessens scanning times and extends battery life. At the same time, it will effectively detect and remove infected computer files or any internet threat. Website Filtering: Through its unique safety ranking, SafeBytes notifies you whether a website is safe or not to access it. This will ensure that you’re always certain of your online safety when browsing the web. Minimal CPU and RAM Usage: This software is lightweight and will run quietly in the background, and will not affect your computer efficiency. Premium Support: Support service is readily available for 24 x 7 x 365 days through email and chats to answer your queries.

Technical Details and Manual Removal (Advanced Users)

To eliminate Aro 2012 manually, go to the Add or Remove programs list in the Control Panel and choose the program you want to get rid of. For web browser plug-ins, go to your web browser’s Addon/Extension manager and select the add-on you intend to disable or remove. It is also advised to reset your web browser to its default state to fix corrupt settings. To ensure complete removal, find the following registry entries on your computer and remove them or reset the values accordingly. Please keep in mind that only professional users should try to manually edit the registry because removing any single critical system file results in a serious issue or perhaps a PC crash. Additionally, some malicious programs have the capability to defend against its deletion. Completing this task in Safe Mode is advised.
Files: Search & Delete ARO2013_tbt.exe CleanSchedule.exe soref.dll AROSS.dll CheckForV4.dll aro.exe Registry: Search and delete: CURRENT_USER / AROReminder
Read More
Changing the Left & Right mouse buttons
As you know, all computer mouse devices are designed ergonomically for users who are right-handed. Although that’s mostly the case, there are also other mouse devices that are designed specifically for left-handed users or the ones that can be used by either the right or left hand. But before you look for these kinds of mouse devices, there is actually an option you can try so that your mouse device can work with either the left or right hand. All you have to do is configure your mouse device. Aside from setting the device to work on either hand, you can also switch mouse buttons, from left to right, using only a couple of simple steps. As mentioned earlier, most mouse devices are created for right-handed users. Meaning to say, these mouse devices are configured to be right-handed with their primary button on the left and the second one on the right. The primary button is used for certain functions such as selecting and dragging. Now you can configure your mouse to be left-handed by swapping its predefined functionality. How? Refer to each one of the given instructions below.

Option 1 – via Control Panel

  • First, go to the Start Menu and search for “control panel” in the Start search.
  • Once you see it from the search results, click on it to open it and then go to the Hardware and Sound section.
  • From there, click on Mouse under the Device and Printers section. This will open the window for Mouse Properties.
  • Now you have to check the Switch primary and secondary buttons box.
  • Then click on OK to save the changes made. After that, your primary select button on your mouse device is your right button while the secondary button, also known as right-click, is now the left button.

Option 2 – via Windows 10 Settings

This is the second option you can check out to change the configuration of your mouse from being right-handed to being left-handed.
  • First, right-click on the Windows icon and select Search.
  • Next, type “mouse” and from the search results that appear, click on Mouse Settings.
  • After that, select “Right” from the “Select your primary button” drop-down menu. This should set the mouse device from being right-handed to being left-handed.
Read More
Nostalgia hit: Commodore 64 emulator and games
If you are a kid or in your teenage years you maybe will be not familiar with Commodore 64 but we are welcoming you anyway to go with us on this journey through time and find out about one of the most influential and beloved home computer of all time.

