Runtime Error 372 is one of the various types of runtime errors on Windows PC. This error code hampers your ability to access and run Microsoft Visual Basic applications on the system.
Solution
Error Causes
Runtime Error 372 can occur due to multiple reasons:
Corrupt application due to viral infection
Missing or damaged DLL file
Poor PC maintenance
Data overload
Registry damages
Delay in resolving the runtime error 372 exposes your PC to further problems like the inability to install new programs, Windows startup issues, slow PC performance, system hang-ups, and crashes, etc. Therefore, it is recommended to take measures to resolve the runtime error 372 immediately.
Further Information and Manual Repair
The registry is one of the most critical components of Windows PC. It stores every data and configuration of your computer. Every hardware and software on the system has to connect to the registry to function properly.
However, everyday and frequent PC usage keeps creating wasted, obsolete and invalid entries on your system and saves them in the registry.
And if not cleaned, these files dilate the registry and eventually cause the registry to malfunction. DLL files go missing and often get damaged or corrupt. This leads to runtime error pop-ups like the error code 372.
Furthermore, sometimes the registry also gets damaged due to malware attacks and viral infections. This malicious software damages the registry and exposes your system to serious PC threats like system failures, data loss, and data breaches.
Solutions To Runtime Error 372
To resolve the runtime error 372 on your system, clean and restore your registry. For this, you don’t have to hire a technician and spend hundreds of dollars when you can repair it for free.
All you have to do is download Restoro. This is a powerful one-stop solution for all your PC-related problems. It functions as a registry cleaner and a system optimizer.
Restoro is a user-friendly Windows PC repair tool that can be used by all levels of users. To run and operate this software on your system you don’t have to be a computer programmer or an expert. Its simple navigation and layout make it very easy to use.
It resolves disk fragmentation issues which lead to missing DLL files. It also repairs the damaged and corrupted registry thereby resolving runtime errors like the error code 372.
Restoro is a bug-free, reliable, and efficient tool. It is compatible with all Windows versions.
Click here to download Restoro to repair the runtime error 372 on your PC.
If you are having issues with your network connection and you have it configured to DHCP, then you shouldn’t have any issues in figuring your IP address out. If you want to prevent conflicts between network devices and enable their easy management, then you have to set a static IP address in your Windows 10 computer, worry not for this post will show you how it’s done.
The IP addresses for computers are usually configured to the Dynamic Host Configuration Protocol or DHCP automatically by the respective router. This is really convenient since the devices instantly connect to your network and through this, you can save yourself the trouble of configuring the IP address for each new device manually. However, there’s a shortfall in the process – the computer’s IP address can change every now and then.
Moreover, you might also find it a lot easier to share a printer or configure a Port forwarding when you set a static IP address. There are three ways to do it – you can set it via Control Panel or Windows Settings or using Windows PowerShell. For more details, follow the options provided below.
Option 1 – Set a static IP address via Control Panel
Right-click on the network or Wi-Fi icon located in the Taskbar.
Then select the “Open Network and Internet settings” option from the given list of options.
Next, go to Wi-Fi settings and scroll down until you see the “Related Settings” section. Here, click on the “Change adapter options” link which will open a new window that will direct you to the Network Connections section of the Control Panel.
After that, right-click on the network connection you want to set a static IP address for and then select the Properties option.
Then select Internet Protocol Version 4 (TCP/IPv4) under the Networking tab and click the Properties button.
Now switch the selector to the “Use the following IP address” option and make the entry for the following fields that correspond to your network setup.
IP address (Find it using the “ipconfig /all” command)
Subnet Mask (On a home network, it is 255.255.255.0)
Default Gateway (It is your router’s IP address.)
Then check the “Validate settings upon exit” option to help Windows check your new IP address quickly as well as the other relevant information to make sure that it’s working.
Once you’re done, click the OK button and close the network adapter’s properties window.
Option 2 – Assign Static IP address using Settings
First, click on the gear icon for Settings and select the Network & Internet tab.
Next, select Wi-Fi > Current connection where you’ll have to select the network connection your computer is connected to.
After that, scroll down until you reach the IP settings section and then click the Edit button.
Now click the drop-down arrow when the IP settings window pops up and select the Manual option.
Now turn on the IPv4 toggle switch and set the static IP address. You also have to set the Subnet prefix length (subnet mask). For instance, if your subnet mask is “255.255.255.0”, then the subnet prefix length in bits should be 24.
