A lot of things can go wrong even when you’re only doing some simple operations or tasks on your computer and this is due to the fact that there are various small operations make up in order to perform the larger operations on your computer. So if any of these smaller operations are not properly working, it crashes the operation as a whole and it throws an error code instead. And one of these error codes is Error 0x800701e3. This particular error pops up when an error has occurred in the File Explorer when a transfer is initiated from one disk to another in your Windows 10 computer. When you encounter this error, you will get the following error message:
“Error 0x800701e3: The request failed due to a fatal hardware error.”
There are several methods you can check out to fix this error – you can try to run System Restore or Check Disk or format the destination drive or check the SMART attribute of the drive. For more details, refer to each one of the following options.
Option 1 – Try to run System Restore
Error 0x800701e3 might be due to some adjustments you’ve made in your computer’s settings. Thus, to fix this error, you can try undoing those changes using System Restore. How? Refer to these steps:
Tap the Win + R keys to open the Run dialog box.
After that, type in “sysdm.cpl” in the field and tap Enter.
Next, go to the System Protection tab then click the System Restore button. This will open a new window where you have to select your preferred System Restore point.
After that, follow the on-screen instructions to finish the process and then restart your computer and then check if your mouse is now back to its normal state.
Option 2 – Try running the Check Disk utility
You can also run the Check Disk utility in fixing Error 0x800701e3.
In the Windows Search box, type “command prompt” and from the search results, right-click on Command Prompt and select “Run as administrator”.
After opening Command Prompt, type this command and tap Enter: chkdsk <Partition Letter>: /f /r /x /b
The command you entered will start to check for errors and fix them automatically. Else, it will throw an error message saying, “Chkdsk cannot run because the volume is in use by another process. Would you like the schedule this volume to be checked the next time the system restarts? (Y/N)”.
Tap the Y key to schedule Disk Check the next time your computer restarts.
Option 3 – Try to format the destination drive
Formatting the destination drive could also help you resolve error 0x800701e3. To format your drive, follow these steps:
First, open File Explorer and then right-click on the drive where you encountered the error.
Next, select Format from the context menu. This will open a new mini window.
Then select the NTFS option from the drop-down menu for the File System menu.
After that, check the box labeled as Quick Format.
Now click on Start. Keep in mind that doing so will remove all the contents of your storage device.
Option 4 – Verify the hard drive using SMART attributes
In case you don’t know, Windows has a built-in feature of SMART analysis which analyzes the hard drive/SSD and checks all the parameters by performing some minor operations. To use it, follow these steps:
Tap the Win + S keys and type “command prompt” in the field then right-click on the related search result and select the “Run as administrator” option.
After opening Command Prompt as admin, type the “wmic diskdrive get status” command and hit Enter.
You should get a result after that, and if you see that it’s “normal”, proceed to the next option below
Error Code 100?? Whenever a Setup error contains error codes in the message, this indicates what the setup was operating on, let’s say copying files.
The text in the error message will determine whether that it is fatal or not. An error code 100 is a system error that is displayed as ‘ERROR_TOO_MANY_SEMAPHORES’ or as a value 0x64.
This error means that the system ‘cannot create another system semaphore.’ A semaphore is used in controlling access to parallel programming or a multi-user platform through multiple processes.
This error can prevent certain features of your Windows to perform properly, like trying to get a print, copying files, deleting files, or any other routine computer activities.
Solution
Error Causes
Error code 100 can affect a wide range of activities that you normally perform on your PC. This error can occur for a number of reasons, of which some of the common ones include:
When the account used for starting AOS does not match the database in SQL Server
When the AOS licenses have exceeded their limit
When the SQL Server database is incorrectly case sensitive
Though these are the common causes for error code 100, there can be other ways through which this error can occur. To find out the specific cause for error code 100, follow these steps:
Go to Start and select All Programs. Go to Administrative Tools and click Even Viewer
Click Application in Even Viewer
Locate the error message in the right pane by scrolling down
Click on the error message and see if the message applies to the error code.