commodore 64History of Commodore

Firstly shown to the world in January of 1982, at the Consumer Electronics Show, C64 caught attention right away with its low price of only $595. Although it had some issues like limited functionality in some fields and a non-wide range of use by 1984 its price dropped below $200 and it cemented itself as an affordable home computer for the middle class. In as same year Apple has released their Apple II computer with far superior capabilities, commodore 64 remains a middle-class favorite due to its price. Also, the company has decided to distribute its homemade computer via some other means including not only just electronics stores specialized in that kind of equipment but in general shops and big department stores, through toy stores and book shops as well as through specialized dealers. This has given C64 a more competitive edge and mixed with the affordable price it soon became a staple of home computing. c64 storeWith sales booming and the early reliability issues with the hardware addressed, software for the C64 began to grow in size and ambition during 1984. This growth shifted to the primary focus of most US game developers. The two holdouts were Sierra, who largely skipped over the C64 in favor of Apple and PC compatible machines, and Broderbund, who was heavily invested in educational software and developed primarily around the Apple II. In the North American market, the disk format had become nearly universal while cassette and cartridge-based software all but disappeared. So most US-developed games by this point grew large enough to require multi-loading. At a mid-1984 conference of game developers and experts at Origins Game Fair, Dan Bunten, Sid Meier, and a representative of Avalon Hill said that they were developing games for the C64 first as the most promising market. By 1985, games were an estimated 60 to 70% of Commodore 64 software. Over 35% of SSI's 1986 sales were for the C64, ten points higher than for the Apple II. Everything was great for Commodore but the industry was moving forward and by the year 1988, PC compatible computers were stated to be the largest and fastest-growing home entertainment systems pushing C64 on to second place. Also, Nintendo’s gaming system has started to take hold in the world with amazing 7 million systems sold in 1988 only. By the year 1991, many developers exited the gaming market for Commodore 64 home computer system and its popularity started to fall due to lack of software and not so many hardware changes. commodore salesCommodore announced that the C64 would be finally discontinued in 1995. However, only one month later in April 1994, the company filed for bankruptcy. When Commodore went bankrupt, all production on their inventory, including the C64, was discontinued, thus ending the C64's 11 and a half year production.

Legendary titles

The history of Commodore 64 is interesting ones and I believe that it has done much for computers in general, yes it ran 11 years and that seems like a small-time, but remember that it was 11 years of C64 alone, there were other computers released by the company but none except arguably AMIGA 500 has not reached that much popularity as Commodore 64. That being said the system has left some of the great titles in its catalog that are great to be played even today and have been classic games on other platforms, even on PC itself. That being said I am giving you the top 100 games for Commodore 64:
  1. maggotZak McKracken and the Alien Mindbenders
  2. Pirates!
  3. Maniac Mansion
  4. IK+
  5. Bubble Booble
  6. Turrican II: The Final Fight
  7. Last Ninja 2
  8. Space Rogue
  9. Ultima IV: Quest of the Avatar
  10. Archon: The Light and the Dark
  11. Turrican
  12. Wasteland
  13. Defender of the Crown
  14. Elite
  15. Ultima V: Warriors of Destiny
  16. Laser Squad
  17. Prince of Persia
  18. Impossible Mission
  19. U.L.E.
  20. Pool of Radiance
  21. Bruce Lee
  22. Paradroid
  23. Project Stealth Fighter
  24. Curse of the Azure Bonds
  25. Ultima III: Exodus
  26. Legacy of the Ancients
  27. Winter Games
  28. Leaderboard Golf
  29. Supremacy
  30. Airborne Ranger
  31. Exile
  32. Last Ninja, The
  33. World Class Leader Board
  34. MicroProse Soccer
  35. Project Firestart
  36. Boulder Dash
  37. Summer Games 2
  38. Great Giana Sisters, The
  39. Neuromancer
  40. Mad Doctor
  41. Mail Order Monsters
  42. Zork I: The Great Underground Empire
  43. Buck Rogers: Countdown to Doomsday
  44. Katakis
  45. Bard's Tale, The: Tales of the Unknown
  46. WIzball
  47. Times of Lore
  48. Emlyn Hughes International Soccer
  49. Ultimate Wizard
  50. Alternate Reality: The Dungeonalternate reality dungeon
  51. World Games
  52. Leaderboard Executive
  53. California Games
  54. Samurai Warrior: The Battles of Usagi Yojimbo
  55. Summer Games
  56. Creatures 2: Torture Trouble
  57. Gunship
  58. Space Taxi
  59. International Karate
  60. Silent Service
  61. Bard's Tale III, The: Thief of Fate
  62. Seven Cities of Gold
  63. Armalyte
  64. Raid on Bungeling Bay
  65. Alter Ego: Male Version
  66. Enforcer: Fullmetal Megablaster
  67. Detective Game, The
  68. Creatures
  69. Skate or Die!
  70. Heart of Africa
  71. E.R.O. - Helicopter Emergency Rescue Operation
  72. Way of the Exploding Fist, The
  73. Stunt Car Racer
  74. Wizard of Wor
  75. Bard's Tale II, The: The Destiny Knight
  76. Mayhem in Monsterland
  77. Train, The: Escape to Normandy
  78. Jumpman
  79. Champions of Krynnchampions of krynn
  80. Pitstop II
  81. Barry McGuigan World Championship Boxing
  82. Montezuma's Revenge
  83. Boulder Dash II: Rockford's Revenge
  84. Spy vs Spy
  85. Mercenary: Escape from Targ
  86. Midnight Resistance
  87. Lords of Midnight
  88. Lode Runner
  89. Castles of Doctor Creep, The
  90. Boulder Dash Construction Kit
  91. Buggy Boy
  92. Racing Destruction Set
  93. Dino Eggs
  94. Realm of Impossibility
  95. Rainbow Islands
  96. Beach-Head II: The Dictator Strikes Back
  97. Barbarian: The Ultimate Warrior
  98. Grand Prix Circuit
  99. Head Over Heels
  100. Sentinel, The

