Logo

Enable or Disable Optional Windows Features

As you know, Windows operating system comes with tons of features. Some of which are not intended to be used by normal customers or users directly which means that only a small percentage of the huge user base of the operating system leverages the use of such features. However, they’ve added some major value to the feature list of the operating system. You can find these features under the “Turn Windows Features on and off” option. This indicates that if you want to, you can just type in “Turn Windows Features on and off” in the search box and then enable any feature that you want to enable. Aside from that, there are other ways you can disable or enable the optional Windows Features in your Windows 10 computer.

Option 1 – via Control Panel

  • Open Control Panel and select Uninstall a Program.
  • After that, select the “Turn Windows features On or Off” option on the left side.

Option 2 – via Command Prompt

  • Tap the Win + X combination on your keyboard or right-click on the Start button and then click on Command Prompt (Admin). Alternatively, you can also type “cmd” in the Cortana search box and right-click on the Command Prompt icon, and select the “Run as administrator” option.
  • If a User Account Control or UAC prompt appears, click on Yes.
  • Next, type in the following command to see the list of the available features.

DISM /online /get-features /format:table | more

  • Now all you have to do is copy the name of the feature that you want to enable and for you to do that, you need to execute the following command:

DISM /online /enable-feature /featurename:[Enter the name of the feature here] –All

Note: Now if you want to disable a feature that’s already enabled in your computer, refer to these sub-steps:

  • First, you need to check what features are enabled, and for you to find out, enter this command: DISM /online /get-features /format:table | find “Enabled" | more
  • And if you want to check the detailed information about a particular feature, you can enter this command: DISM /online /get-featureinfo/featurename:[Enter the name of the feature here]

Option 3 – via Windows Powershell

As you know, the Windows Powershell is a very important tool in Windows 10, and a powerful one at that since you can do a lot of things using this command line. So while you use this tool you need to populate the list of available features first and then you have to download the feature your desired feature.

  • Search for PowerShell in the Cortana search box and then run it with administrator privileges.
  • Next, type in the following command to populate the list of available features:

Get-WindowsOptionalFeature –Online

  • After that, enter the following command to install any feature you want to enable from the list of available features:

Get-WindowsOptionalFeature -Online -FeatureName *Type feature name*

  • Now enter the following command to enable your desired feature:

Enable-WindowsOptionalFeature -Online -FeatureName “Type feature name” –all

  • And if you want to disable any enabled feature, just enter the following command:

Disable-WindowsOptionalFeature -Online -FeatureName “Type feature name”

Option 4 – via an external installation source

You also have the option to fetch the latest features from an updated offline source. The source could be an ISO any other type of image or just a folder. So you need to decide if you want to use Windows Powershell or Command Prompt.

  • If you want to use Command Prompt, just enter this command: exe /online /enable-feature /featurename:< /All /Source:<Enter the path of the feature here>
  • If you want to use Windows Powershell, use this command: Install-WindowsFeature –Source “<Enter the path of the feature here>”

Note: If you want to get the latest features, you need to get the latest version of the image of the operating system that you are trying to install the feature from.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Microsoft Surface Go 2 review

The new upgraded Surface Laptop Go 2 is the new iteration of the affordable original Surface Laptop Go aimed to offer good performance at a lower price of under $1000. The new version is not anything vastly different from the original but it comes with much-needed upgrades.

microsoft surface go 2 laptop

The biggest and main upgrade is the CPU, the Surface Laptop Go 2 is packing now Intel Core i5 1135G7, an Intels 11th generation CPU that should increase battery life. The laptop is also coming with an improved WEB camera and the cheapest one comes now with 128GB of storage instead of 64GB. Price went up from $550 to $599 which is not a big increase considering what was upgraded.

The bad news of new models is that sadly they are still packing only 4GB of RAM, that's really not enough for most applications released in 2022 and the screen is having a relatively low resolution of 1536 X 1024.

Microsoft is still offering all the color variations as in its first offering but added as well a new Sage color that is muted green in tint.

When we look at hardware it seems a little weak but for this price, there is not much competition in the field, and after all this line of models is aimed to provide good performance for an affordable price. If you really need something better you will go with a standard Surface or MAC book instead.

The new laptops are available to pre-order at Best Buy and Microsoft’s online store, and they’ll start shipping on June 7.

Read More
Fix 169 IP address error in Windows 10
169 IP address error can stop your computer from connecting to the internet which could be a very frustrating experience. In this guide, we will cover simple but effective tips on how to fix this error so you can continue with internet use.
  1. Reconnect your Modem or Router

    Simple and sometimes effective solution, unplug and plug back in modem or router so IP is fetched again, it is very likely that computer will pick right IP address with this stunt.
  2. Use built-in Windows Network troubleshooter

    Press ⊞ WINDOWS + X top open secret menu Go to settings Go to Network & Internet Inside click on Network troubleshooter Follow onscreen instructions After the troubleshooter ends reboot your PC
  3. Reconfigure IP address

    Press ⊞ WINDOWS + R to open the run dialog Inside run dialog type ncpa.clp and press ENTER Right-click on your network adapter and select properties Uncheck Internet Protocol Version 6 (TCP/IPv6) and click on OK Now press ⊞ WINDOWS + X and click on Command prompt (admin) In command prompt type and after each line press ENTER netsh winsock reset catalog netsh int ip reset reset.log ipconfig /release ipconfig /renew Reboot your computer
  4. Restart DHCP client