Afterward, configure the Default Gateway address and the Preferred DNS address and then save the changes you’ve made.
Option 3 – Assign the static IP address using Windows PowerShell
In the Start Search, type “PowerShell” and right-click on Windows PowerShell from the search results to open PowerShell with admin privileges.
After that, enter this command to view your computer’s current network configuration: Get-NetIPConfiguration
Next, take note of the following information:
InterfaceIndex
IPv4Address
IPv4DefaultGateway
DNSServer
Once you’re done, execute this command to set a static IP address: New-NetIPAddress -InterfaceIndex 15 -IPAddress 192.168.29.34 -PrefixLength 24 -DefaultGateway 192.168.29.1
Afterward, change the default gateway with the default gateway address of your network and make sure that you change the InterfaceIndex number with the one that corresponds to your adapter and IPAddress with the IP address you want to assign to your computer.
Now execute this command to assign a DNS server address: Set-DnsClientServerAddress -InterfaceIndex 4 -ServerAddresses 10.1.2.1
Finally, save the changes you’ve made and restart your computer.
0x800ccc79 error is an error message that you may come across when sending emails through Outlook Express from Microsoft. This error message is accompanied by a notification that is displayed as ‘email was not delivered’ or ‘the server doesn’t support SSL connection’.
Solution
Download Available to Recover all Lost Outlook data
Error Causes
This error code 0x900ccc79 is triggered due to the following causes:
Problems related to email servers
Changes in the configuration settings
Corrupted Windows Registry
Further Information and Manual Repair
When you receive the error 0x800ccc79 it may hamper your ability to send emails. Therefore it is advisable to fix it to ensure your emails are sent and received without any difficulty.
This Outlook error 0x800ccc79 is quite easy to repair. By following the quick fix 0x800ccc79 error code solutions given below you can resolve this error in just a couple of minutes.
Here’s what you need to do to fix this error right away:
Cause: Configuration issues
Solution: If the error occurs due to Outlook Express being configured to use the SSL protocol while sending and receiving emails via the web, then to resolve it, you need to allow Outlook Express to bypass the Secure Socket Layer settings.
To do so, click on ‘tools’ and then on ‘Accounts’. Now select the email account that you want to modify.
Now select the ‘Properties’ tab and then click on ‘Advanced Settings’.
Here search for the following text message ‘This server requires a secure connection’. Once you locate it, uncheck all the checkboxes given next to this option. After that save the changes and restart Outlook Express to see bring the changes into effect.
Cause: Missing or Corrupt Registry Entries
Solution: If the error 0x800ccc79 occurs due to missing or corrupt registry entries, then the best way to fix this error is to download and install a good registry cleaner on your PC.
The registry cleaner will help you clean your corrupt and damaged Windows registry entries and get rid of this error right away. It is suggested you download the registry cleaner tool from a reliable website to avoid any malware or virus downloads simultaneously.
Once you download the registry cleaner on your system, click on scan. The cleaner will scan your computer completely for registry errors and show you the results in a list form.
After the scanning is complete, click on repair to fix the errors.
So, next time, if you or anyone at your office comes across the Outlook Express error 0x800ccc79, you can try these solutions and fix the error immediately without waiting for the network personnel to come and resolve it.
Afraid of the growing threats online? As you should be. But we’re here to show you what kinds of malware are out there and what you can do to keep them at bay.
Malware definition
Malware comes from the term malicious software. It’s software designed to attack and exploit devices and networks to the advantage of the hacker who made it.
Malware can be transmitted in different ways. Most commonly this happens via infected USB drives, downloadable files or malicious websites. Depending on the type and ultimate goal, the consequences of a malware attack can range from negligible to catastrophic.
Credit: Ed Hardie on Unsplash
What kinds of malware are there?
1. Virus
A virus is typically spread via infected files, websites or links. It’s one of the oldest malware types and one of the most difficult to get rid of. That’s because, once activated, it replicates itself - hence the name.
It can perform different kinds of attacks, depending on what the creator wants to achieve. The main characteristic of a virus is that it really doesn’t show itself until you activate the host. So that’s a scary thought for sure.
2. Adware
Sometimes an ad blocker isn’t enough to fight off unwanted ads. And some of them can, unfortunately, be malicious. They may redirect you to infected sites or prompt downloads of risky files. Even just opening a malicious site can lead to data theft.