Commodore 64 emulator and game ROMs

Commodore 64 might be in the past but its legacy still lives on even today through emulators and ROMs for emulators. You can even purchase one in working condition if you want and relive the full experience as it once was. vice c64 emulatorIf you are not keen on spending money for reliving and checking games or software of C64 here are some links to help you to at least experience part of it completely free. Commodore 64 Emulator C64 Game ROMs

Conclusion

It is without a doubt that the C64 home system has made a great mark on home computers echoing even today and I am very grateful that I have been part of it as a kid. Sometimes today I will still spin some old classic via emulator just for nostalgia and enjoy its simplicity. Thank you for reading the article and I hope to see you soon again.
Read More
How to be a healthy PC gamer

Spending a large amount of time working or gaming in front of the computer can take a toll on your health. And as someone who indeed spends a large amount of time in front of the computer, I would like to share some insights about how can you be happy and healthy at the same time by incorporating some practices and habits.

gaming

Get good chair

This is first on the list because it matters the most. A proper sitting chair is essential for back health. If your budget allows it, do yourself a favor and get an anatomic sitting chair or gaming chair with lumbar support. It costs but it is worth it.

Learn to sit properly

As the important chair is, sitting properly is also as important as much. Your spine believe it or not is a very important part of your body and you need to take care of it. Sadly long periods of sitting sessions are bad for muscles around the spine that could reflect on the spine itself. Keep your back straight and keep your head not down nor up, place it in a position like when you are walking so the spine that is going from your head is in line with the spine on your back.

Stretch

By medical standards, each hour of sitting should be accompanied by a stretch session since sitting itself is placing too much pressure on certain muscles and blood circulation is lowered. Changing leg position and doing just a little stretch each hour can be really beneficial for your health in long run.

Take breaks

Yes, playing games is fun and most of the time we do not want to stop playing, especially if we are winning but taking breaks is essential for your personal health. Old saying goes that overdoing anything is bad and this applies true even to things that we do for pleasure and relaxation. Take periodic breaks to stretch, stand up and maybe even walk just a little.

Drink water

During long work hours or long gaming sessions, it is not uncommon that we are so focused on our activity that we forget to take our water intake. Approximately 2liters of water per day is needed for an adult person to function properly during that day and if you spend long times in front of a PC do not forget to drink water.

