Logo

DiskPart has encountered an error

As you know, Diskpart is a useful utility that helps in managing the disks in a computer. It is a very useful tool that even when the GUI-based disk management tools in Windows 10 operating system fails, the Diskpart utility still tends to work. However, it also does not mean that this utility does not experience issues as it still does, from time to time. One of the issues you may encounter when using the Diskpart utility is when you encounter an error message that says, “DiskPart has encountered an error, Access is denied”.

This kind of error in the Diskpart utility could be caused by a number of factors. For one, it could be that the Write-Protection is enabled on the drive where the operating is being performed or it could also be that the Command Prompt terminal does not have administrator-level permissions to carry out the command. Thus, you can try to run the Diskpart utility again but this time with admin privileges or you could also remote the Write-Protection from the concerned drive. For more details, refer to the instructions given below.

Option 1 – Try running Command Prompt with Administrator-level permissions

  • In the Start Search, type “command prompt” and from the search results that appear, look for Command Prompt.
  • Once you found it, right-click on it and select the “Run as administrator” option.
  • After that, try to execute the Diskpart operation once again and see if you still encounter the same error.

Option 2 – Try to remove the Write Protection from the drive

As mentioned, removing the Write-Protection on the concerned drive could also help you fix the problem and there are two ways to get rid of the write protection – you can either use the Diskpart utility or the Registry Editor. How? Refer to the following steps.

Via Diskpart utility:

  • Open Command Prompt with admin privileges and then type the “diskpart” command and tap Enter to execute it.
  • Next, type “list disk” and tap Enter to get the list of all the Disk connects or all the partitions that are formed on those disks.
  • After that, you need to choose one command depending on the list of commands you entered. Type “select disk #” and tap Enter to select the disk or partition you want to select.
  • Then type “attribute disk clear readonly” and tap Enter to Disable the Write Protection on the selected disk or partition.

Via Registry Editor:

  • Tap the Win + R keys to open the Run utility and type “Regedit” in the field and then tap Enter to open the Registry Editor.
  • Next, navigate to the following registry key:

ComputerHKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlStorageDevicePolicies

  • After that, look for the DWORD named “WriteProtect” and double click on it, and then set its Value Data to “0”.
  • Now restart your computer and see if the problem is now fixed or not.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

10 Worst Computer Viruses in history
Computers viruses, worms, ransomware, etc. are kinds of malicious software that no user should take lightly. On several occasions, we have touched upon security steps that each user should take in order to protect its identity and data. Sadly sometimes even when all precautions are taken some malware can still slip through and wreak havoc. Today we are looking at some of the worst or the best, depending on your view that has indeed wreaked plenty of havoc.

viruses10 worst computer viruses in history

In the list of the 10 most famous computer viruses below, we show the costs, dates, reach, and other key facts. First a note about terms: we use the words “virus” and “worm” interchangeably because most readers search for them that way. But there’s a subtle difference that we explain after the list.

1. Mydoom – $38 billion

The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent. Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server. Mydoom is still around today, generating 1% of all phishing emails. That’s no small feat considering the 3.4 billion phishing emails sent each day. By that figure, Mydoom has taken on a life of its own, infecting enough poorly-protected machines to send 1.2 billion copies of itself per year, 16 years after its creation. Though a $250,000 reward was offered, the developer of this dangerous computer worm was never caught. Wondering what makes the world’s most secure computers so safe? See the Tech@Work guide: Upgrade to the World's Most Secure and Manageable PC

2. Sobig – $30 billion

The 2003 Sobig computer virus is actually another worm. It is second only to the Mydoom virus in its scope. The $30 billion figure is a worldwide total, including Canada, the U.K., the U.S., mainland Europe, and Asia. Several versions of the worm were released in quick succession, named Sobig.A through Sobig.F, with Sobig.F being the most damaging. This cybercriminal program masqueraded as legitimate computer software attached to emails. It disrupted ticketing at Air Canada and interfered with countless other businesses. Despite its widespread damage, the creator of the successful bug was never caught.

3. Klez – $19.8 billion

Klez is a close third on the list of the worst computer viruses ever created. With nearly $20 billion in estimated damages, it infected about 7.2% of all computers in 2001, or 7 million PCs. The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses. As with other viruses and worms, Klez was released in several variants. It infected files, copied itself, and spread throughout each victim’s network. It hung around for years, with each version more destructive than the last. Windows has come a long way since most of the computer viruses on this list hit the web. Thankfully, built-in protection with Microsoft Defender is always on the watch.

4. ILOVEYOU – $15 billion

The year 2000’s ILOVEYOU virus worked by sending a bogus “love letter” that looked like a harmless text file. Like Mydoom, this attacker sent copies of itself to every email address in the infected machine’s contact list. Shortly after its May 4 release, it had spread to more than 10 million PCs. The virus was created by a college student in the Philippines named Onel de Guzman. Lacking funds, he wrote the virus to steal passwords so he could log into online services he wanted to use for free. He reportedly had no idea how far his creation would spread. This virus is also known as Loveletter. Need to up your remote work security game before there’s another entry on the list of most deadly computer viruses? See our guide: How to Work Remotely and Securely

5. WannaCry – $4 billion

The 2017 WannaCry computer virus is ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. The WannaCry ransomware ripped through computers in 150 countries, causing massive productivity losses as businesses, hospitals, and government organizations that didn’t pay were forced to rebuild systems from scratch. The malware raged like wildfire through 200,000 computers worldwide. It stopped when a 22-year-old security researcher in the U.K. found a way to turn it off. Computers with out-of-date operating systems were hit especially hard. That’s why security experts always recommend updating your systems frequently.

Ransomware strikes again

In September 2020, one of the potentially largest computer virus attacks in medical history hit Universal Health Services. The U.S. hospital chain, which has more than 400 locations, was reportedly struck by damaging ransomware. The attack forced the cancellation of surgeries and made healthcare workers switch to paper records.

6. Zeus – $3 billion

The Zeus computer virus is an online theft tool that hit the web in 2007. A whitepaper by Unisys three years later estimated that it was behind 44% of all banking malware attacks. By then, it had breached 88% of all Fortune 500 companies, 2,500 organizations total, and 76,000 computers in 196 countries. The Zeus botnet was a group of programs that worked together to take over machines for a remote “bot master.” It originated in Eastern Europe and was used to transfer money to secret bank accounts. More than 100 members of the crime ring behind the virus, mostly in the U.S., were arrested in 2010. It’s not as prominent today, but some of the virus’ source code lives on in newer botnet viruses and worms. Zeus caused documented damage of $100 million. But the real cost in terms of lost productivity, removal, and undocumented theft is undoubtedly much higher. A $3 billion estimate, adjusted for inflation, puts this virus at a cost of $3.7 billion in today’s dollars.

