Logo

Photo viewer on clean Windows 10 instalation

Windows photo viewer was a popular photo viewing application integrated into Windows 7, 8, and 8.1 but in Windows 10 it has been replaced with photos, Microsoft's new application aimed at photo viewing on your desktop. Now if any one of you wonders why should be bringing the old application back to Windows 10 since we have an alternative one, the answer would be resources and speed. The old photo viewer application is lightweight, fast, and reliable, opening the same photo in both photo viewer and in new photos shows us that Microsofts new viewer application takes even three times more RAM, and it's visibly slower in loading times for pictures.

Since I am a person who prefers speed and functionality over fancy looks I would be very glad to have the option to bring back a photo viewer. If you have by any chance Windows 10 as an upgrade, bringing back photo viewer is easy as 1,2,3. you just need to open settings and go to default apps, under photo viewer you should see your current default viewing application, probably photos, click on it to see options and choose photo viewer and exit the Settings menu, and you're done.

Sadly if Windows 10 has been installed clean on the system and not as upgrade things are a little bit more complicated but do not worry, stay with us, keep reading and you will get there.

Activating photo viewer

How technically photo viewer is still in the system but not used we will have to make it available again and this we will do by adding some lines in the Windows registry, that being said, open a notepad and paste the following code as it is in it.


Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\jpegfile\shell\open\DropTarget]
"Clsid"="{FFE2A43C-56B9-4bf5-9A79-CC6D4285608A}"

[HKEY_CLASSES_ROOT\pngfile\shell\open\DropTarget]
"Clsid"="{FFE2A43C-56B9-4bf5-9A79-CC6D4285608A}"

[HKEY_CLASSES_ROOT\Applications\photoviewer.dll\shell\open]
"MuiVerb"="@photoviewer.dll,-3043"

[HKEY_CLASSES_ROOT\Applications\photoviewer.dll\shell\open\command]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,72,00,75,00,\
6e,00,64,00,6c,00,6c,00,33,00,32,00,2e,00,65,00,78,00,65,00,20,00,22,00,25,\
00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,6c,00,65,00,73,00,\
25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,00,20,00,50,00,68,00,6f,\
00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,72,00,5c,00,50,00,68,00,\
6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,65,00,72,00,2e,00,64,00,6c,00,6c,\
00,22,00,2c,00,20,00,49,00,6d,00,61,00,67,00,65,00,56,00,69,00,65,00,77,00,\
5f,00,46,00,75,00,6c,00,6c,00,73,00,63,00,72,00,65,00,65,00,6e,00,20,00,25,\
00,31,00,00,00

[HKEY_CLASSES_ROOT\Applications\photoviewer.dll\shell\open\DropTarget]
"Clsid"="{FFE2A43C-56B9-4bf5-9A79-CC6D4285608A}"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Bitmap]
"ImageOptionFlags"=dword:00000001
"FriendlyTypeName"=hex(2):40,00,25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,\
00,46,00,69,00,6c,00,65,00,73,00,25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,\
77,00,73,00,20,00,50,00,68,00,6f,00,74,00,6f,00,20,00,56,00,69,00,65,00,77,\
00,65,00,72,00,5c,00,50,00,68,00,6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,\
65,00,72,00,2e,00,64,00,6c,00,6c,00,2c,00,2d,00,33,00,30,00,35,00,36,00,00,\
00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Bitmap\DefaultIcon]
@="%SystemRoot%\\System32\\imageres.dll,-70"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Bitmap\shell\open\command]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,72,00,75,00,\
6e,00,64,00,6c,00,6c,00,33,00,32,00,2e,00,65,00,78,00,65,00,20,00,22,00,25,\
00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,6c,00,65,00,73,00,\
25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,00,20,00,50,00,68,00,6f,\
00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,72,00,5c,00,50,00,68,00,\
6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,65,00,72,00,2e,00,64,00,6c,00,6c,\
00,22,00,2c,00,20,00,49,00,6d,00,61,00,67,00,65,00,56,00,69,00,65,00,77,00,\
5f,00,46,00,75,00,6c,00,6c,00,73,00,63,00,72,00,65,00,65,00,6e,00,20,00,25,\
00,31,00,00,00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Bitmap\shell\open\DropTarget]
"Clsid"="{FFE2A43C-56B9-4bf5-9A79-CC6D4285608A}"

[HKEY_CLASSES_ROOT\Applications\photoviewer.dll\shell\print]
"NeverDefault"=""