Do not neglect your daily tasks

As enjoyable as it is gaming can make us forget about our daily tasks, do not neglect your life and your tasks. Remember, gaming is only OK if it does not interfere with the daily things that you need to do. Do not postpone going for groceries because of gaming, do not switch shower for another level in the game. Do all of the things you must do first and then sit and game.

Take care of yourself mentally

Having mental health is as important as having a physical one. Playing games is fun, but playing games with someone is even better, do not forget to socialize and invite some friends so you can share some fun times together. Also, detach yourself from outcomes that will come because of gaming, this is very important for gamers that do a lot of PVP games and get annoyed and angry when they lose or when some other player is talking trash. Remember, gaming is for you to relax and enjoy, not to stress you.

Read More
Prevent your laptop from overheating

Long working hours on a laptop can have some issues with laptop heating and thus slowing down. Today we will take a look at how can you prevent it from heating and keep it in a normal temperature range so it lasts longer and works better.

laptop on fire

Close unnecessary programs or browser tabs

Usually, the main reason for high laptop temperature is the heavy and constant workload. Of course, the solution is very simple, turn off unnecessary browser tabs or applications running in the background, and less power will be needed for operation thus directly reducing workload and temperature.

Place it on a hard flat surface

Laptops generally have vents on the side and even under them, these vents, of course, are made so hot air is disposed of through them but if they are covered that will create issues. Placing computers on textiles, pillows, and legs can obstruct their venting holes and increase heat also since they are materials that are not taking heat away.

Your best practice should be placing the laptop onto a hard flat surface so air can flow freely and if you need to keep it in your lap there are lap desks made for this purpose.

Clean the laptop

With some good cleaning, the laptop can stop overheating, and generally, it will be cooler. Vents that has for ventilation can get clogged over large periods of time due to dust which is always present. Compressed air can be a quick easy solution to open the vents and redust it. Other methods include a compressor, vacuum, or brush in order to quickly remove any dust clogs. Taking it into service for complete redusting and paste change is also a great option.

Place it on the dedicated pad

There is some disagreement about using dedicated cooling pads for laptops, some say they are not effective at all, and some swear by them but from my experience good paired laptop and pad can indeed help with cooling it down. Usually, cooling pads will come with fans that will take away heat from the laptop itself reducing its overall heat.

Change your Windows power plan

If your laptop is constantly hot but you are not doing much with him check Windows power settings. There is a good chance it is set to run on a high-performance plan and if this is the case switch it back to a balanced power setting. Power plan like high performance will drain more power and more power will mean more heating. Of course, this will affect performance as well but for regular work that excludes some power gaming, video, and picture manipulations and other demanding tasks this power plan will work just fine.

Take control of the fans inside your laptop

Internal cooling is important and sometimes fans are not running to their full capacity so increasing their speed or changing their plan of work can cool down the computer nicely. Some laptops have fans controlling application already on them, especially gaming laptops but most of them do not. If your laptop does not have it, go to your laptop brand website and see if such an application exists for your model, if it does, download and install it but if there is no such application try general free ones like SpeedFan or Argus Monitor.

Reduce voltage of CPU and GPU

How more power means more heat, reducing the power that CPU and/or GPU take can be reduced inside BIOS by lowering voltage of these 2 components. First, go to BIOS and write down the voltage that is currently assigned to your CPU and/or GPU so you can bring it back if ever needed, also take note that reducing voltage and thus power will not affect negatively your components but increasing it thus overclocking can and will so be careful when bringing voltage back not to overdo it. You can always also reset your BIOS settings to bring them back to factory settings.

Do not use the laptop when charging it

When the laptop is placed on the charger in order to be charged and used at the same time, more power is drawn to it, and since the battery is taking electric charge instead of providing it more heat will be generated now since two different sources will be generating it, the battery itself and computer. When you really can not wait for the laptop to be charged, use it, but turn it off and wait to be fully charged if you can.

Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status