7. Code Red – $2.4 billion

First observed in 2001, the Code Red computer virus was yet another worm that penetrated 975,000 hosts. It displayed the words “Hacked by Chinese!” across infected web pages, and it ran entirely in each machine’s memory. In most cases it left no trace in hard drives or other storage. Financial costs are pegged at $2.4 billion. The virus attacked websites of infected computers and delivered a distributed denial of service (DDoS) attack on the U.S. White House’s website, www.whitehouse.gov. In fact, the White House had to change its IP address to defend against Cod Red. Can your printer get a virus? See our cool infographic: The State of Printer Security

8. Slammer – $1.2 billion

The SQL Slammer worm cost an estimated $750 million across 200,000 computer users in 2003. This computer virus randomly selected IP addresses, exploiting vulnerabilities and sending itself on to other machines. It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic. The Slammer worm hit banks in the U.S. and Canada especially hard, taking ATMs offline in many locations. Customers of Toronto’s Imperial Bank of Commerce found themselves unable to access funds. The attack reared its ugly head again in 2016, launching from IP addresses in Ukraine, China, and Mexico.

9. CryptoLocker – $665 million

Thankfully, ransomware attacks like the 2013 CryptoLocker virus have dipped since their 2017 peak. This malware attacked upwards of 250,000 machines by encrypting their files. It displayed a red ransom note informing users that “your important files encryption produced on this computer.” A payment window accompanied the note. The virus’ creators used a worm called the Gameover Zeus botnet to make and send copies of the CryptoLocker virus. According to a report by security firm Sophos, the average ransomware attack costs a business $133,000. If we estimate that CryptoLocker hit 5,000 companies, that would put its total cost at $665 million. Where will cybersecurity go next? See our guide: The Future of Cybersecurity

10. Sasser – $500 million

The Sasser worm was written by a 17-year-old German computer science student named Sven Jaschan. He was arrested at the age of 18 in 2004 after a $250,000 bounty was posted for the computer virus’ creator. A friend of Jaschan’s tipped authorities that the youth had penned not only the Sasser worm but also the damaging Netsky.AC attack. Jaschan was given a suspended sentence after it was found he was a minor when he wrote the malware. The Sasser worm crashed millions of PCs, and though some reports put damages at $18 billion, the relatively low infection rate suggests a more likely cost of $500 million. Other notable viruses The top 10 worst computer viruses above are just the ugly tip of a gargantuan digital iceberg. With a million new malware programs popping up every 3 years, we may miss the forest for a few outstanding trees. Here are just a few more viruses that have wreaked havoc over the years: Mimail: This worm tried to harvest data from infected machines to launch a string of DDoS attacks, but was relatively easy to remove. Yaha: Yet another worm with several variants, thought to be the result of a cyber-war between Pakistan and India. Swen: Written in C++, the Swen computer worm disguised itself to look like a 2003 OS update. Its financial cost has been pegged at $10.4 billion, but not reliably. Storm Worm: This worm showed up in 2007 and attacked millions of computers with an email about approaching bad weather. Tanatos/Bugbear: A 2002 keylogger virus that targeted financial institutions and spread to 150 countries. Sircam: A computer worm from 2001 that used counterfeit emails with the subject line, “I send you this file in order to have your advice.” Explorezip: This worm used fake emails to spread to every machine on thousands of local networks. Melissa: The most dangerous computer virus in 1999, Melissa sent copies of itself that looked like NSFW pics. The U.S. FBI estimated cleanup and repair costs at $80 million. Flashback: A Mac-only virus, Flashback infected over 600,000 Macs in 2012 and even infected Apple’s home base in Cupertino, Calif. In 2020, there’s now more malware on Macs than on PCs. Conficker: This 2009 virus still infects many legacy systems and could do significant damage if it ever activates. Stuxnet: This worm is reported to have destroyed Iranian nuclear centrifuges by sending damaging instructions.
Read More
How to get rid of Iminent Emoticons (Iminent.com)

Iminent Emoticons is a browser plugin developed by IMinent. This extension offers users a whole new way to chat by adding new emojis, memes, and other interesting features to social media chats. However, upon further investigation, we did not manage to get this extension work or show up in any chat.

While installing this extension may display additional ads throughout your browsing sessions depending if it has an affiliate link for the desired search terms. It may also change your default search engine and home page to search.iminent.com (depending on the extension version).

Malware has been detected in this extension by several anti-virus programs and is therefore not recommended to keep on your computer.

About Browser Hijackers

Browser hijacking means a malicious code has power over and modified the settings of your internet browser, without your consent. Nearly all browser hijackers are created for advertising or marketing purposes. Generally, hijackers are programmed for the benefit of internet hackers usually through revenue generation that comes from forced advert mouse clicks and website visits. Most people think that these websites are legitimate and harmless but that is not the case. Nearly every browser hijacker poses an actual threat to your online safety and it’s necessary to categorize them under privacy risks. Some browser hijackers are programmed to make certain modifications beyond the browsers, like changing entries in the computer registry and letting other types of malware further damage your PC.

Browser hijacking signs and symptoms

There are various symptoms that indicate the internet browser is hijacked: the browser’s home-page is modified; you get re-directed to internet sites you never meant to visit; The default search page of your web browser is altered; unwanted new toolbars are added to your browser; your browser displays constant pop-up ads; websites load very slowly and sometimes incomplete; you have prohibited entry to specific web pages, including the website of an anti-malware software manufacturer like SafeBytes.

Exactly how browser hijacker infects PCs

Browser hijackers can get into a computer by some means or other, for instance via downloads, file sharing, and e-mail too. They can also be deployed through the installation of a web browser toolbar, add-on, or extension. A browser hijacker may also come bundled up with some freeware which you unintentionally download and install, compromising your PC security. Some of the well-known hijackers are Iminent Emoticons, Babylon Toolbar, Conduit Search, OneWebSearch, Sweet Page, and CoolWebSearch. The existence of any browser hijacker on your computer might drastically diminish the browsing experience, track your online activities that result in serious privacy concerns, diminish overall system performance and cause application instability also.