[HKEY_CLASSES_ROOT\Applications\photoviewer.dll\shell\print\command]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,72,00,75,00,\
6e,00,64,00,6c,00,6c,00,33,00,32,00,2e,00,65,00,78,00,65,00,20,00,22,00,25,\
00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,6c,00,65,00,73,00,\
25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,00,20,00,50,00,68,00,6f,\
00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,72,00,5c,00,50,00,68,00,\
6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,65,00,72,00,2e,00,64,00,6c,00,6c,\
00,22,00,2c,00,20,00,49,00,6d,00,61,00,67,00,65,00,56,00,69,00,65,00,77,00,\
5f,00,46,00,75,00,6c,00,6c,00,73,00,63,00,72,00,65,00,65,00,6e,00,20,00,25,\
00,31,00,00,00

[HKEY_CLASSES_ROOT\Applications\photoviewer.dll\shell\print\DropTarget]
"Clsid"="{60fd46de-f830-4894-a628-6fa81bc0190d}"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.JFIF]
"EditFlags"=dword:00010000
"ImageOptionFlags"=dword:00000001
"FriendlyTypeName"=hex(2):40,00,25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,\
00,46,00,69,00,6c,00,65,00,73,00,25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,\
77,00,73,00,20,00,50,00,68,00,6f,00,74,00,6f,00,20,00,56,00,69,00,65,00,77,\
00,65,00,72,00,5c,00,50,00,68,00,6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,\
65,00,72,00,2e,00,64,00,6c,00,6c,00,2c,00,2d,00,33,00,30,00,35,00,35,00,00,\
00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.JFIF\DefaultIcon]
@="%SystemRoot%\\System32\\imageres.dll,-72"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.JFIF\shell\open]
"MuiVerb"=hex(2):40,00,25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,\
69,00,6c,00,65,00,73,00,25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,\
00,20,00,50,00,68,00,6f,00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,\
72,00,5c,00,70,00,68,00,6f,00,74,00,6f,00,76,00,69,00,65,00,77,00,65,00,72,\
00,2e,00,64,00,6c,00,6c,00,2c,00,2d,00,33,00,30,00,34,00,33,00,00,00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.JFIF\shell\open\command]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,72,00,75,00,\
6e,00,64,00,6c,00,6c,00,33,00,32,00,2e,00,65,00,78,00,65,00,20,00,22,00,25,\
00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,6c,00,65,00,73,00,\
25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,00,20,00,50,00,68,00,6f,\
00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,72,00,5c,00,50,00,68,00,\
6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,65,00,72,00,2e,00,64,00,6c,00,6c,\
00,22,00,2c,00,20,00,49,00,6d,00,61,00,67,00,65,00,56,00,69,00,65,00,77,00,\
5f,00,46,00,75,00,6c,00,6c,00,73,00,63,00,72,00,65,00,65,00,6e,00,20,00,25,\
00,31,00,00,00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.JFIF\shell\open\DropTarget]
"Clsid"="{FFE2A43C-56B9-4bf5-9A79-CC6D4285608A}"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Jpeg]
"EditFlags"=dword:00010000
"ImageOptionFlags"=dword:00000001
"FriendlyTypeName"=hex(2):40,00,25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,\
00,46,00,69,00,6c,00,65,00,73,00,25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,\
77,00,73,00,20,00,50,00,68,00,6f,00,74,00,6f,00,20,00,56,00,69,00,65,00,77,\
00,65,00,72,00,5c,00,50,00,68,00,6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,\
65,00,72,00,2e,00,64,00,6c,00,6c,00,2c,00,2d,00,33,00,30,00,35,00,35,00,00,\
00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Jpeg\DefaultIcon]
@="%SystemRoot%\\System32\\imageres.dll,-72"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Jpeg\shell\open]
"MuiVerb"=hex(2):40,00,25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,\
69,00,6c,00,65,00,73,00,25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,\
00,20,00,50,00,68,00,6f,00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,\
72,00,5c,00,70,00,68,00,6f,00,74,00,6f,00,76,00,69,00,65,00,77,00,65,00,72,\
00,2e,00,64,00,6c,00,6c,00,2c,00,2d,00,33,00,30,00,34,00,33,00,00,00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Jpeg\shell\open\command]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,72,00,75,00,\
6e,00,64,00,6c,00,6c,00,33,00,32,00,2e,00,65,00,78,00,65,00,20,00,22,00,25,\
00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,6c,00,65,00,73,00,\
25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,00,20,00,50,00,68,00,6f,\
00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,72,00,5c,00,50,00,68,00,\
6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,65,00,72,00,2e,00,64,00,6c,00,6c,\