Further Information and Manual Repair
In order to manually repair this error, you will have to work with your Network Administrator as they will have security privileges to take the steps. However, there are more than one ways to resolve this issue, for instance:
Starting SQL Server Service
A likely cause of an error code 100 can be that your SQL Server service is not started. To activate it, follow these steps:
Got to Start and Click on All Programs, go to Administrative Tools and click on Services
Find SQL/MSSQLServer service
Right Click on it and click Start to activate the service
Network Resolve
If you are connected to a network, then you can work with your network administrator to fix error code 100. Follow these steps to resolve this error:
Got to Start and then Run. Type dcomcnfg and press Enter
Locate Default Security and click it
Find Default Access Permissions and click Edit Default
You should locate System and Interactive, listed in the Allow Access. If they’re not listing, you can add them by clicking Add
Find the local computer in the list and click on Allow Access
New malware with extensive spyware capabilities steals data from infected Android devices and is designed to automatically trigger whenever new info is read to be exfiltrated. The spyware can only be installed as a 'System Update' app available via third-party Android app stores as it was never available on Google's Play Store. This drastically limits the number of devices it can infect, given that most experienced users will most likely avoid installing it in the first place. The malware also lacks a method to infect other Android devices on its own, adding to its limited spreading capabilities.
However, when it comes to stealing your data, this remote access trojan (RAT) can collect and exfiltrate an extensive array of information to its command-and-control server. Zimperium researchers who spotted it observed it while "stealing data, messages, images and taking control of Android phones."
What happens when malicious software is installed
"Once in control, hackers can record audio and phone calls, take photos, review browser history, access WhatsApp messages, and more," they added. Zimperium said its extensive range of data theft capabilities includes:
Stealing instant messenger messages;
Stealing instant messenger database files (if the root is available);
Inspecting the default browser's bookmarks and searches;
Inspecting the bookmark and search history from Google Chrome, Mozilla Firefox, and Samsung Internet Browser;
Searching for files with specific extensions (including .pdf, .doc, .docx, and .xls, .xlsx);
Inspecting the clipboard data;
Inspecting the content of the notifications;
Recording audio;
Recording phone calls;
Periodically take pictures (either through the front or back cameras);
Listing of the installed applications;
Stealing images and videos;
Monitoring the GPS location;
Stealing SMS messages;
Stealing phone contacts;
Stealing call logs;
Exfiltrating device information (e.g., installed applications, device name, storage stats).
How does it work?
Once installed on an Android device, the malware will send several pieces of info to its Firebase command-and-control (C2) server, including storage stats, the internet connection type, and the presence of various apps such as WhatsApp. The spyware harvests data directly if it has root access or will use Accessibility Services after tricking the victims into enabling the feature on the compromised device. It will also scan the external storage for any stored or cached data, harvest it, and deliver it to the C2 servers when the user connects to a Wi-Fi network. Unlike other malware designed to steal data, this one will get triggered using Android's contentObserver and Broadcast receivers only when some conditions are met, like the addition of a new contact, new text messages, or new apps being installed.
"Commands received through the Firebase messaging service initiate actions such as recording of audio from the microphone and exfiltration of data such as SMS messages," Zimperium said.
"The Firebase communication is only used to issue the commands, and a dedicated C&C server is used to collect the stolen data by using a POST request."
Camouflage
The malware will also display fake "Searching for the update.." system update notifications when it receives new commands from its masters to camouflage its malicious activity. The spyware also conceals its presence on infected Android devices by hiding the icon from the drawer/menu. To further evade detection, it will only steal thumbnails of videos and images it finds, thus reducing the victims' bandwidth consumption to avoid drawing their attention to the background data exfiltration activity. Unlike other malware that harvests data in bulk, this one will also make sure that it exfiltrates only the most recent data, collecting location data created and photos taken within the last few minutes.
If you would like to read more helpful articles and tips about various software and hardware visit errortools.com daily.