The best ways to get rid of a browser hijacker

Certain browser hijacking can be easily reversed by discovering and eliminating the corresponding malware application through your control panel. But, most browser hijackers are hard to get rid of manually. Irrespective of how much you try to remove it, it may keep coming back again and again. Rookie computer users shouldn’t ever attempt the manual form of removal methods, as it needs in-depth system knowledge to carry out fixes on the computer registry and HOSTS file. Installing and running antivirus applications on the affected computer could automatically delete browser hijackers and also other malicious applications. One of the greatest tools for fixing browser hijacker malware is SafeBytes Anti-Malware. It will help you get rid of any pre-existing malware in your system and gives you real-time monitoring and protection from new threats. Employ a system optimiser along with your anti-malware software to fix various registry problems, eliminate computer vulnerabilities, and enhance your computer's overall performance.

Learn How to Eliminate Malware that is Blocking Websites or Preventing Downloads

Malware could cause all sorts of damage if they invade your computer, ranging from stealing your personal information to erasing files on your PC. Certain malware variants alter internet browser settings by including a proxy server or change the PC’s DNS settings. In these cases, you’ll be unable to visit some or all internet sites, and thus not able to download or install the necessary security software to clear out the infection. So what should you do if malicious software prevents you from downloading or installing Anti-Malware? There are some solutions you can attempt to get around with this particular obstacle.

Boot your computer in Safe Mode

The Windows OS comes with a special mode known as “Safe Mode” in which just the minimum required applications and services are loaded. In the event, the virus is set to load automatically when PC boots, shifting into this mode may prevent it from doing so. To start the computer into Safe Mode, hit the “F8” key on the keyboard right before the Windows boot screen appears; Or right after normal Windows boot up, run MSConfig, look over “Safe Boot” under Boot tab, and click Apply. As soon as you restart into Safe Mode with Networking, you can download, install, and update the anti-malware program from there. Now, you can actually run the antivirus scan to get rid of computer viruses and malware without interference from another application.

Switch to an alternate browser

Certain viruses might target vulnerabilities of a specific web browser that obstruct the downloading process. The most effective solution to avoid this issue is to choose an internet browser that is known for its security features. Firefox contains built-in Malware and Phishing Protection to help keep you safe online.

Run antivirus from a pen drive

Here’s yet another solution which is using a portable USB anti-virus software package that can check your system for malicious software without needing installation. Adopt these measures to employ a USB flash drive to clean your infected computer system. 1) Download the anti-malware on a virus-free PC. 2) Plug in the USB drive to a USB port on the clean computer. 3) Run the setup program by double-clicking the executable file of the downloaded application, with a .exe file format. 4) Select the drive letter of the USB drive as the place when the wizard asks you where you want to install the anti-virus. Follow the on-screen instructions to finish the installation. 5) Now, transfer the pen drive to the infected PC. 6) Double-click the EXE file to run the Safebytes tool right from the pen drive. 7) Run Full System Scan to identify and get rid of all sorts of malware.

Highlights of SafeBytes Anti-Malware

To help protect your computer or laptop from many different internet-based threats, it’s important to install an anti-malware application on your personal computer. However, with so many anti-malware companies in the market, nowadays it is difficult to decide which one you should buy for your computer. A few are worth your money, but many aren’t. You should pick a company that creates industry-best antimalware and has gained a reputation as reliable. Among few good programs, SafeBytes Anti-Malware is the highly recommended software for the security-conscious user. SafeBytes anti-malware is a highly effective and easy-to-use protection tool that is designed for users of all levels of computer literacy. With its outstanding protection system, this tool will instantly detect and get rid of most of the security threats, including browser hijackers, viruses, adware, ransomware, PUPs, and trojans.

SafeBytes has excellent features when compared with various other anti-malware programs. Here are some of the best ones:

Robust, Anti-malware Protection: This deep-cleaning anti-malware software program goes much deeper than most anti-virus tools to clean your PC. Its critically acclaimed virus engine locates and disables hard to remove malware that hides deep within your PC. Active Protection: SafeBytes provides complete and real-time security for your PC. They’re extremely effective in screening and getting rid of different threats since they’re constantly improved with new updates and safety measures. Web Security: SafeBytes provides an instant safety rating to the web pages you are about to visit, automatically blocking unsafe sites and ensuring that you are certain of your online safety while browsing the web. Faster Scanning: SafeBytes Anti-Malware has a multi-thread scan algorithm that works up to five times faster than any other protection software. Minimal CPU and RAM Usage: This application is not “heavy” on the computer’s resources, so you’ll not see any performance issues when SafeBytes is working in the background. 24/7 Online Tech Support: For any technical problems or product support, you can get 24/7 expert assistance via chat and e-mail. SafeBytes will keep your computer protected from the latest malware threats automatically, thereby keeping your web experience safe and secure. You now may realize that this particular tool does more than just scan and eliminate threats from your PC. So if you’re trying to find a comprehensive antivirus program that’s still easy to use, SafeBytes Anti-Malware is exactly what you will need!

Technical Details and Manual Removal (Advanced Users)