    Press ⊞ WINDOWS + R to open the run dialog In run dialog type services.msc and click on OK Find DHCP client Right-click on it and choose Restart Reboot PC
  5. Reinstall Network Adapter

    Press ⊞ WINDOWS + X to open the windows menu Click on Device Manager Expand Network Adapter and right-click on wireless or ethernet adapter, click on Uninstall device Reboot the computer to automatically reinstall the device driver
  6. Reset IP and subnet mask

    Press ⊞ WINDOWS + R to open the run dialog In run dialog type in ncpa.cpl and press OK Right-click on your network adapter and select properties Uncheck Internet Protocol Version 6 (TCP/IPv6) Double click on Internet Protocol Version 4 (TCP/IPv4) Select Use the following IP address and change it to 192.168.0.1 Change Subnet mask to 255.255.255.0 Leave default gateway blank Click OK to save changes
Read More
Fix Mic not working in DOTA2
DOTA2 involves teams of five players each, where each player chooses a “hero” character. Each game has two teams pitted against each other, on opposite sides of a map. Once you start, you and your teammates try to level up by fighting and defeating heroes from other teams as well as non-player characters who exist within the game universe. Once you have a strong enough team, you would then try to attack an opposing team’s base. If you destroy their “ancient,” your team wins. The teamwork and interactivity required to play the game are some of its biggest attractions. You can text and voice chat as part of the Dota 2 gameplay, enabling you and your team to come up with strategies to take over your opponents’ base and fortifications. For this reason, a properly working microphone and headset are important if you are to get the most out of this exciting online game. However, there are many times when you find that there are audio dropouts when you try to speak into your microphone. The question “How do I get my mic to work on Dota 2?” is one of the most commonly asked on gaming forums related to this game. Here are solutions for why this can happen:
  1. You are logged in to another computer that is running the STEAM client

    While entirely rare, there are cases where the microphone in Steam is disabled because the same account is active and in use on a different computer. It may not notify you that your account is in use elsewhere. If this is the error, try to log out on other devices and then test it on only one system. If you cannot access the other computer that has access to your account, then change your password. This will automatically disconnect your Steam account from the other computer and let you enjoy voice chat in Dota 2 and other Steam games.
  2. Your microphone is not properly set up in Dota 2

    From the main Dota 2 menu, before you start a match, you can set up your microphone for voice chat. At the top, left-hand corner, click the gear icon to open Settings Select the AUDIO tab and ensure that the Sound Device and Speaker Configuration are set to default. On the same tab, activate Voice (Party) and set your Push to Talk shortcut key for your team. Select the appropriate Open Mic Threshold using the slider at the bottom of this tab to get your microphone recorded at a comfortable level.
  3. The Windows Audio Enhancements setting is turned on

    If you still cannot get your microphone to work properly, then your problem could be Windows Audio Enhancement. It is possible to get your microphone to work with Dota 2 by disabling these features. Right-click your volume icon on the system tray and select Recording Devices. Choose your active microphone then click its Properties button. On the Microphone Enhancements tab, make sure the checkboxes marked Voice enhancements and Acoustic Echo cancellation is unchecked Reboot your PC and retry using your microphone to chat.
  4. Your audio drivers need to be updated

    If you try all of the steps above and still have Dota 2 not recognizing your mic input update mic drivers by going in device manager and choosing update driver.
Read More
OneDrive thumbnails are not showing
A lot of users prefer to use Microsoft OneDrive when it comes down to cloud storage as it does not only come with the seal of approval from Microsoft but it’s also primarily good and better compared to other cloud storage services. However, that doesn’t mean that OneDrive isn’t without any issues. For one, you might encounter an issue where the OneDrive thumbnails do not show in File Explorer in Windows 10. If you are currently experiencing this problem, read on as this post will help you fix it. As you know, you can add OneDrive to your Windows 10 computer and have all the files locally synchronize to the cloud and so on. This means that whatever is available in the cloud will be seen on your computer. It is smooth and definitely saves you a lot of time which is why a lot of users prefer to use it. So if you suddenly not see any thumbnails in OneDrive, then that would be a problem. You are actually not the only one having this problem as there are other users who reported getting the same issue recently about the picture thumbnails that no longer show up in the OneDrive folders in the File Explorer. At the time of writing, it isn’t clear yet what the cause of the issue really is. Even so, there are still potential fixes you can check out to resolve it, and the sooner you do it, the better as this can be a major problem. To get started, refer to the instructions given below.

Option 1 – Try to disable Files on Demand

The first thing you can do to fix the problem is to disable the Files on Demand. This is what you have to do to get things under control.
  • First, right-click on the OneDrive icon located in the taskbar and go-to of OneDrive.
  • After that, click on More and Settings. This will open a new window where you have to click on the Settings tab and uncheck the “Files on Demand” service.
  • Once done, restart your computer and check if you can now see the thumbnails in the OneDrive folder. However, if it didn’t work, then proceed to the next given option below.