So, definitely be careful when clicking around. Even if an ad seems completely legitimate, you can never be too sure.
3. Ransomware
Through ransomware, cybercriminals gain access to a user’s data and use it to extort them for money. Basically, the user is threatened with data deletion or even exposure if a ransom isn’t paid by a specific deadline.
This is a particularly nerve-wracking type of malware. If it targets an individual, it preys upon their sense of anxiety, fear, guilt and even shame. If it targets a business (which is a lot more common), it preys upon not only that business’s profit but also every single one of their customers and their data.
4. Trojans
This type of malware disguises itself very well as a legitimate-looking program. Once you download it, hackers can get full access and control of your device, data and network. They can even be hidden in games, apps and attachments. They cannot self-replicate, though, so we guess that’s… good news?
5. Worms
Worms can replicate, just like viruses, but you don’t need to actually activate the infected program for them to get going. They can be used for various purposes, ranging from data deletion to file encryption to support a ransomware attack.
Credit: Growtika on Unsplash
6. Spyware
Spyware refers to malicious software that stays hidden on your computer and monitors your activity. The best-known type is keyloggers. This can be used to steal sensitive data like passwords and banking information.
7. Rootkits
Rootkits are among the most dangerous types of malware. They allow administrative access and full control of a device, which lets hackers continue hijacking all your data and monitoring your activity without your knowledge.
8. Botnets
Botnets are networks made up of bots - computers that cybercriminals have infected with malicious software. Bots and botnets give hackers remote access to users’ devices and allow them to spy on your camera, take screenshots, memorize passwords and launch Distributed Denial of Service attacks. This one truly makes your hair stand on end.
What can you do about it?
You know the old adage - better safe than sorry. And trust us, malware attacks are such a pain in the you-know-what that you really don’t want to be sorry.
Luckily, there are simple solutions that can shield you from most digital threats these days. What you want to be looking at is a solid antivirus program. Well, technically, you need an antimalware program, but since the latter evolved from the former, we still mostly refer to them as antivirus software. The majority of antimalware programs these days don’t just shield you from potential risks online, but include additional features as well. For example, some Bitdefender antivirus packages also include parental control and a VPN. And Bitdefender is not just for PCs either - it offers protection for your beloved iPhone or Android as well. You can throw in a password manager in there too, for an additional layer of security.
Credit: Dan Nelson on Unsplash
If you aren’t too concerned about all these various threats or feel like you don’t need extra security, you can at least take a step to protect your information from being exposed to lurking cybercriminals as you’re browsing. This can be done through a good VPN like Surfshark, which hides your identity in the digital space and prevents your data from being tracked.
Choosing the right protective software is especially important if you have children with access to the Internet, since they’re unfortunately even more vulnerable to malicious attacks. If you aren’t sure what the right kind of antimalware program is right for you, you can reach out to us and we’ll be happy to help keep your entire household or office digitally secure.
The bottom line
The truth is that there’s no way to be 100% protected in the online world. Hackers are constantly coming up with new ways to infiltrate our devices. But malware-battling software evolves along with them and there’s still plenty you can do to keep risks away. Stay safe!
Same as in Windows 10, Windows 11 also features a lock screen. IN this lock screen by default, you will see a clock and date above the standard Windows 11 background. Not all users will be happy with this choice but do not worry, you can choose and customize your lock screen to better suit your idea of it.
To personalize the lock screen do:
Right-click on Desktop and select Personalize
Click on the lock screen
Choose one of three options and customize it
Personalize Your Lock Screen
this option will let you set a custom image or slideshow for your lock screen. Choose either one that best suits you. Under selecting picture or pictures for the slide show you can uncheck the option to see tips, tricks, and facts on your lock screen.
Lock screen status
when clicking on this option you can select the application widget that you wish to be shown on the lock screen like weather, mail, calendar, etc. Choose if you would like one by clicking on it.
Show the lock screen background picture on the sign-in screen
as self-explanatory this switch will enable or disable chosen lock screen wallpaper on your login credentials screen.
Close settings
All settings will be automatically saved and applied and when you wish to lock the screen easiest way is to press ⊞ WINDOWS + L shortcut on your keyboard.
After Plex, DoorDash, and LastPass, Samsung has also confirmed that they also have experienced a data breach and that some customer data has been stolen.