SMB which stands for “Server Message Block”, is a protocol used for file sharing. It provides the Read and Writes operating on network devices. Thus, it is why it is widely used when accessing a server-based in Linux. Its latest version is the SMB2 which follows after SMB1. The SMB2 contains more fixes to vulnerabilities that were found in SMB1. The predecessor was vulnerable since it served as a gateway to various modern ransomware which is why Microsoft disabled it by default starting with Windows 10 v1709.
When you try to share a file, you will get the following error message:
“Microsoft Windows Network: You can’t connect to the file share because it is not secure. This share requires the obsolete SMB1 protocol, which is unsafe and could expose your system to attack. Your system requires SMB2 or higher.”
In this post, you will be guided on how to check if the SMB2.0 version can be installed on your Windows 10 computer. To get started, follow the steps below.
Step 1: Tap the Win + X keys to open the Device Manager.
Step 2: After that, click on the Windows PowerShell (Admin) option.
Step 3: In the Windows PowerShell window, type the following command and hit Enter:
Note: After entering the command, you will see the following content on your screen which means that your Windows 10 computer is now capable of running the SMB2 protocol
Now all that’s left for you to do is to enable the SMB 2 protocol on your Windows computer by enabling the SMB 1 protocol first and then upgrading it to SMB 2 afterward. Refer to the steps below for more details.
Step 1: Tap the Win + I keys to open the Settings app.
Step 2: Then type in “control panel” in the search area and click on Control Panel from the search results.
Step 3:After opening Control Panel, click on Programs. From there, select the “Turn Windows features on or off” option under the larger menu of Programs and Features.
Step 4: After that, Windows Features will appear on your screen. And from there, make sure that you select SMB 1.0/CIFS File Sharing Support and then click on OK.
Step 5: Now let it install all the required files and then restart your computer to apply the changes made successfully. After your computer has restarted, the SMB 2 protocol should now be supported on your Windows 10 computer.
Note: On the other hand, you can also enter the following command in the Windows PowerShell window. Just make sure you have admin rights to enable it.
The WidgiToolbar is an unscrupulous application designed to advertise other applications as a part of a bundle, steal financial information and penetrate the security of a computer system, making it open to other threats. In most cases, WidgiToolbar claims to center its installs on toolbars but that’s not always the case.
Technical details about WidgiToolbar Malware include:
Digital Publisher: GreenTree Applications srl
Product Version: YTD Video Downloader 4.8.9.7
Original File Name: YTDStub.exe
Entry Point: 0x0000323C
Assessment of WidgiToolbar
Created by GreenTree Applications/ Spigot Inc., the WidgiToolbar is a list of nested toolbars. This application was in fact a bundle, installing several other applications upon installation. For this installation, WidgiToolbar installed only the YouTube Downloader toolbar and several other applications. Thereafter, the application appeared pretty harmless but is intended on distributing advertisements over the user’s computer, often without the user’s discretion. It’s all in the ads.
Additionally, based on evaluations made by Security Analysts, the WidgiToolbar application is used for extracting personal and financial information from a user’s computer system. Financial information encapsulates banking and credit card details. Your passwords and other highly confidential information might be detected by the WidgiToolbar application if care is not taken.
Overall, the WidgiToolbar installs and collects information from your computer system without your knowledge and permission. Furthermore, WidgiToolbar leaves a computer system vulnerable and susceptible to other threats and malware. The application is known for opening a portal or door into your computer system. This implies that other software can be installed on your computer via this avenue, once again without your knowledge.
Responsible for wreaking havoc on your computer, it’s then pertinent that you remove it altogether. Manually removing the WidgiToolbar is not an option. Why? A manual removal procedure will not be able to remove the software in its entirety. An automated tool is the best option.
Like all other programs offered as a bundle, several other programs were installed. These include:
MS Build
Reference Assemblies
PRO PC Cleaner
Soon after the installation of WidgiToolbar was completed, there were a total of four (4) new applications installed on the computer. These were all found in the computer's Local Drive.