Option 2 – Try to change the icon view

The next thing you can do to fix the problem is to change the icon view. It is possible that the problem might have something to do with the size of the icons than anything else. So you have to change the icon view and to do that, follow these steps:
  • First, open Control Panel in Windows 10.
  • Next, in the search box, type “folder” and then click on the File Explorer Options.
  • From there, click on the View tab and uncheck the “Always show icons” option, and make sure that showing thumbnails is active.
  • Now go back to Control Panel and type “system” in the search box. This will open a new window where you have to select the “View advanced system settings” option.
  • Then under the Performance section, click on Settings and click on the option that allows you to show the thumbnails instead of icons.
Read More
Fixing “The .NET Framework 4.7 is not supported on this operating system” Error in Windows 10
In case you don’t know, the .Net Framework is a programming infrastructure introduced by Microsoft. You will need it to run on lots of services and applications. Note that most of the applications that require the .Net Framework are packed with their installation files which is why it will be installed automatically on your computer when you install an application. However, there are instances when you’ll get an error message saying, “The .NET Framework 4.7 is not supported on this operating system” while trying to install the .NET Framework as a standalone service. The very reason why this error message appears is stated in the error message itself. Although the .Net Framework is supported on Windows 10, it is not actually compatible with some other Windows 10 versions. So it is most likely that you are seeing this error message because the .Net Framework in your computer is not compatible with the Windows 10 version you are running. Since that’s the case, you need to update Windows 10 to fix the problem. Updating your Windows 10 computer is the only solution you can try to fix this problem. Thus, it is advised that you check for Windows Updates even if you are now using the latest version of Windows 10. And since the issue is caused by an incompatible operating system version, once you install the exact version of Windows 10 required by the .Net Framework, the problem will be fixed. Simply follow the steps given below to do so.
  • Step 1: Tap the Win + R keys to open the Run dialog box.
  • Step 2: After that, type in “winver” in the field and tap Enter.
  • Step 3: Next, your Windows 10 version should be given in the new window that appears. Take note that the number after the Version which is in the second line is your version number of Windows 10. And that the number must be 1507 or 1709. The first two digits in these numbers are the year while the second two represent the month when the update was released. So if you are running a 1709 version, this means that the Windows 10 version you are using was released in September 2017.
  • Step 4: The next thing you have to do is to make sure that you have the Windows 10 version that’s compatible with the .Net Framework. To verify, you need to click here and click on the System Requirements.
After opening the link, take a look at the Supported Operating System section where it says, “Windows 10 Anniversary Update” and “Windows 10 Creators Update”. Since there are users who are not familiar with the version numbers related to both the Anniversary and Creators updates, refer to the list given below.
  • November Update (1511)
  • Anniversary Update (14393)
  • Creators Update (1703)
  • Fall Creators Update (1709)
  • Spring Creators Update (1803)
As you can see, the Creators Update has version 1703 while the Anniversary Update has version number 14393 so if you are using a version lower than the 14393 version then it’s no wonder you aren’t able to install the .Net Framework 4.7 on your Windows 10 PC. Now all that’s left to do is to update your Windows 10 version and make sure that you will be updating it to the latest version available and then try installing the .Net Framework again.
Read More
0x80071771, The specified file could not ...
If you are tried encrypting or decrypting a file using the default EFS engine but you receive an error message instead saying, “Error Applying Attributes, An error occurred applying attributes to the file: The specified file could not be decrypted”, read on as this post will help you sort out the problem. If you encounter this error you can use the error code in it. You will most likely get error code 0x80071771. This kind of error occurs when the File Explorer’s copy and paste feature was not able to read the source file being encrypted or decrypted. It could also occur if you try to access a file that has been on another computer previously.

To fix error code 0x80071771 when decrypting or encrypting a file, refer to the instructions provided below.

Step 1: You need to check first if you can decrypt the files encrypted by EFS. However, if you can’t, just proceed and then take full control of the file. Step 2: To take control of the file, open File Explorer and right-click on the partition, and then click on Properties. Step 3: After that, click on the Edit button under the Security tab. Step 4: Next, make sure that “Everyone” is selected under the Group or user names section. Step 5: Afterwards, the Permissions for Everyone section will be activated. Just make sure that all the checkboxes for Allow are checked and then click on the Apply button. Step 6: Once you’re done, click on the Advanced button. This will open a new window labeled Advanced Security Settings. From there, click on the Change link under the Owner section. Step 7: Now type your account name in the field and click on Check Names to verify the account name and click OK. Step 8: After that, select the “Replace owner on sub-containers and objects” option and then click OK. Step 9: Next, select Administrators in the Group or User names list and select Full Control in the Permissions for Administrators panel and click OK.
Read More
How to remove TotalRecipeSearch from your PC

TotalRecipeSearch is a browser extension for Google Chrome developed by Mindspark. This extension allows access to popular cooking websites. From the Author: Discover 1000s of tasty recipes – for FREE! Find creative, new meal ideas all in one convenient place!

When installed, this extension changes your default search engine and home page to MyWebSearch.com. While active it will monitor user activity, recording browsing data, visited websites and clicked links. This data is later used to display targeted ads throughout your browsing sessions.

While browsing the internet you will see additional unwanted ads, sponsored links, and even pop-up ads injected into your search results and websites. This extension has been marked as a Browser Hijacker by several anti-virus programs and it is targeted for removal.