If you don’t wish to use malware removal software and like to eliminate Imminent Emoticons manually, you could do so by going to the Add/Remove Programs menu in the Control Panel and deleting the offending program; in cases of web browser plug-ins, you could remove it by visiting the browsers Add-on/Extension manager. You may also want to reset your home page and search engine providers, and also delete temporary files, browsing history, and internet cookies. If you choose to manually remove the system files and Windows registry entries, utilize the following checklist to make sure you know exactly what files to remove before executing any actions. Please keep in mind that only experienced computer users should try to manually edit the system files because deleting any single vital registry entry results in a major problem or even a PC crash. In addition to that, some malware is capable of replicating or preventing deletion. You are urged to do this procedure in Safe Mode.
Files: %PROGRAMFILES%\IMinent Toolbar\TbHelper2.exe %PROGRAMFILES%\IMinent Toolbar\tbhelper.dll %PROGRAMFILES(x86)%\IMinent Toolbar\uninstall.exe %COMMONPROGRAMFILES%\IMGUpdater\IMGUpdater.exe %TEMP%\RarSFX0\Binaries\IMinentToolbarInstallerCHR.exe %LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\X7WAGUH3\IminentSetup.exe %PROGRAMFILES%\IminentToolbar.8.21.26\bh\iminent.dll %PROGRAMFILES%\IminentToolbar.8.25.0\iminentsrv.exe %TEMP%\Setup.exe1b7d2cac9747d1a847e0a25b76eaa0\HKEY_LOCAL_MACHINE\Software\IminentSetup.exe %COMMONPROGRAMFILES%\Umbrella\Umbrella.exe %COMMONPROGRAMFILES%\Hydrup\hydrup.exe %TEMP%\Iminent\iminenttoolbar.exe %TEMP%\Iminent\IMinentToolbarFF.exe %TEMP%\Iminent\IminentToolbarChrome.exe C:\Program Files\iminent toolbar\access connections.resources.dll C:\Program Files\iminent toolbar\acwizres.dll C:\Program Files\iminent toolbar\diagres.dll C:\Program Files\iminent toolbar\f5res.dll C:\Program Files\iminent toolbar\guihlprres.dll C:\Program Files\iminent toolbar\iconres.dll C:\Program Files\iminent toolbar\iminent_toolbar.dll C:\Program Files\iminent toolbar\mainguires.dll C:\Program Files\iminent toolbar\p2pres.dll C:\Program Files\iminent toolbar\svchlprres.dll C:\Program Files\iminent toolbar\tbcommonutils.dll C:\Program Files\iminent toolbar\tbcore3.dll C:\Program Files\iminent toolbar\trayres.dll C:\Program Files\iminent toolbar\update.exe Registry: HKEY_LOCAL_MACHINE\Software\Iminent HKEY_LOCAL_MACHINE\Software\Classes\iminent HKEY_LOCAL_MACHINE\Software\Wow6432Node\Iminent HKEY_LOCAL_MACHINE\Software\Wow6432Node\Loader, value: Iminent HKEY_LOCAL_MACHINE\Software\Classes\AppID\Iminent.WebBooster.InternetExplorer.DLL HKEY_LOCAL_MACHINE\Software\Classes\IminentWebBooster.ActiveContentHandler HKEY_LOCAL_MACHINE\Software\Classes\IminentWebBooster.ActiveContentHandle.1 HKEY_LOCAL_MACHINE\Software\Classes\IminentWebBooster.BrowserHelperObject HKEY_LOCAL_MACHINE\Software\Classes\IminentWebBooster.BrowserHelperObject.1 HKEY_LOCAL_MACHINE\Software\Classes\IminentWebBooster.ScriptExtender HKEY_LOCAL_MACHINE\Software\Classes\IminentWebBooster.TinyUrlHandler.1 HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\68B81CCD-A80C-4060-8947-5AE69ED01199 HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\68B81CCD-A80C-4060-8947-5AE69ED01199 HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\E6B969FB-6D33-48d2-9061-8BBD4899EB08 HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\E6B969FB-6D33-48d2-9061-8BBD4899EB08 HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\A09AB6EB-31B5-454C-97EC-9B294D92EE2A HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\A09AB6EB-31B5-454C-97EC-9B294D92EE2A HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\BFFED5CA-8BDF-47CC-AED0-23F4E6D77732 HKEY_LOCAL_MACHINE\Software\Classes\iminent.iminentappCore HKEY_LOCAL_MACHINE\Software\Classes\iminent.iminentappCore.1 HKEY_LOCAL_MACHINE\Software\Classes\iminent.iminentHlpr.1 HKEY_LOCAL_MACHINE\Software\Classes\esrv.iminentESrvc HKEY_LOCAL_MACHINE\Software\Classes\esrv.iminentESrvc.1 HKEY_LOCAL_MACHINE\Software\Iminent.com HKEY_LOCAL_MACHINE\Software\SIEN SA\iminent\iestrg HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\112BA211-334C-4A90-90EC-2AD1CDAB287C HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar, value: 1FAFD711-ABF9-4F6A-8130-5166C7371427 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID, value: 58124A0B-DC32-4180-9BFF-E0E21AE34026 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID, value: 977AE9CC-AF83-45E8-9E03-E2798216E2D5 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID, value: A09AB6EB-31B5-454C-97EC-9B294D92EE2A HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID, value: 58124A0B-DC32-4180-9BFF-E0E21AE34026 HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID, value: 977AE9CC-AF83-45E8-9E03-E2798216E2D5 HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID, value: A09AB6EB-31B5-454C-97EC-9B294D92EE2A HKEY_LOCAL_MACHINE\Software\Wow6432Node\Google\Chrome\Extensions\pkhojieggfgllhllcegoffdcnmdeojgb HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\pkhojieggfgllhllcegoffdcnmdeojgb HKEY_LOCAL_MACHINE\Software\SIEN SA\iminent HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\F1057DD419AED0B468AD8888429E139A HKEY_LOCAL_MACHINE\Software\Classes\Installer\ProductsDA786FCDC08E1345AF052DDF8C9693C HKEY_LOCAL_MACHINE\Software\Classes\Installer\FeaturesDA786FCDC08E1345AF052DDF8C9693C HKEY_LOCAL_MACHINE\Software\Wow6432Node\SIEN SA\iminent HKEY_LOCAL_MACHINE\Software\IminentToolbar HKEY_LOCAL_MACHINE\Software\Wow6432Node\IminentToolbar HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\112BA211-334C-4A90-90EC-2AD1CDAB287C HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\1FAFD711-ABF9-4F6A-8130-5166C7371427 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\1FAFD711-ABF9-4F6A-8130-5166C7371427 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\A09AB6EB-31B5-454C-97EC-9B294D92EE2A HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\0C3DD791-1026-4B03-8085-34EFB8CE1BBF HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\A76AA284-E52D-47E6-9E4F-B85DBF8E35C3 HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\DOMStorage\iminent.com HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Approved Extensions, value: 112BA211-334C-4A90-90EC-2AD1CDAB287C HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Approved Extensions, value: 1FAFD711-ABF9-4F6A-8130-5166C7371427 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\FinishInstall igdhbblpcellaljokkpfhcjlagemhgjl HKEY_LOCAL_MACHINE\Software\Classes\Installer\Products\E396BA1A8EBEBBB43A064AB3ED340563 