After WidgiToolbar was installed, the application attempted to change the default search provider to search.yahoo.com. This was a clear indication that this was a promotion to get more Internet users to use the Yahoo search engine.
Why Use Spyhunter to Remove WidgiToolbar?
As a result of its nature, the WidgiToolbar is difficult to remove. You might be able to remove other programs that were manually installed within the bundle, but to remove WidgiToolbar completely; an automated tool is a necessity. This is to ensure that specific registry keys installed by WidgiToolbar are found and removed.
To completely remove WidgiToolbar from your computer, click here to download and install Spyhunter.
After a scan was done with Spyhunter, there were 330 threats detected. Spyhunter was able to remove all 330 threats with ease and success.
In today's modern world many households have internet access, most of the connection nowadays is done via Wi-Fi or wireless but there is a high probability that you have also a few devices connected via cable. There are of course many disadvantages and advantages between cable connection and wireless connection.
The main advantages of a hard cable connection are of course faster speed and stability compared to Wi-Fi. But if we look into the cables themselves there is also a big difference between them. Not all cables are the same and quality as well as speed vary a lot between them. Choosing the right cable is essential in order to make a maximum of your internet and we have some great tips and explanations of what cables do so you can make the right choice and enjoy your full internet potential.
Not all cables are the same
Cheap cables and expensive ones are not the same no matter what everyone tells you. The old proverb you get what you pay is true and more expensive cables will be made from better materials and will have a higher transfer rate.
Quality network cables are separated into different categories with proper markings and when buying one you should always look for these markings on the cables themselves, do not buy cables that do not have markings since they will often provide lower transfer rates or will not be shielded from outside influences resulting in packet drops and instability in a network.
Categories and what they mean are:
Cat-5 with a maximum speed of 100Mbps, typically unshielded.
Cat-5e with a maximum speed of 1Gbps, available in both shielded and unshielded varieties.
Cat-6 with a maximum speed of 10Gbps for runs under 55 meters (around 180ft), available in both shielded and unshielded varieties.
Cat-6a with a maximum speed of 10Gbps, shielded.
Cat-7 uses a proprietary GG45 connector rather than the standard RJ-45 connector seen on other cables for speeds of 10Gbps, shielded.
Cat-8 with a maximum speed of 25Gbps (Cat-8.1) or 40Gbps (Cat-8.2) at a distance of around 30 meters (around 100ft), shielded.
Unless stated, these standards are typically rated at their quoted speeds for a run of around 100 meters (around 330 ft) and use a standard RJ-45 Ethernet connector. Each generation of cable is designed to be compatible with the generations that came before it, so it’s possible (for example) to use a Cat-6a cable with a router that only supports speeds of 1Gbps.
Shielded cables
When purchasing higher quality cable you might not be able to choose if you have shielding or not since some standards like Cat-6a, Cat-7, and Cat-8 are always shielded. But if you do not have the need for these and you are satisfied with Cat-5e for example you can choose.
Shielded cables are a little more expensive but they will provide you with a coating that will eliminate interference from outside waves making cables more reliable. Of course, if the cable will go through a room that does not have many radio waves or some other interferences then buying a shielded cable is a waste of money.
Cable platings
Usually, there are two types of connector platings on connectors, silver, and gold, and people usually think that gold is much better but there are major differences between silver and gold platings and truth to be told there is no better one, both are different and should be considered depending on your need.
Silver plating will provide you with faster speed since its conductivity is larger than gold, but gold is slower on the oxidation front so its life span is longer. On the other hand, if your cables are always connecting and disconnecting gold will be first to be scrubbed off from the surface since the gold coating is much thinner.
Overall if you would only connect cable once and have slower internet than cable capacity gold is the way to go, in another case if you would use the cable as always connecting and switching and your internet plan is the same as cable transfer capacity you might want to go with silver one.
Cable material quality
Network cables are made from copper, your standard conduction material but even here there are differences in quality and therefore the chance of pocket losses over it. More quality less loss and more stable connection and this will depend on the purity of copper that is used in the cable itself. More purity in copper, more stability, simple as that.