On Friday, September 2nd Samsung announced that an unauthorized third party gained access to some of the company's U.S. systems in late July and that Samsung learned in August that some personal information was affected. It was also stated that affected information is: names, contact information, demographics, dates of birth, and product registration information. Also so far it was said that no Social Security numbers nor credit card number information have been compromised.
For now, Samsung is sending an email directly to anyone that has been affected by this data breach, however, they did not state what service or product has experienced this breach, we just know that it has happened at Samsung Electronics America which sells everything, from smartphones to debit cards. Also keep an eye on your inbox if you are a Samsung user since it took them a whole month in order to go public with this information and there is no justification for this, if it was reported on time people could change their information and take other steps.
One of the most useful utilities for advanced users in Windows is the Windows command line or Command Prompt. It is efficient in fixing system files, checking the disk for errors as well as other intensive tasks that are made convenient using this.
One of the tasks you can carry out using Command Prompt is repairing the Windows bootup process if it encounters any issues. However, if you tried running the “bootrec/fixboot” command and you receive an error message saying, “Element not found”, read on as this post will guide you in fixing this error. This kind of error in the command line could be due to a damaged BCD or MBE, inactive system partition, or it could also be that there is no drive letter being assigned to the EFI partition. Whichever the case is, here are some possible fixes that should help you resolve the problem.
Option 1 – Try to repair BCD
As mentioned the error could be caused by a damaged BCD and so to fix the problem, you need to repair BCD by following these steps:
First, make sure that you have a bootable Windows 10 USB drive with you and use it to boot your computer.
Once you’re on the Welcome Screen, click on Next.
After that, click on Repair your computer located at the bottom-left portion of the window.
Then select Troubleshoot > Advanced Options > Command Prompt.
After you open the Command Prompt window, execute the following command:
bootrec /fixboot
Afterward, enter the next command below to rename the BCD file:
ren BCD BCD.bak
Next, type the following command and make sure to replace “b:” with the letter of your bootable drive attached to your computer.
bcdboot c:Windows /l en-us /s b: /f ALL
Now, wait until the process is completed and restart your computer to successfully apply the changes made.
Option 2 – Try assigning the drive letter to the EFI partition
Tap the Win + X keys or right-click on the Start button and click on Command Prompt (Admin) to open Command Prompt with admin privileges.
Then type the following command to start the Diskpart utility:
diskpart
After that, if you receive a UAC prompt, just click on Yes to proceed.
Next, type the following command to list all the volumes created on your PC including both types of partitions that are visible to a normal user in the File Explorer as well as the ones created by Windows 10 by default which helps it in storing the boot files and other important system files:
list volume
Now type the following command to select the desired volume:
select volume number
Then type the following command to assign a letter to the selected volume:
assign letter=<LETTER>
Note: Make sure to replace “<LETTER>” with the letter you want to allocate to that partition. Afterward, it will assign a letter to the selected volume.
Reboot your PC to apply the changes made.
Option 3 – Try setting the System Partition to Active
Like the first given option, you also have to make sure that you have a bootable Windows 10 USB drive before you proceed to set the System Partition to Active. Once you have it covered, refer to these steps:
Boot your computer using the bootable Windows 10 USB drive.
Next, click Next when you get to the Welcome Screen.
Then click on Repair your computer located at the bottom left part of the window and select Troubleshoot > Advanced Options > Command Prompt.
After opening Command Prompt, type the following command and hit Enter to start the Diskpart utility. It is a command line-based utility just like Command Prompt but has a UAC prompt once you provoke it. So if you encounter a UAC prompt, just click on Yes to proceed.
diskpart
Now type the following command:
list disk
From there, select your primary disk by typing the following command:
select disk number
After that, list all the partitions on the selected disk by entering the following command:
list partition
The command you just entered will list all the partitions created on your PC including both types of partitions that are visible to a normal user in the File Explorer as well as the ones created by Windows 10 by default which helps it in storing the boot files and other important system files.
Now type the following command to select the partition that is usually around 100 MB in size:
select partition number
Finally, type the following command to mark the partition active:
active
Then type the “exit” command to exit the disk part utility.
Having the latest applications is often preferred for most users but sometimes we have some old applications which have not been updated or simply we just want to run oldie on our computer because it does everything we need and we do not want to upgrade in order to save some money.