HKEY_LOCAL_MACHINE\Software\Classes\Installer\Features\E396BA1A8EBEBBB43A064AB3ED340563 SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules, value: CC8D0DB8-9F7A-4ADA-8076-7B117B2ED858 SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules, value: F59D208C-5E1B-4F8C-9A78-8223FBD4063A SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules, value: CC8D0DB8-9F7A-4ADA-8076-7B117B2ED858 SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules, value: F59D208C-5E1B-4F8C-9A78-8223FBD4063A SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules, value: F59D208C-5E1B-4F8C-9A78-8223FBD4063A SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules, value: CC8D0DB8-9F7A-4ADA-8076-7B117B2ED858 HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\igdhbblpcellaljokkpfhcjlagemhgjl HKEY_LOCAL_MACHINE\Software\Wow6432Node\Google\Chrome\Extensions\igdhbblpcellaljokkpfhcjlagemhgjl HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\BFFED5CA-8BDF-47CC-AED0-23F4E6D77732 HKEY_LOCAL_MACHINE\Software\Classes\Installer\Features449B1EE14291541B3C4CDDE93B252A HKEY_LOCAL_MACHINE\Software\Classes\Installer\Products586FB55F67A9248BBFDC2D8B1D2398 HKEY_LOCAL_MACHINE\Software\Classes\Installer\Products449B1EE14291541B3C4CDDE93B252A HKEY_LOCAL_MACHINE\Software\Classes\Installer\UpgradeCodesEAE1F36DDB49FE49B1371401AAC7E1B HKEY_LOCAL_MACHINE\Software\Classes\Installer\UpgradeCodes\FAD0B0799202FD24D9B96C24C2BD169E HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodesEAE1F36DDB49FE49B1371401AAC7E1B HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\FAD0B0799202FD24D9B96C24C2BD169E HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Approved Extensions, value: 0F417468-BE40-472B-8CB9-A2CDA9A071D6 HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Approved Extensions, value: A6E9BAAF-53CD-4575-967B-2AF710A7D21F HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\0F417468-BE40-472B-8CB9-A2CDA9A071D6 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\84FF7BD6-B47F-46F8-9130-01B2696B36CB HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\A6E9BAAF-53CD-4575-967B-2AF710A7D21F HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\0F417468-BE40-472B-8CB9-A2CDA9A071D6 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\84FF7BD6-B47F-46F8-9130-01B2696B36CB HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\A6E9BAAF-53CD-4575-967B-2AF710A7D21F HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\A6E9BAAF-53CD-4575-967B-2AF710A7D21F HKEY_LOCAL_MACHINE\Software\America Online\AIM\Plugins\696E3174-4F6C-4777-7834-654C4A705677 HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\A6E9BAAF-53CD-4575-967B-2AF710A7D21F HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\c6137682-faae-4ea5-a6ab-88acb29d3667 HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run, value: Iminent.Notifier HKEY_LOCAL_MACHINE\Software\Wow6432Node\America Online\AIM\Plugins\696E3174-4F6C-4777-7834-654C4A705677 HKEY_LOCAL_MACHINE\Software\Classes\AppID\Iminent.MMServer.EXE HKEY_LOCAL_MACHINE\Software\Classes\AppID\Iminent.WinCore.Aim.Plugin.DLL HKEY_LOCAL_MACHINE\Software\Classes\AppID\13C8734A-1AD2-4500-9F65-10D99AD80F54 HKEY_LOCAL_MACHINE\Software\Classes\AppID\C2A66189-05A0-4D30-8DD2-CF4C86E38863 HKEY_LOCAL_MACHINE\Software\Classes\AppID\CE187331-35C5-4917-A79B-25342D466651 HKEY_LOCAL_MACHINE\Software\Classes\AppID\F90A8B2A-0EE0-4C04-8DFB-91A3381E5A71 HKEY_LOCAL_MACHINE\Software\Classes\IminentBHONavigationError.CHelperBHO HKEY_LOCAL_MACHINE\Software\Classes\IminentMMServer.ACPlayer HKEY_LOCAL_MACHINE\Software\Classes\IminentMMServer.ACPlayer.1 HKEY_LOCAL_MACHINE\Software\Classes\Wow6432Node\AppID\Iminent.BHO.NavigationError.DLL HKEY_LOCAL_MACHINE\Software\Classes\Wow6432Node\AppID\Iminent.LinkToContent.DLL HKEY_LOCAL_MACHINE\Software\Classes\Wow6432Node\AppID\Iminent.MMServer.EXE HKEY_LOCAL_MACHINE\Software\Classes\Wow6432Node\AppID\Iminent.WinCore.Aim.Plugin.DLL HKEY_LOCAL_MACHINE\Software\Classes\Wow6432Node\AppID\13C8734A-1AD2-4500-9F65-10D99AD80F54 HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\AppID\Iminent.BHO.NavigationError.DLL HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\AppID\Iminent.LinkToContent.DLL HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\AppID\Iminent.MMServer.EXE HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\AppID\Iminent.WinCore.Aim.Plugin.DLL HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\AppID\13C8734A-1AD2-4500-9F65-10D99AD80F54 HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\AppID\C2A66189-05A0-4D30-8DD2-CF4C86E38863 HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\AppID\CE187331-35C5-4917-A79B-25342D466651 HKEY_LOCAL_MACHINE\Software\Classes\Installer\Features\C73660D04266C3348A703CD454AD1B48 HKEY_LOCAL_MACHINE\Software\Classes\Installer\Products\C73660D04266C3348A703CD454AD1B48 HKEY_LOCAL_MACHINE\Software\Classes\Installer\Products86028EAE6ABEC44BE58148A174F21E HKEY_LOCAL_MACHINE\Software\Wow6432Node\Google\Chrome\Extensions\ehhlaekjfiiojlddgndcnefflngfmhen HKEY_LOCAL_MACHINE\Software\Wow6432Node\Google\Chrome\Extensions\nbljechdpodpbchbmjcoamidppmpnmlc HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\ehhlaekjfiiojlddgndcnefflngfmhen HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\nbljechdpodpbchbmjcoamidppmpnmlc HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\DOMStorage\start.iminent.com HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\DOMStorage\adserver.iminent.com HKEY_LOCAL_MACHINE\Software\Wow6432Node\Google\Chrome\Extensions\adpeheiliennogfclcgmchdfdmafjegc HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\adpeheiliennogfclcgmchdfdmafjegc HKEY_LOCAL_MACHINE\Software\Wow6432Node\Google\chrome\Extensions\olghjjajidfdflkafeekiojnfmiolccp HKEY_LOCAL_MACHINE\Software\Google\chrome\Extensions\olghjjajidfdflkafeekiojnfmiolccp HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\setup3.iminent.com HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\setup2.iminent.com HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\DOMStorage\setup3.iminent.com
Read More
Upcoming comic book movies with release dates
upcoming comic moviesThe World of Superhero movies has gone through some interesting variations, from good ones to bad ones, from big-budget ones to small ventures, even from large well-known characters to niche ones. No matter what you think of some of them no one would disagree that since the release of Iron Man and starting Marvel cinematic universe superheroes movies exploded in popularity. Following the Superhero craze, let’s see what is coming up in comic books transferred to big screens with their release dates.