Conclusion
So as you can see, there are a lot of different things that will influence your pick of proper network cable but the overall best advice is to get one that will fit well into your needs and setup. pair it up with your router and your internet plan since just simply buying something that you can not use is really a waste of money.
Windows 11 release date is closing in, some people have tried it via insider build, some have decided not to. It has come to our attention that there is a little website made by BlueEdge that offers a virtual Windows 11 desktop.
Opening the Website will put you right inside Windows 11 desktop, now take note that this is not Windows 11, it is a simulation of Microsoft’s newest OS and therefore many things will not work like File Explorer, etc.
One thing you can make sure it is working is UI itself, you can see how you do like the new Taskbar, start menu, widgets, and some other things. You can just pop up on the site and check how you do like the overall new look and feel of Windows 11 UI before installing it or trying it.
We are sure that many more options will come in time but even now you can get a feel of the newest OS.
Windows 11 BlueEdge site: https://win11.blueedge.me/
Windows 10 has displayed one of the most efficient and user-friendly interfaces. However there have been many issues on the backend of this commonly praised operating system: For example, Windows Update is still a wonky and error-laded system application. One example of this error is Windows Update Error 0x80073712 which stands in the way of users just wanting to keep their PCs updated hassle-free.
The error code 0x80073712 signifies that a file needed by Windows Update to function is either damaged, missing, or corrupted. However, this does not mean that your Windows version will forever stay as-is with no mode to update it. Windows Update Error 0x80073712 is perfectly fixable with the set of provided steps below and some of Windows’ built-in troubleshooting steps:
Solution 1: Open Windows Update Troubleshooter
Open the Windows Update Troubleshooter by pressing the Windows and S keys simultaneously.
Enter the word “Troubleshoot” in the search box and select the Troubleshoot result
On the new window, select “Windows Update” to troubleshoot.
Run the troubleshooter, then open Windows Update and try to install the update again.
Solution 2: Run the DISM tool
Open the command prompt by pressing Windows and S keys simultaneously
Enter “cmd” in the search box. Right Click command prompt among the results and select “Run as administrator”
In the Command Prompt window type the following and press the Enter key after every command
To close the Administrator: Command prompt window, type Exit, and then press Enter.
Run Windows Update again.
Solution 3: Rename the Software Distribution folder
Open the command prompt as previously mentioned
Input the following command pressing Enter after every linenet stop wuauservnet stop cryptSvcnet stop bitsnet stop msiserverrename c:/windows/SoftwareDistribution/softwaredistribution.oldnet start wuauservnet start cryptSvcnet start bitsnet start msiserverexit
Restart the PC and run the updater if it works again.
Solution 4: Restart Windows Update Services
Press the Windows logo key and R together to open Run -> Input services.msc -> and press Enter
Search for the Windows Update service -> Check its status
If it is not indicated, right-click on the service and select Start to force start your Windows Update
If you see an error, locate the Startup Type option and set it to Automatic
Now you should reboot your computer and see if your Windows Update is OK
Solution 5: Fix Registry Issues
If after all the aforementioned solutions, you still experience problems with Windows Update, the problem may lie in the registry that is either damaged or corrupted. You may choose to do manual editing of your Windows registry by opening your Windows registry editor. But doing so is risky as one wrong letter may do incalculable damage to your system. To do so safely for more inexperienced users we recommend using a third-party registry cleaner/tools, many of which can be found online.
As a digital creation of Blueis, the DownloadAdmin application peruses your computer system for programs/applications that are outdated. This program then makes the necessary updates/installation on your computer, as if it were the Administrator. While most people might consider this application harmful, scrutinizing the Digital Publisher/Creator of the application should be reason enough to remove DownloadAdmin (and any other associated program) from your computer. Why? Blueis is infamous for producing/distributing “adware type software”, according to herdProtect Anti-Malware. Is that not a plausible reason for you to remove applications associated with that publisher? Additionally, DownloadAdmin not only updates your outdated applications, but it installs additional programs - usually utility tools and search toolbars. This is a sly way to promote third-party software and to get ads loaded onto your computer system.