About Browser Hijackers

Browser hijacking means a malicious code has taken power over and modified the settings of your web browser, without your consent. Practically most browser hijackers are made for advertising or marketing purposes. Typically, it will drive users to particular sites which are aiming to boost their ad income. Though it might appear naive, all browser hijackers are damaging and thus always classified as security risks. They not only mess up your web browsers, but browser hijackers could also modify the computer registry, making your computer susceptible to other malicious programs.

How to determine if your browser is hijacked

The typical signs that indicate having this malware on your computer are: 1. you see unauthorized changes to your web browser’s homepage 2. when you key in a URL, you find yourself regularly directed to some other web page than the one you meant 3. the default web browser settings have been changed and/or your default web engine is altered 4. you are finding browser toolbars you have never witnessed before 5. your web browser will display constant pop-up ads 6. websites load slowly and at times incomplete 7. you are blocked to access those sites of security solution providers.

How does a browser hijacker infect a computer?

Browser hijackers can enter a computer in some way or other, for example via downloads, file sharing, and email as well. They also come from add-on applications, also called browser helper objects (BHO), web browser plug-ins, or toolbars. Browser hijackers sneak into your computer in addition to free software downloads also that you unwittingly install alongside the original. Popular examples of browser hijackers include CoolWebSearch, Conduit, RocketTab, OneWebSearch, Coupon Server, Snap.do, Delta Search, and Searchult.com. The existence of any browser hijacker malware on your system might significantly diminish the browsing experience, monitor your internet activities that lead to critical privacy concerns, develop system stability problems and ultimately cause your PC to slow down or to an almost unusable condition.

How you can fix a browser hijack

Certain hijackers could be removed by simply uninstalling the corresponding free software or add-ons from the Add or Remove Programs in the Windows Control Panel. But, the majority of hijackers are very tenacious and need specialized tools to remove them. Novice PC users should not try for the manual form of removal, as it calls for comprehensive computer knowledge to carry out repairs on the computer registry and HOSTS file. Professionals always recommend users to get rid of any malware including browser hijacker by using an automatic removal tool, which is better, safer, and quicker than the manual removal technique. SafeBytes Anti-Malware discovers all types of hijackers – including TotalRecipeSearch – and eliminates every trace quickly and efficiently. Along with the anti-malware tool, a system optimizer, like SafeBytes’s Total System Care, will help you in deleting all linked files and modifications in the computer registry automatically.

Help! Malware Preventing Anti-Malware Installation And Access To The Internet

Malware could potentially cause plenty of damage to your PC. Certain malware variants alter browser settings by adding a proxy server or modify the PC’s DNS settings. In these instances, you will be unable to visit some or all of the internet sites, and thus unable to download or install the necessary security software to clear out the computer virus. So what you should do if malware prevents you from downloading or installing Safebytes Anti-Malware? Refer to the instructions below to get rid of malware through alternate methods.

Download the application in Safe Mode with Networking

In the event the malware is set to load at Windows start-up, then booting in Safe Mode should prevent it. Only minimal required applications and services are loaded when you start your PC into Safe Mode. To launch your Windows XP, Vista, or 7 PCs in Safe Mode with Networking, please do as instructed below. 1) At power-on/startup, hit the F8 key in 1-second intervals. This should bring up the Advanced Boot Options menu. 2) Use the arrow keys to choose Safe Mode with Networking and hit ENTER. 3) Once you get into this mode, you should have an internet connection again. Now, use your web browser normally and navigate to https://safebytes.com/products/anti-malware/ to download Safebytes Anti-Malware. 4) Following installation, do a full scan and allow the software program to remove the threats it detects.

Obtain the antivirus software in a different web browser

Web-based viruses could be environment-specific, targeting a particular browser or attacking particular versions of the web browser. The best way to overcome this problem is to choose a browser that is well known for its security features. Firefox comprises built-in Malware and Phishing Protection to keep you safe online.

Install and run anti-malware from your flash drive

To effectively get rid of the malware, you need to approach the issue of installing anti-virus software on the infected computer system from a different angle. Adopt these measures to employ a flash drive to fix your corrupted PC. 1) Use another virus-free computer system to download Safebytes Anti-Malware. 2) Plug the Flash drive into the clean computer. 3) Run the setup program by double-clicking the executable file of the downloaded application, with a .exe file format. 4) Select the flash drive as the location for saving the software file. Follow the directions to finish the installation process. 5) Transfer the thumb drive from the clean PC to the infected computer. 6) Double-click the EXE file to open the Safebytes software from the pen drive. 7) Click on “Scan Now” to run a scan on the affected computer for viruses.

Features and Benefits of SafeBytes Anti-Malware

If you are looking to download anti-malware software for your computer, there are various tools in the market to consider however, you cannot trust blindly anyone, regardless of whether it is a paid or free software. A few are good ones, some are decent, while some are simply just fake anti-malware programs that can damage your personal computer themselves! You need to be careful not to pick the wrong application, especially if you buy a paid software. When thinking about the highly regarded applications, Safebytes AntiMalware is certainly the highly recommended one. SafeBytes can be described as a highly effective, real-time anti-spyware application that is designed to assist everyday computer users in protecting their computers from malicious threats. This program can easily identify, remove, and protect your PC from the most advanced malware threats such as adware, spyware, trojan horses, ransomware, parasites, worms, PUPs, and other possibly damaging software programs.