The issue is presented sometimes when we try to run an old application in Windows 10 and some components are missing in Windows itself or the application is simply coded in a way to work on older Windows versions. If by any chance you have this issue then this guide is for you since we are going to show you how to run old applications in Windows 10.
This guide is made in a way to takes into account that the application itself is completely installed on your Windows 10 machine if you can not even install the application you will need to search solution for that particular application since that can not really be generalized and pinpointed issue, every application is different.
Running old applications using the compatibility option
All of that being said, let's start that old app you have. First thing is to locate an executable file or shortcut of the desired application. Once it is located, right-click on it to bring up the menu, and all the way to the bottom you will find properties. Left-click on properties.
The application settings screen will open, in upper tabs locate Compatibility and left-click on it.
After the click, you will find yourself in application compatibility settings.
In this window, you will face different options to run the chosen application in various modes in order to make it run. How settings are self-explanatory and different applications will need different settings sadly we can not cover them all but your safest bet is to run them in an environment where they have worked.
For example, if the application was working fine in Windows XP and required administrator privileges, check Run this program as an administrator and Run this program in compatibility mode for Windows XP.
If you are trying to start the Microsoft Outlook application on your Windows 10 computer but you suddenly receive a message box with an error message that says, “We are unable to connect right now, Please check your network and try again later”, read on as this post will guide you on how you can fix this error.
This kind of error in Microsoft Outlook could be due to some issues with your internet connection or it could also be due to the VPN software if you’re using one. Whatever the cause is, there are several potential fixes you can check out to fix the error. You have to check your internet connection or try changing it. You could also try to disable your VPN software or restart your computer or Microsoft Outlook and try starting the app again. In addition, you can also try entering your password again or check some settings in the Windows Registry or open Microsoft Outlook in Safe Mode. Refer to the guidelines provided below to further troubleshoot the problem.
Option 1 – Try to check your internet connection
The first thing you can do to resolve the problem is to check your internet connection. You have to make sure that you are connected to the internet and that it has a stable connection.
Option 2 – Try to restart your computer or Microsoft Outlook and try again
The next thing you can do to fix the error is to restart your computer or Microsoft Outlook. This simple process can actually help you fix the problem as it could only be a glitch that can be fixed with a simple restart.
Option 3 – Try to enter your password again
You could also try entering your password again to resolve the error. Just click on the Cancel button to open a dialog box and then enter your password again and see if it helps. Note that you might have to do it for all your email IDs in Microsoft Outlook.
Option 4 – Try opening Microsoft Outlook in Safe Mode and disabling its add-ins
Putting Microsoft Outlook into Safe Mode can help you identify the problems in it. Safe Mode also helps you fix a certain issue caused by some corrupted add-in. To start your Microsoft Outlook in Safe Mode, refer to these steps:
Tap Win + R on your keyboard to open the Run dialog box.
Next, type in “Outlook /safe” and press Enter to run the command.
After that, it will ask you to select a profile that you want to use. Just simply select a profile from the drop-down menu and click on the OK button.
Now you have successfully opened Microsoft Outlook in Safe Mode. As a result, it will start with disabling the add-ins. Meaning to say, there is some corrupted add-in that’s causing the problem, and that you need to look for that add-in and either disable it or have it permanently removed.
Once you’ve identified the corrupted add-in, you can disable or remove it by going to File > Options > Add-ins. From there, select the option “COM Add-ins” from the drop-down menu and then click the Go button.
Finally, close Microsoft Outlook once you’ve covered the given steps above and then try to open it normally.
Option 5 – Try disabling the VPN
As pointed out earlier, if you are using VPN, this could be the reason why you’re getting the “We are unable to connect right now, Please check your network and try again later” error so the most obvious thing to do is for you to turn off the VPN and try to run the Windows Update once more. And if you use a VPN software that works using their software, you can just completely exit or log-off from its account. On the other hand, if you are using a built-in Windows 10 VPN, you can simply turn it off or delete all the settings you have created there.
Option 6 – Try to check the settings in the Registry
Tap the Win + R keys to open the Run utility and type “Regedit” in the field and tap Enter to open the Registry Editor.
Next, navigate to this registry path: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetservicesNlaSvcParametersInternet
From there, look for the DWORD named “EnableActiveProbing” and make sure that its value is set to “1”. When the value is set to 1, it means that it is Enabled. This is the default setting and is used to identify the status of the network connectivity of your computer.