List of upcoming movies

Shang-Chi and the Legend of the Ten Rings, Sept. 3, 2021 Trailer Venom: Let There Be Carnage, Oct. 15, 2021 Trailer Eternals, Nov. 5, 2021 Trailer Spider-Man: No Way Home, Dec. 17, 2021 Trailer Morbius, Jan. 28, 2022 Trailer The Batman, March 4, 2022 Trailer Doctor Strange in the Multiverse of Madness, March 25, 2022 Thor: Love and Thunder, May 6, 2022 DC League of Super-Pets, May 22, 2022 Black Panther: Wakanda Forever, July 8, 2022 Black Adam, July 29, 2022 Trailer Spider-Man: Into the Spider-Verse 2, Oct. 7, 2022 The Flash, Nov. 4, 2022 The Marvels, Nov. 11, 2022 Aquaman and the Lost Kingdom, Dec. 16, 2022
Read More
Animated background on desktop on Windows 10
Windows Vista had in it animated wallpapers on desktop but sadly how they were heavy on system resources Microsoft abandoned the idea. Moving forward a couple of years later we have Windows 10 but still, we do not have live animated wallpapers. Since I am the kind of person who does not want to wait on Microsoft and now it is time to bring animated wallpapers back I am going to make one all by myself and you are welcome to join the ride and do the same for you as well. Enough talk, let's dive into how we can make animated wallpaper for our Windows 10.

Choosing the application

First, we will need some form of application which can we look at our animated wallpapers and since they are animations it means video, so we will need a video player and what better choice than a VLC player, an open-source light weighs all-format player. Get a VLC player from here and install it.

Finding video source

The next thing is to of course have some looping video that we will use as background. There are many sites and ways to get seamless loop videos, I use this youtube channel for my backgrounds. Altho you can use any video footage you want it is recommended that it is not too long, that it is hi-resolution so we do not have pixels on-screen, and if you can, get it as seamless since we do not want to see stutter when the video is lopped from the beginning. So hopefully you have desired video and VLC player installed.

Putting it all together

Copy the following code and paste it into your search bar in Windows to open the Startup folder, or navigate to the Startup folder yourself via file explorer if you know where it is. %appdata%\Microsoft\Windows\Start Menu\Programs\Startup Now, next thing is to copy and past the VLC shortcut into this folder so it is started when Windows is first time booted. Right-click on the shortcut and in the edit field paste this: "C:\Program Files\VideoLAN\VLC\vlc.exe" --video-wallpaper --qt-start-minimized --no-qt-fs-controller --repeat --no-video-title-show --qt-notification=0 "C:\videopath\filename.mp4" where "C:\Program Files\VideoLAN\VLC\vlc.exe" is the path where VLC is installed, point this to where you have installed it "C:\videopath\filename.mp4" is the path where you have your video that you wish to use as animated wallpaper. Please note also that in my case there is mp4 as an extension but it does not need to be mp4, just use any extension VLC can open and play.

Conclusion

And that's it, you have successfully made an animated background or live wallpaper on your Windows 10 computer. You can change your wallpaper anytime by editing shortcut and giving it a new path to a new video or simply overwrite the existing one with a new baring same name.
Read More
How to map a network drive in Windows 11
windows 11 network driveMapping network drive has many benefits in terms of speed and ease of access of files via network. It lets you access the hard drive over the whole network like it was the hard drive inside your PC case. In order to easily and quickly map a folder as a network drive follow the guide below.
  1. Open File Explorer
  2. Click on the three dots icon in the Toolbar
  3. Select Map Network Drive
  4. Click the Drive drop-down menu
  5. Select a driver letter that you wish to assign as a network drive
  6. In the folder field enter network device and share name (click on browse to see all devices on local network)
  7. Check the box beside Reconnect at sign-in if you wish to automatically connect to a network drive on Windows startup
  8. Check Connect Using Different Credentials if you wish to connect to a network drive using different credentials that one used to login into Windows.
  9. Click Finish
After finishing setting Windows 11 will try to connect to the network drive and if successful drive icon will appear inside File Explorer and the drive will open up to see its content. If for any reason it cannot connect try checking user credentials, cables, network adapters, etc.
Read More
How to fix Error 2753, The file is not marked
Installing programs on your Windows 10 computer does not go smoothly as you could encounter some issues along the way that could prevent you from successfully installing the program. One of the common errors you can encounter during the installation of programs is Error 2753. There are times when the packages are corrupted or those packages are not working properly or it wasn’t able to create files and paths. When you encounter this kind of error, you will get the following error message:
“Error 2753, The File is not marked for installation.”
Note that this kind of error is not bound to only some specific files but it can also happen with any file, be it an executable file or an MSI file. To fix this error, here are some possible solutions that you could try.

Option 1 – Fresh download the setup file

The first thing you can do is to fresh download the setup file from the official homepage and then place it in a different location. Just make sure that you download the correct setup file that’s compatible with your operating system. Then restart your computer and sign in as administrator. After that, right-click on the setup file and select the Run as administrator to proceed with the installation.

Option 2 – Try removing all the previous versions of the software

If there is a previous version of the program that’s still installed on your computer, you need to uninstall that program since it might be the reason why you’re getting Error 2753.
  • Tap the Win + R keys to open the Run dialog box
  • Then type “appwiz.cpl” in the field and hit Enter to open the Programs and Features in Control Panel.
  • From there, look for the previous version of the program you are trying to install, select it and then click on Uninstall to remove it.
  • After that, restart your computer and try to install the latest version of the program again. It should work now. If not, proceed to the next available option below.

Option 3 – Run the setup file as administrator

The setup file may need more permission in order to execute properly and so you need to run it as an administrator. To do so, you need to give it more privileges for it to work as intended by its developer.
  • Right-click on the setup file and select the Run as administrator option.
  • Afterward, a User Account Control or UAC prompt will appear and from there, click on Yes and then check if the file runs or not.
Note: If the setup file does not run, you may have to take ownership of the folder where the setup file is located. To take ownership of the folder, refer to these steps:
  • First, locate the concerned folder and right-click on it then select Properties.
  • Next, click on the Edit button in the Properties window and click OK to confirm if you got a User Account Control elevation request.
  • After that, select user/group from the permission windows or click on the Add button to add another user or group. It would be best if you add “Everyone” to give permission.
  • Then check “Full Control” under the “Allow” column to assign full access rights control permissions.
  • Now edit the permission to Full Control for “Everyone”.
  • Click OK to save the changes made and then exit.

Option 4 – Try running the setup file in Compatibility Mode

You may be getting Error 2753 if the setup file is not intended to run on the Windows 10 version you are using which is why you have to run it in Compatibility Mode. This will allow the setup file to think that it is running in a compatible environment as it is intended to.