Technical details about DownloadAdmin include:
Digital Publisher: Blueis
Product Version: 4.0.0.1
Original File Name: DownloadAdmin
Entry Point: 0x0000234A
Assessment of DownloadAdmin
For this assessment, the DownloadAdmin file was obtained and installed on a test computer. After the DownloadAdmin/Updateadmin application was installed, it made several modifications to the computer system. These modifications may class the newly installed file as a PUP (potentially unwanted program). Outlined below is what took place after the file was installed.
Updated an outdated application installed on the computer
Subsequent to the update made by Updateadmin, I thought the PUP had run its course. However, it was not quite finished. It was after scanning the contents/programs of my Local Drive, I stumbled on an additional program, one that I did not download or install, at least not intentionally. As predicted, the DownloadAdmin application scanned through the computer system (in the blink of an eye), during installation and made adjustments to an application already installed. This program was the Mozilla Firefox. Since Mozilla Firefox was rarely used on the PC in question, the DownloadAdmin application thought it quite appropriate to revive the Mozilla Firefox browser, by replacing it with the latest or more contemporary version.
Installed a search toolbar
While DownloadAdmin did request permission to install an updated version of my Browser, it provided no warning about installing a search toolbar. This is quite shady and deceptive. In addition to updating the Internet Browser, DownloadAmin also installed the SearchProtect toolbar (Conduit). This toolbar is no stranger to the market as I’ve encountered it on several occasions during my assessment of malware.
Should you remove DownloadAmin?
That decision is totally yours to make. However, here are some reasons why most people would consider that program unwanted
It updates your outdated programs
In most cases, at least those I’ve seen, if a user has a program installed, they don’t necessarily want a new version of that program. In fact, this PUP could spell trouble since some programs, especially paid, require a license to use the software. When that program is updated/ upgraded, you might have to acquire a new license to get it to work.
Unnecessary program
If you’re totally lackadaisical and loathe the idea of doing work yourself, this program might come in handy. Many users will update their computers manually by using Microsoft’s preinstalled/pre-programmed updater in their computer’s Control Panel. This option searches for and installs all the necessary programs to keep your computer safe and secure. The DownloadAdmin program only occupies needed space and resources on your computer. However, what’s good about this program is that it doesn’t operate at the start time so it doesn’t necessarily cause unnecessary lags on your computer.
Modifies your search experience
By installing a search toolbar called SearchProtect, Updateadmin modifies or changes the browsing experience you’re accustomed to. SearchProtect hijacks your browser and changes your homepage to their choice while removing yours. This is often hard to reverse since the publisher created this software to remain once installed.
To completely remove DownloadAdmin from your computer, click here to download and install Spyhunter
If you find that the scroll bar in your Google Chrome browser is missing all of a sudden, and it becomes difficult for you to scroll down the web page and see its content, worry not for this post will guide you on what you can do to resolve this problem.
Usually, when the mouse cursor stays hidden in the corner and only appears when you point it to the edge of the screen. However, there are instances when it won’t appear which makes navigating the web page you are visiting quite impossible. So if you encounter this kind of strange behavior on your Google Chrome browser, there are several suggestions you can check out to resolve it. In most cases, updating the browser resolves the problem, but if it does not, you can try restoring the browser’s settings to their default state by resetting Chrome or you could also disable hardware acceleration or disable the overlay scrollbars flag. For more information, follow each one of the options provided below.
Option 1 – Reset Google Chrome
Before you proceed, make sure that the Chrome browser is not running anywhere in the background via Task Manager. Once you’ve made sure that it’s no longer running, refer to these steps:
Tap the Win + R keys to open the Run dialog box.
Then type “%USERPROFILE%AppDataLocalGoogleChromeUser Data” in the field and tap Enter to open this location.
From there, look for the Default folder and then tap the Shift + Delete button and if a confirmation prompt appears, click on Yes.