SafeBytes anti-malware comes with a myriad of advanced features that sets it apart from all others. Listed below are some of the features you might like in SafeBytes Anti-Malware.

Real-time Threat Response: SafeBytes provides an entirely hands-free real-time protection and is set to check, prevent and destroy all computer threats at its very first encounter. They’re highly effective in screening and getting rid of different threats since they’re regularly improved with the latest updates and alerts. Anti-Malware Protection: Built on a highly acclaimed anti-virus engine, this malware removal application can detect and get rid of many stubborn malware threats like browser hijackers, potentially unwanted programs, and ransomware that other typical anti-virus software will miss. Fast Scan: This software program has one of the fastest and most effective virus scanning engines in the industry. The scans are highly accurate and take a little time to complete. Internet Security: SafeBytes inspects the hyperlinks present on a web page for possible threats and notifies you whether the site is safe to browse or not, through its unique safety rating system. Very Low CPU and RAM Usage: SafeBytes provides complete protection from online threats at a fraction of the CPU load because of its advanced detection engine and algorithms. Fantastic Technical Support: Skilled technicians are at your disposal 24/7! They will immediately fix any technical issues you may be experiencing with your security software. Put simply, SafeBytes has formulated a meaningful anti-malware solution that is aimed to protect your computer against various malware. Now you may realize that this software does more than just scan and eliminate threats from your computer. So when you want sophisticated forms of protection features & threat detections, buying SafeBytes Anti-Malware could be worth the dollars!

Technical Details and Manual Removal (Advanced Users)

To remove TotalRecipeSearch manually, navigate to the Add or Remove programs list in the Control Panel and choose the offending program you want to get rid of. For web browser plug-ins, go to your web browser’s Addon/Extension manager and choose the plug-in you want to remove or disable. It’s also advised to factory reset your web browser to its default condition to fix corrupt settings. If you opt to manually delete the system files and Windows registry entries, utilize the following checklist to ensure that you know exactly what files to remove before carrying out any actions. Please keep in mind that only experienced computer users should try to manually edit the system files simply because removing any single critical registry entry results in a major problem or even a system crash. Also, certain malware is capable of replicating itself or preventing deletion. Doing this malware-removal process in Safe Mode is suggested.
Files: %PROGRAMFILES%\TotalRecipeSearch_14\bar.bin\AppIntegrator.exe %PROGRAMFILES%\TotalRecipeSearch_14\bar.binSrcAs.dll %PROGRAMFILES%\TotalRecipeSearch_14\bar.binbar.dll %UserProfile%\Local Settings\Application Data\TotalRecipeSearch_14 %LOCALAPPDATA%\TotalRecipeSearch_14 %USERPROFILE%\Desktop\TotalRecipeSearch.exe %PROGRAMFILES%\TotalRecipeSearch_14\bar.binmedint.exe %PROGRAMFILES%\TotalRecipeSearch_14 %LOCALAPPDATA%\Google\Chrome\User Data\Default\cnbegpgknjllkedcnkfailmjbiahbfba %UserProfile%\Local Settings\Application Data\Google\Chrome\User Data\Default\cnbegpgknjllkedcnkfailmjbiahbfba %PROGRAMFILES%\TotalRecipeSearch_14\bar.binHighIn.exe %PROGRAMFILES%\TotalRecipeSearch_14\bar.binbarsvc.exe %PROGRAMFILES%\TotalRecipeSearch_14\bar.binbrmon.exe %USERPROFILE%\Local Settings\Application Data\TotalRecipeSearchTooltab %LOCALAPPDATA%\TotalRecipeSearchTooltab Registry: HKEY_CURRENT_USER\Software\AppDataLow\Software\TotalRecipeSearch_14 HKEY_CURRENT_USER\Software\TotalRecipeSearch_14 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.DynamicBarButton HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.DynamicBarButton.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.FeedManager HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.FeedManager.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.HTMLMenu HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.MultipleButton HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.MultipleButton.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.PseudoTransparentPlugin HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.PseudoTransparentPlugin.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.Radio HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.Radio.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.RadioSettings HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.SettingsPlugin HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.SettingsPlugin.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.SkinLauncher HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.SkinLauncher.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.SkinLauncherSettings HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.SkinLauncherSettings.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.ThirdPartyInstaller HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.UrlAlertButton HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.UrlAlertButton.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TotalRecipeSearch_14.XMLSessionPlugin HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\03f3147c-cea6-4aae-b0ae-8d8abe7a8080 HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\435e56d9-92df-4d38-bdff-fe316064953c HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\4a80a60d-bdef-4d70-bccc-d0dad25ff951 HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\8cab2773-5453-4778-90d9-6672805b41ca HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\b723e5aa-0f63-47df-971c-ae8ea0f8393a HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar, value: a0154e07-2b48-475c-a82a-80efd84ea33e HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ab56dfde-0c14-45b3-9df6-7b0eba617870 HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\df22384f-cf68-4d19-969f-10423715528b HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\96b8a0ef-0d9d-4a92-b548-376db4bbb58b HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\A4503EC3-1111-4B62-8F46-0D88508F8A7B HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\b38fbaed-ded1-4ba6-ba2e-f2515fd49442 HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\e8106344-16d4-41d1-9a2a-0521a59199ea HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\fd79f359-e577-46db-aa74-d6e6b8b45ba8 HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run, value: TotalRecipeSearch Search Scope Monitor HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\TotalRecipeSearch_14bar Uninstall Firefox HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\MozillaPlugins\@TotalRecipeSearch_14.com/Plugin HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\TotalRecipeSearch_14 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\0384459a-9d5e-4ae1-b154-8eac39721c97 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\03f3147c-cea6-4aae-b0ae-8d8abe7a8080 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\435e56d9-92df-4d38-bdff-fe316064953c HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\4a80a60d-bdef-4d70-bccc-d0dad25ff951 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\8cab2773-5453-4778-90d9-6672805b41ca HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\b723e5aa-0f63-47df-971c-ae8ea0f8393a HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\df22384f-cf68-4d19-969f-10423715528b HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\2502086b-5a46-4d05-8d5b-a1e77ab8bb32 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\76f3207c-3a0a-461b-b958-5653c5718243 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\96b8a0ef-0d9d-4a92-b548-376db4bbb58b HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\A4503EC3-1111-4B62-8F46-0D88508F8A7B HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\b38fbaed-ded1-4ba6-ba2e-f2515fd49442 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\e8106344-16d4-41d1-9a2a-0521a59199ea HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\fd79f359-e577-46db-aa74-d6e6b8b45ba8 HKEY_LOCAL_MACHINE\SOFTWARE\MozillaPlugins\@TotalRecipeSearch_14.com/Plugin HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TotalRecipeSearch_14Service HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\DOMStorage\totalrecipesearch.dl.myway.com HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\DOMStorage\totalrecipesearch.com
Read More
Easy Remove PCPerformer From Windows