Option 5 – Try to re-register the vbscript.dll file

You may have to re-register the vbscript.dll file using the regsvr32.exe before you can successfully install the program and fix Error 2753. The Regsvr32 tool is a command-line utility that can be used to register and un-register the OLE controls like DLL and ActiveX (OCX) control in the Windows operating system. Follow the steps below to use it.
  • Open Command Prompt as admin from the WinX menu.
  • Next, type exe vbscript.dll in the elevated Command Prompt and hit Enter to execute the command. This will re-register the affected DLL file using the Windows operating system tool, regsvr32.exe.
  • You should see a message saying, “DllRegisterServer in vbscript.dll succeeded” if the Regsvr32 tool was able to run successfully. After that, try to install the program again and see if it now works.
Read More
Automatically Turn Off Hotspot when idle
One of the useful features that came with Windows 10 is the Mobile Hotspot although there’s a downside to it – it drains your battery faster especially if your Windows 10 device is running on battery. Another one of its flaws in the implementation of this feature is that it stays activated even when the connection is idle. In other words, it is still activated even if no devices are connected to it. As a result, it consumes battery life and affects it. There are also instances when it affects the performance of the network connection. At the time of writing, Microsoft hasn’t done anything about this dilemma yet so in the meantime, you can continue reading this post to resolve this issue on your Windows 10 device. You can remedy this Mobile Hotspot issue by running a command in Windows PowerShell. To get started, follow the given instructions below.

Turn off Mobile Hotspot Automatically:

Step 1: The first thing you have to do is to copy the following command:
powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/s,/c,net stop "icssvc" & REG ADD "HKLMSYSTEMCurrentControlSetServicesicssvcSettings" /V PeerlessTimeoutEnabled /T REG_DWORD /D 1 /F & net start "icssvc"' -Verb runAs"
Step 2: After copying the command given above, open the Notepad app and paste the command you copied there and save it. And when saving it, select the “Save as” option and its File type as “All files”. Step 3: After that, put “TurnOnTimer.bat” as the file’s name and save it on your Desktop. Step 4: Once done, run the file you just created, and when a User Account Control or UAC prompt appears, just click on Yes. Step 5: After you run the file, it will run a series of scripts in a command line which will turn off the Mobile Hotspot automatically when idle. And that’s how you automatically turn off the Mobile Hotspot when your Windows 10 device is idle. On the other hand, if you want to undo the changes made, you can always do so using the steps provided below.

Turn on Mobile Hotspot:

Step 1: Copy and paste the following command in the Notepad app:
powershell -windowstyle hidden -command "Start-Process cmd -ArgumentList '/s,/c,net stop "icssvc" & REG ADD "HKLMSYSTEMCurrentControlSetServicesicssvcSettings" /V PeerlessTimeoutEnabled /T REG_DWORD /D 0 /F & net start "icssvc"' -Verb runAs"
Step 2: After copying and pasting the command, save it as “TurnOffTimer.bat” on the Desktop. Step 3: Once done, run the file like what you did earlier and select Yes when a UAC prompt pops up. This will run a series of scripts on a command line which will revert the changes back to their default state.
Read More
Fix Boot Device Not Found Error in Windows
If you encounter an error saying, “Boot Device Not Found” when you turn on your Windows 10 computer, then you’ve come to the right place as this post will guide you on how you can fix this problem. Apart from the error message, you will also see a message that states, “Please install an operating system on your hard disk, Hard Disk<xxx>”. You will then be asked to tap the F2 key to initiate the System Diagnostics. If you install the Windows operating system, it becomes the boot device, and when your computer boots, the UEFI or the BIOS looks for the operating installed on your drive and continues the process. So when you encounter the “Boot Device Not Found” error, this means that the UEFI or the BIOS wasn’t able to locate the drive where it can boot. There are several suggestions you can check out to resolve this error. You can try checking the connection with your boot drive or change the boot order. You can also fix the Boot Record from Recovery and see if the primary partition is active or not. But before you troubleshoot the problem, make sure that you have a bootable Windows USB drive ready since two of the options provided below will require you to boot into the Advanced Recovery mode. Once you have this covered, proceed to each one of the following options.

Option 1 – Try checking the connection with the boot drive

If you have a custom computer that comes with a cabinet, you might want to open it and remove any connected power supply, and then check the wires. As you know, drives are connected with the motherboard using a cable. So all you have to do is check if both ends are connected properly and make sure that the connection is not loose. You could also try to unplug the cable and plug it back in.

Option 2 – Try changing the boot order

You might also want to try changing the boot order of your computer. Each time a computer boots, the BIOS or the UEFI follows a boot order. It is the one that tells where to first look for the boot drive and if for some reason, a USB is connected to your computer and the first boot device found in the USB, then you have resolved the problem. All you have to do is to remove the USB device and boot or go into the BIOS and change the boot order yourself.

Option 3 – Try to rebuild the BCD files

The next thing you can do to resolve the issue is to Rebuild Boot Configuration Data or BCD files.
  • You can start by booting into the installation environment for Windows 10 from an installation media.
  • After that, click on Repair your computer and on the blue screen, select Troubleshoot and then select the Advanced options menu.
  • From there, select Command Prompt and once you open it, enter each one of the commands given below by sequence.
    • bootrec /FixMbr
    • bootrec /FixBoot
    • bootrec /ScanOS
    • bootrec /RebuildBcd
  • Once you’re done executing the commands given above, type “exit” to close the Command Prompt window and then restart your computer and see if it fixed the “Boot Device Not Found” error.