After deleting the Default folder, open Google Chrome and click on the three vertical dots icon located in the top-right corner to open the menu.
Next, click on Settings and scroll down and then click on Advanced to open the Advanced Settings.
Then scroll down until you see the “Reset and clean up” section and click the “Restore Settings to their original defaults” option.
After that, you will see a confirmation box and from there, click on the Reset settings button to reset your Google Chrome browser.
Option 2 – Try to disable the Hardware Acceleration
For better performance, Google Chrome uses the Hardware Acceleration by default. Unfortunately, there are just some cases when your hardware, GPU to be specific, might not be able to cope with the requirements, resulting in the black screen issue. And if this is your case, you should try to disable the hardware acceleration from your Google Chrome browser settings panel. To do so, follow the steps below.
Open the Google Chrome settings page.
Click on the Advanced button to get more options.
Look for the option called “Use hardware acceleration when available” and then disable it by toggling the button to the left.
After that, check if the screen flickering issue in Chrome is fixed.
Option 3 – Try to disable “Smooth Scrolling” in Chrome
Disabling “Smooth Scrolling” in Chrome might also help you fix the issue. To do so, follow these steps:
Open Chrome and type “chrome://flags” and hit Enter.
Next, look for a flag named “Smooth Scrolling”. You can scroll down until you find it or search it in the Search Flag bar. Note that Smooth Scrolling is enabled by default in the newer versions of Chrome.
After that, select the drop-down menu and select Disabled.
If you connected your Hard Disk, USB, or SD card to your Windows 10 computer and you suddenly encounter an error that says, “Windows was unable to repair the drive”, read on as this post will help you fix the problem. This kind of error indicates that the file system on the drive has become corrupted and that ChkDsk was not able to repair the problem. You can also encounter this error when you try to run the ChkDsk utility to repair the system.
This kind of error is most likely due to the general corruption of the contents in the drive. It is also possible that you removed the external drive without using the “Safely remove hardware” option or it could be that the drive is still in use. To fix the problem, the obvious thing to do is to safely remove the external drive by using the “Safely remove hardware” option. If it didn’t work, you can try to run the CHKDSK utility from the command line or you could also restart your computer in a Clean Boot State and then run the scan. Before you proceed with the potential fixes provided below, make sure that you create a system restore point first or you could also create a backup copy of the data to an external drive.
Option 1 – Run the CHKDSK utility from the command line
Although some users reported getting the “Windows was unable to repair the drive” when they run a CHKDSK scan, other users reported that running it also fixed the error. Thus, you can try to run it and see if it works or not.
In the Windows Search box, type “command prompt” and from the search results, right-click on Command Prompt and select “Run as administrator”.
After opening Command Prompt, type this command and tap Enter: chkdsk <Partition Letter>: /f
The command you entered will start to check for errors and fix them automatically. Else, it will throw an error message saying, “Chkdsk cannot run because the volume is in use by another process. Would you like the schedule this volume to be checked the next time the system restarts? (Y/N)”.
Tap the Y key to schedule Disk Check the next time your computer restarts.
Option 2 – Restart your computer in a Clean Boot State
There are some instances that some conflicting programs installed in your computer might be the one that triggers the “Windows was unable to repair the drive” error to appear when you connect your external drive or run the CHKDSK utility. To identify which program is causing the problem, you need to put your computer in a Clean Boot State. To do so, follow the steps below.
Log onto your PC as an administrator.
Type in MSConfig in the Start Search to open the System Configuration utility.
From there, go to the General tab and click “Selective startup”.
Clear the “Load Startup items” check box and make sure that the “Load System Services” and “Use Original boot configuration” options are checked.
Next, click the Services tab and select the “Hide All Microsoft Services” check box.
Click Disable all.
Click on Apply/OK and restart your PC. (This will put your PC into a Clean Boot State. And configure Windows to use the usual startup, just simply undo the changes.)
Once your computer has restarted in a Clean Boot State, perform your scan again and see if it now works, and then start to isolate the problem by checking which one of the programs you installed recently is the root cause of the problem.