In today's IT world, if you want a computer for typical day-to-day actions and gaming, there are 3 primary ways you can go. An Apple computer with its proprietary hardware and operating system or a typical machine with Windows or Linux operating system.
Each system has both advantages and disadvantages and picking the right one might be difficult for some users. From hardware differences to specific software and operating system, each system is aimed at a different type of work, and in this article, we will explore each one and help you in choosing the right one for you.
Apple ecosystem
Apple has managed to create a unique ecosystem of its own devices, from its iMac desktop computers to more professional MAC studio and power MAC and all the way to tablet iPad and iPhone are powered by Apple's own operating system that connects all of these devices into one large system. So if you really need one singular ecosystem this is a huge advantage.
The ecosystem on the side, MAC computer systems are great, some would argue best for coding, design, video work, and sound editing. MAC M2 chip is optimized for all of these tasks and a specially tailored operating system is just the icing on the cake. Specific Apple-made software like a logic pro or final cut also helps a lot to position MAC systems on top of the line.
Reading all of this you might think hey this is the computer for me, it does everything! Sadly the truth is not like that. The first thing that is difficult on MAC systems and a maybe big reason that it is not so adopted outside professional working environment is lack of games. If you are a gamer or plan on using MAC for gaming, well I have some bad news. The second big turn-off is that MAC systems tend to be more expensive than PC systems, yes components are of higher quality but rest assured that you will pay for also for branding.
Get MAC as your workstation for serious work and for good tech support, if you need a plain home computer keep reading.
Windows PC machine
There is no better feeling than assembling your own computer, tweaking hardware to make a monster and despite haters hating, Windows is the best all-around operating system on the market. It is supporting the largest variety of hardware and the largest variety of software.
The best platform for serious gaming and streaming Windows machine has cemented itself as a multimedia powerhouse. But, this kind of computer is not alien to being also a professional machine, you can practically do everything that you can do on Apple or Linux machine inside Windows, yes some things might require extra steps or will be slightly slower but in the end, being able to do anything is the greatest strength of Windows machine.
Of course, every system has its flaws and Windows is not immune to that. One of the biggest is being the operating system for every hardware ever made and every software as well while keeping legacy support for old software and hardware, basically, its biggest strength is in the same time its biggest weakness leading to sometimes stability issues. Also being able to place any kind of hardware can also lead to the same stability issues. Executing something a little slower than other systems and having some extra steps can also be looked upon as weaknesses.
Linux system
First and perhaps for some people, the biggest advantage of the Linux operating system is its price, it is completely free! Other advantages include the great server and networking included in the OS itself, the large amount of customization, and unmatched stability. The ability to write scripts inside the OS terminal is also a great thing and coding is much more streamlined and friendlier than on other machines.
The power of Linux is the ability to change anything, even on the system layer, no other operating system will let you change the basic functionality of the OS itself while Linux will let you do this. It is also the only operating system you can fully use by booting it up from a USB stick and having the same experience as it was installed on a local hard drive. Among other OS mentioned earlier, Linux is by far the lightest one, taking the smallest amount of memory among the three.
The bad side of the Linux machine is the steep learning curve, among the three mentioned operating systems rest assured Linux is the most difficult to learn and be comfortable in it. The operating system will require you to know the hardware and how computers work in order to fully use its potential. Other things that place it behind are not so wide hardware support compared to Windows and the somewhat confusing distro model.
Linux versions come in form of different distro packages and first-time users will face many of them being left in awe of which one to choose. Also installing drivers and software via a package system can also be a tedious task as well, often being that some version of the driver will not work on the newer version of the Linux distro.
Get a Linux machine if you are well versed in computer technology, if you want great customization of the OS itself or if you do not want to spend money on OS and software since almost entire Linux software is open source.
Each year Steam makes a couple of large sales, and each year there are speculations and leaks on the date when the sale is going to happen and when it is starting. It seemed that Steam has become aware that these leaks will not stop and that store really cannot hide that kind of important date from the public so in the latest news Steam Purley has just given the date of this year's big winter sale.
Probably tired of even trying to hide it, Steam has released that this year's big Steam Winter sale is officially starting on December 22nd, 2021, and closing on January 5th, 2022. So if you have someone to buy a gift or just want to drop a few great games in your library at a low price this is the time when you should do it.