Option 4 – Try setting the System Partition to Active

Like the first given option, you also have to make sure that you have a bootable Windows 10 USB drive before you proceed to set the System Partition to Active. Once you have it covered, refer to these steps:
  • Boot your computer using the bootable Windows 10 USB drive.
  • Next, click Next when you get to the Welcome Screen.
  • Then click on Repair your computer located at the bottom left part of the window and select Troubleshoot > Advanced Options > Command Prompt.
  • After opening Command Prompt, type the following command and hit Enter to start the Diskpart utility. It is a command line-based utility just like Command Prompt but has a UAC prompt once you provoke it. So if you encounter a UAC prompt, just click on Yes to proceed.
diskpart
  • Now type the following command:
list disk
  • From there, select your primary disk by typing the following command:
select disk number
  • After that, list all the partitions on the selected disk by entering the following command:
list partition
  • The command you just entered will list all the partitions created on your PC including both types of partitions that are visible to a normal user in the File Explorer as well as the ones created by Windows 10 by default which helps it in storing the boot files and other important system files.
  • Now type the following command to select the partition that is usually around 100 MB in size:
select partition number
  • Finally, type the following command to mark the partition active:
active
  • Then type the “exit” command to exit the disk part utility.
Once it’s done, the primary drive should now be active and you should now be able to boot into your computer without the “Boot Device Not Found” error.
Read More
Unhandled Exception occurred in Application
If you encountered an error message that says, “Unhandled exception has occurred in your application”, when you start your Windows 10 computer, read on as this post will guide you on how you can fix it. This kind of error usually appears in a Microsoft .NET Framework window and it mostly pops up as soon as you turn on your computer. Here’s the complete context of the error message:
“Unhandled exception has occurred in your application. If you click Continue, the application will ignore this error and attempt to continue. If you click Quit, the application will close immediately.”
When this error occurs, your computer may freeze or display other suspicious behavior at times. Either way, there are several options you can check out in this post to resolve this issue, so read on. This kind of error could be caused by several factors. It could be due to your antivirus program or other third-party programs installed on your computer. It is also possible that the installation of the Microsoft .NET framework id corrupted or some of its installation files are corrupted. Thus, to fix the error, there are a few suggestions you need to follow such as:

Option 1 – Try to temporarily disable your anti-virus program

As mentioned, the error could be due to the antivirus program or the Windows Defender Firewall installed on your computer. Thus, disabling them or any security software installed in your computer is always a good idea you can try when you’re not able to access the shared drive in your computer. There are times when you encounter problems like the “Unhandled exception has occurred in your application” error due to interference of antivirus or security programs. Thus, you have to disable both your antivirus program in the meantime and check if it fixes the error or not.

Option 2 – Put your computer in a Clean Boot State

As pointed out, it is possible that some third-party program or service is the one that’s behind the problem. To isolate this possibility and to identify the culprit, you have to put your computer into a Clean Boot State. To do so, follow the steps below.
  • Log onto your PC as an administrator.
  • Type in MSConfig in the Start Search to open the System Configuration utility.
  • From there, go to the General tab and click “Selective startup”.
  • Clear the “Load Startup items” check box and make sure that the “Load System Services” and “Use Original boot configuration” options are checked.
  • Next, click the Services tab and select the “Hide All Microsoft Services” check box.
  • Click Disable all.
  • Click on Apply/OK and restart your PC. (This will put your PC into a Clean Boot State. And configure Windows to use the usual startup, just simply undo the changes.)
  • Once your computer has restarted, check if the error is now gone. If it is, then the culprit is some third-party program. Thus, you have to enable the third-party programs one by one to find out which one of them is causing the the “Unhandled exception has occurred in your application” error.

Option 3 – Try to run a System File Checker scan

System File Checker or SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files with good system files that might be the cause why you’re getting the “Unhandled exception has occurred in your application” error. To run the SFC command, follow the steps given below.
  • Type “cmd” in the Start search and then right-click on the appropriate search result.
  • Next, select “Run as administrator” to open Command Prompt with admin privileges.
  • After opening Command Prompt, type in sfc /scannow
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.
  • Now restart your computer and see if the problem is fixed or not.

Option 4 – Install and update Dependencies

There are times when programs and applications need to have drivers and supporting software installed for them to properly work. Although the installation usually takes care of it, it’s time for you to do some manual check especially if you are getting this issue of abnormal program termination.
  • Install some qualified drivers – A number of high-end games and applications need to have correct and valid drivers for them to work. They just don’t work with general drivers though. Microsoft has this Windows Hardware Quality Labs testing also known as WHQL testing which makes sure that drivers meet the correct experience and pass through the proper testing before certification. Thus, when installing drivers, you need to ensure that they are qualified drivers for your Windows 10 PC.
  • Download and install or Update DirectX – As you know, Microsoft DirectX is a suite of technologies developed by Microsoft to provide hardware acceleration for heavy multimedia applications like HD videos and 3D games. Since you are using Windows 10, you have the DirectX 12 version while the earlier Windows versions use the DirectX 11 version.
  • Install the Microsoft DirectX End-user runtime – The Microsoft DirectX end-user runtime gives updates to version 9.0c as well as previous versions of DirectX. To install it, click on this link and download it.
  • Update or install the .NET framework – The .NET framework is used by games and applications during development which means that without the runtime files that are installed in your computer, it definitely won’t work. Thus, you need to install or update this framework. You can also use the .NET setup verification tool to verify it.
Read More
Windows 11 android apps update

One of the selling points of Windows 11 was the ability to run Android apps natively in it without the need for any third-party software. It is not a big surprise that even after its release Microsoft is evolving and expanding Windows 11 and its features.

Windows 11 Android apps

Microsoft is now rolling out an update for the Windows Subsystem for Android on the Dev Channel of the Windows Insiders program. The new version upgrades the core operating system from Android 11 to Android 12.1 (also known as Android 12L), which means the new system and app features in Android 12 and 12.1 are now available on Windows for the first time. However, not the new features in those updates apply to the modified version that runs on top of Windows. For example, one of the main improvements in 12.1 was a dual-pane notification panel for larger screens, but Android app notifications on Windows just show up in the Windows notification panel.

The upgrade also improves how Android apps integrate into Windows. The Windows taskbar will now show which Android apps are currently using the microphone, location, and other system services — similar to many native Windows applications. Toasts messages (the small popups that some apps use for temporary messages) are now displayed as Windows notifications, and the titlebar on Android apps will use the current activity name for the title.

Full changelog

  • Windows Subsystem for Android updated to Android 12.1
  • Advanced networking on by default for newer x64 Windows builds
  • Updated Windows Subsystem for Android Settings app: redesigned UX and diagnostics data viewer added
  • Simpleperf CPU profiler recording now works with Windows Subsystem for Android
  • Windows taskbar now shows which Android apps are using microphone and location
  • Improvements to Android app notifications appearing as Windows notifications
  • Reduced flicker when apps are restored from minimized state
  • Apps are not restarted when devices come out of connected standby on recent Windows builds
  • New video hardware decoding (VP8 and VP9)
  • Fixes for on-screen keyboard in apps
  • Fixes for full-screen Android apps and auto-hidden Windows taskbar
  • Windows Subsystem for Android updated with Chromium WebView 100
  • Added support for Android NetworkLocationProvider in addition to GpsLocationProvider
  • Improved general stability, performance, and reliability

The new update is limited to Windows Insiders for now, but once Microsoft fixes all the bugs, it should start rolling out to everyone on Windows 11 that has the Android Subsystem enabled.

Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status