PC Performer is a registry cleaner made by PerformerSoft. The purpose of this program is to remove redundant items from the Windows registry. Registry cleaners remove broken links, missing references within the Windows registry. PC performer is designed to automatically optimize your registry and clean it up.

PC Performer adds registry entries for the current user that allow it to run automatically each time the system is rebooted. It adds a scheduled task to Windows Task Scheduler in order to run at various times. The software connects to the internet, therefore it creates a Windows Firewall exception that allows it to connect without interference. Multiple anti-virus programs detected this software as Malware, it typically comes bundled with other software or is distributed through a pay-per-install bundle.

About Potentially Unwanted Applications

People have encountered it – you download and install a piece of free software application, you then see some unwanted applications on your computer or discover a strange toolbar has been added to your browser. You didn’t install them, so how did they turn up? These unwanted programs, technically known as Potentially Unwanted Programs (PUPs), often come bundled along with other software and install themselves on user’s PC without their knowledge. They perhaps might not look like viruses to some individuals, but they can produce major annoyances and bring about serious trouble for users. The idea of PUP was coined to define this downloadable crapware as something other than malicious software. Much like malware, PUPs create problems when downloaded and placed on your computer, but what makes a PUP different is that you provide consent to download it – the fact is vastly different – the software installation bundle actually tricks you into agreeing to the installation. Still, there isn’t any doubt that PUPs are still bad news for computer users as they can be incredibly damaging to your computer in lots of ways.

What do PUPs look like?

The unwanted software programs after installation display loads of annoying pop-up adverts, create fake alerts, and quite often it even pushes the user to buy the software. Likewise, the majority of free software applications these days come with quite a few unwanted add-ons; in most cases a web browser toolbar or browser modification such as a homepage hijacker. Not only they needlessly use up space on your screen, but toolbars can also manipulate search engine results, watch your browsing activities, decrease your web browser’s performance, and decelerate your net connection to a crawl. PUPs employ aggressive distribution techniques to get in your computer. Some might include information gathering program code that could collect and send your private information back to third parties. Due to this unwanted program, your application may freeze, your security protections may get disabled that might leave the computer susceptible, your system may get ruined, and the list goes on and on.

Tips on how to prevent ‘crapware’

• Read cautiously before agreeing to the license agreement as it may have a clause about PUPs. • Usually, when setting up a program you will get two options, ‘Standard Installation (recommended)’ and ‘Custom Installation’. Don’t select ‘Standard’ as PUPs could be installed that way! • Use good anti-malware software. Try Safebytes Anti-Malware which will find PUPs and handle them as malware by flagging them for removal. • Be alert when you install freeware, open-source software, or shareware. Avoid downloading browser extensions and programs you are not familiar with. • Only download applications from the original providers’ sites. Avoid download portals as they use their own download manager to pack additional programs with the initial download.

What you can do if Virus Stops You From Downloading Or Installing Anything?

Malware could potentially cause several kinds of damage to computer systems, networks, and data. Certain malware goes to great lengths to stop you from installing anything on your PC, especially antivirus applications. If you’re reading this right now, you have perhaps recognized that a malware infection is a reason for your blocked web traffic. So what to do if you need to install an antivirus program like Safebytes? There are a few actions you can take to get around this problem.

Eliminate malware in Safe Mode

If the virus is set to load automatically when Microsoft Windows starts, getting into Safe Mode could very well block the attempt. Since just the bare minimum programs and services start-up in safe mode, there are hardly any reasons for issues to happen. The following are the steps you should follow to remove malware in Safemode. 1) At power on/start-up, hit the F8 key in 1-second intervals. This will bring up the Advanced Boot Options menu. 2) Select Safe Mode with Networking using arrow keys and hit ENTER. 3) Once you get into this mode, you should have an internet connection again. Now, obtain the malware removal application you need by using the browser. To install the software, follow the directions in the installation wizard. 4) After installation, do a complete scan and let the software delete the threats it detects.

Switch to an alternate browser

Web-based viruses can be environment-specific, targeting a particular web browser or attacking particular versions of the browser. The best solution to overcome this issue is to opt for a browser that is well known for its security features. Firefox contains built-in Phishing and Malware Protection to keep you safe online.

Install and run anti-virus from a USB drive

To successfully eliminate the malware, you will need to approach the issue of installing an anti-virus program on the infected PC from a different angle. Adopt these measures to employ a USB flash drive to fix your corrupted computer. 1) Use another virus-free computer to download Safebytes Anti-Malware. 2) Insert the pen drive into the clean computer. 3) Double-click the Setup icon of the antivirus program to run the Installation Wizard. 4) When asked, choose the location of the pen drive as the place where you would like to put the software files. Follow the on-screen instructions to complete the installation process. 5) Now, insert the pen drive into the infected computer. 6) Double-click the EXE file to open the Safebytes program right from the flash drive. 7) Click “Scan Now” to run a scan on the infected computer for malware.

Highlights of SafeBytes Anti-Malware

Do you want to install the best anti-malware software program for your computer system? There are various applications in the market that comes in paid and free versions for Microsoft Windows systems. A few of them are great and some are scamware applications that pretend as legit anti-malware software waiting around to wreak havoc on your computer. While looking for anti-malware software, select one which gives dependable, efficient, and full protection against all known computer viruses and malware. On the list of recommended software is SafeBytes Anti-Malware. SafeBytes carries a really good track record of top-quality service, and clients are happy with it. SafeBytes anti-malware is a highly effective and easy-to-use protection tool that is suitable for users of all levels of computer literacy. With its cutting-edge technology, this application will let you remove multiples types of malware which include viruses, worms, PUPs, trojans, ransomware, adware, and browser hijackers. SafeBytes anti-malware provides an array of advanced features which sets it apart from all others. Listed here are a few of the great ones: Anti-Malware Protection: Built on a highly acclaimed anti-virus engine, this malware removal tool is able to detect and remove many obstinate malware threats such as browser hijackers, potentially unwanted programs, and ransomware that other typical anti-virus programs will miss. Real-time Active Protection: SafeBytes offers an entirely hands-free real-time protection that is set to check, prevent and remove all threats at its first encounter. It’ll check your PC for suspicious activity continuously and shields your PC from unauthorized access. Faster Scan: SafeBytes’s virus scan engine is one of the quickest and most efficient in the industry. Its targeted scanning seriously increases the catch rate for malware that is embedded in various computer files. Safe Browsing: Safebytes assigns all sites a unique safety ranking that helps you to have an idea of whether the webpage you’re going to visit is safe to view or known to be a phishing site. Low CPU Usage: SafeBytes is renowned for its minimal influence on processing power and great detection rate of countless threats. It runs silently and efficiently in the background so you’re free to use your computer at full power all the time. 24/7 Customer Support: SafeBytes provides 24/7 technical support, automatic maintenance, and software upgrades for the best user experience.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove PCPerformer without the use of an automated tool, it may be possible to do so by removing the program from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. You will likely also want to reset your browser. To ensure the complete removal, manually check your hard drive and registry for all of the following and remove or reset the values accordingly. Please note that this is for advanced users only and may be difficult, with incorrect file removal causing additional PC errors. In addition, some malware is capable of replicating or preventing deletion. Doing this in Safe Mode is advised.

The following files, folders, and registry entries are created or modified by PCPerformer

Files: File at LOCALAPPDATAPCPerformerSetupPCPerformerSetup.exe. File at PROGRAMFILESPC PerformerPCPerformer.exe. File at PROGRAMFILESPC PerformerPSCheckUp.exe. File at PROGRAMFILESPC PerformerRegistryDefrag.exe. File at WINDIRTasksPC Performer Daily Check.job. File at WINDIRTasksPC Performer Scheduled Scan.job. Registry: Key PC Performer at HKEY_CURRENT_USERSoftwarePerformerSoft. Key PC Performer at HKEY_LOCAL_MACHINESOFTWAREPerformerSoft. Key PCPerformer_is1 at HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionUninstall.
Read More
Media Creation Tool Error 0x80042405-0xA001A
As you know, the Windows Media Creation Tool is a great utility in Windows that helps lots of users in installing Windows on their PCs. However, just like any other program in Windows, it also experiences a couple of issues every now and then. So in this post, you will be guided on how you can resolve a particular issue in the Media Creation Tool which is the error 0x80042405-0xA001A. You can encounter this error while creating a USB installation media used in installing Windows 10. When getting this kind of error in the Windows Media Creation Tool, you will see the following error message on your screen:
“We’re not sure what happened, but we’re unable to run this tool on your PC, Error code 0x80042405 – 0xA001A”
The error 0x80042405 – 0xA001A occurs while creating a bootable USB installation drive. This is a common error faced by many users and it has something to do with the USB hardware. To get this issue fixed, here are some suggestions you could check out.

Option 1 – Try to reformat the USB drive

Reformatting your USB drive might help in fixing error 0x80042405 – 0xA001A.
  • Open This PC and right-click your USB drive from there then select Format.
  • Next, select FAT32 as the drive type and uncheck the “Quick Format” option.
  • After that, try to run the Windows Media Creation Tool again and check if the error is fixed or not. But hopefully, it should work since formatting the drive as FAT32 will give the driver a proper type and would resolve any minor issues in the drive.

Option 2 – Copy the Windows Media Creation Tool to the USB drive

If the first option didn’t work, you might want to copy the latest version of the Media Creation Tool to the USB drive. After you do that, you can run it from inside the drive. This is actually a working fix and can definitely get the USB drive to run with Windows inside it so it should resolve the error 0x80042405 – 0xA001A on the Windows Media Creation Tool.

Option 3 – Run CHKDSK to check the drive for errors

When it comes to some issues concerning the hard drive or removable devices, there is a utility in Windows that might help which is called “chkdsk”. This error check utility can help with several issues in the system including the “Diskpart failed to clear disk attributes” error.
  • Tap the Win + S keys to open the Search box.
  • Then type “command prompt” in the field and from the search results that appear, right-click on Command Prompt and select “Run as administrator”.
  • After opening an elevated command prompt, copy and paste the following command and hit Enter:
CHKDSK [volume [[path] filename]] [/F] [/V] [/R] [/X] [/C] [: size]]
Note: In the command given above, “[/F]” will try to fix the system errors while “[/R]” will be the one to fix the bad sectors.
  • Now if you are prompted to run CHKDSK after your reboot your PC, just tap Y and reboot your PC.
  • If CHKDSK is not able to find any errors, tap the Win + E keys and navigate the access window. From there, right-click on the concerned drive and click on Properties.
  • After opening Properties, click on the tab Tools and then click on the “Check” button under the Error-checking section.
  • Wait until the process is completed and then restart your computer.

Option 4 – Try checking the hardware components

On the other hand, it is also possible that the issue has something to do with a hardware problem and so you need to check the hardware components on your computer to determine that.
Read More
A Quick Guide to Fixing Error 2738

Error 2738 - What is it?

Error 2738 is associated with the VBScript engine. VBScript is the abbreviation for Visual Basic Scripting. It is an Active Scripting programming language developed by Microsoft and modeled on Visual Basic. It is used with a fast interpreter in a large variety of Microsoft environments. Error 2738 indicates that the VBScript engine is not registered properly on your PC. It occurs when you try to install or uninstall VBScript-supported applications on your system. The error message is displayed in the following format:
"Error 2738. Could not access VBScript run time for custom action."

Solution

Restoro box imageError Causes

There are several reasons for the error 2738 message pop up. These include: Incorrect or corrupt registry entries on your system. These entries interfere with VBScript support in Windows thereby generating such error codes.
  • Removal of McAfee Antivirus
  • Windows registry values are not updated accurately during the uninstallation of McAfee Software
  • The Visual Basic Script is registered in the registry under the local user instead of the local machine
No matter what the cause of the error may be, it is recommended that you resolve the issue immediately without any delay.

Further Information and Manual Repair

Here are some of the easy and proven DIY methods to repair error 2738 on your PC:

Method 1

If the error 2738 occurs because the VBScript is not registered correctly, then follow these steps to resolve.
  1. Go to the start menu, open Run, and type RegEdit in the box and then press OK. This will open the Windows Registry Editor.
  2. Now type KEY_LOCAL_MACHINESOFTWAREClassesCLSID{B54F3741-5B07-11cf-A4B0-00AA004A55E8}InprocServer32, if the key does not have a data value of C:\Windows\System32\vbscript.dll then simply add it.
  3. Now go to the All programs option and then Accessories.
  4. Here right-click on Command Prompt and then ‘Run as Administrator’.
  5. Now type egsvr32 vbscript.dll then press enter. After that type regsvr32 jscript.dll and then press enter.
  6. Restart your PC to activate changes.

Method 2

Sometimes error 2738 may occur when you uninstall preinstalled MacAfee antivirus software on your system. Un-installation usually leaves some trace components in the registry. These components must be removed completely otherwise error codes like 2738 may keep occurring on your computer screen. In such an event, the best way to resolve it is to download the McAfee Consumer Product Removal utility from McAfee's official website. Save this file on your desktop. Double click the file and follow the steps to remove this software completely and successfully from your PC. Proper removal of the McAfee program will resolve error 2738 right away. But if the error still persists then try other methods illustrated below.

Method 3

Download Restoro to remove incorrect and corrupt registry entries on your system that may be interfering with VBScript support. Restoro is a new and easy-to-use PC Repair Tool deployed with an intuitive interface and a powerful registry cleaner. The registry cleaner removes all entries corrupting the registry, cleans it, and resumes it to its normal state. Click here to download Restoro.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status