00,22,00,2c,00,20,00,49,00,6d,00,61,00,67,00,65,00,56,00,69,00,65,00,77,00,\
5f,00,46,00,75,00,6c,00,6c,00,73,00,63,00,72,00,65,00,65,00,6e,00,20,00,25,\
00,31,00,00,00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Jpeg\shell\open\DropTarget]
"Clsid"="{FFE2A43C-56B9-4bf5-9A79-CC6D4285608A}"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Gif]
"ImageOptionFlags"=dword:00000001
"FriendlyTypeName"=hex(2):40,00,25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,\
00,46,00,69,00,6c,00,65,00,73,00,25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,\
77,00,73,00,20,00,50,00,68,00,6f,00,74,00,6f,00,20,00,56,00,69,00,65,00,77,\
00,65,00,72,00,5c,00,50,00,68,00,6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,\
65,00,72,00,2e,00,64,00,6c,00,6c,00,2c,00,2d,00,33,00,30,00,35,00,37,00,00,\
00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Gif\DefaultIcon]
@="%SystemRoot%\\System32\\imageres.dll,-83"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Gif\shell\open\command]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,72,00,75,00,\
6e,00,64,00,6c,00,6c,00,33,00,32,00,2e,00,65,00,78,00,65,00,20,00,22,00,25,\
00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,6c,00,65,00,73,00,\
25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,00,20,00,50,00,68,00,6f,\
00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,72,00,5c,00,50,00,68,00,\
6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,65,00,72,00,2e,00,64,00,6c,00,6c,\
00,22,00,2c,00,20,00,49,00,6d,00,61,00,67,00,65,00,56,00,69,00,65,00,77,00,\
5f,00,46,00,75,00,6c,00,6c,00,73,00,63,00,72,00,65,00,65,00,6e,00,20,00,25,\
00,31,00,00,00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Gif\shell\open\DropTarget]
"Clsid"="{FFE2A43C-56B9-4bf5-9A79-CC6D4285608A}"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Png]
"ImageOptionFlags"=dword:00000001
"FriendlyTypeName"=hex(2):40,00,25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,\
00,46,00,69,00,6c,00,65,00,73,00,25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,\
77,00,73,00,20,00,50,00,68,00,6f,00,74,00,6f,00,20,00,56,00,69,00,65,00,77,\
00,65,00,72,00,5c,00,50,00,68,00,6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,\
65,00,72,00,2e,00,64,00,6c,00,6c,00,2c,00,2d,00,33,00,30,00,35,00,37,00,00,\
00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Png\DefaultIcon]
@="%SystemRoot%\\System32\\imageres.dll,-71"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Png\shell\open\command]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,72,00,75,00,\
6e,00,64,00,6c,00,6c,00,33,00,32,00,2e,00,65,00,78,00,65,00,20,00,22,00,25,\
00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,6c,00,65,00,73,00,\
25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,00,20,00,50,00,68,00,6f,\
00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,72,00,5c,00,50,00,68,00,\
6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,65,00,72,00,2e,00,64,00,6c,00,6c,\
00,22,00,2c,00,20,00,49,00,6d,00,61,00,67,00,65,00,56,00,69,00,65,00,77,00,\
5f,00,46,00,75,00,6c,00,6c,00,73,00,63,00,72,00,65,00,65,00,6e,00,20,00,25,\
00,31,00,00,00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Png\shell\open\DropTarget]
"Clsid"="{FFE2A43C-56B9-4bf5-9A79-CC6D4285608A}"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Wdp]
"EditFlags"=dword:00010000
"ImageOptionFlags"=dword:00000001

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Wdp\DefaultIcon]
@="%SystemRoot%\\System32\\wmphoto.dll,-400"

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Wdp\shell\open]
"MuiVerb"=hex(2):40,00,25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,\
69,00,6c,00,65,00,73,00,25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,\
00,20,00,50,00,68,00,6f,00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,\
72,00,5c,00,70,00,68,00,6f,00,74,00,6f,00,76,00,69,00,65,00,77,00,65,00,72,\
00,2e,00,64,00,6c,00,6c,00,2c,00,2d,00,33,00,30,00,34,00,33,00,00,00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Wdp\shell\open\command]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,72,00,75,00,\
6e,00,64,00,6c,00,6c,00,33,00,32,00,2e,00,65,00,78,00,65,00,20,00,22,00,25,\
00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,6c,00,65,00,73,00,\
25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,00,20,00,50,00,68,00,6f,\
00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,72,00,5c,00,50,00,68,00,\
6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,65,00,72,00,2e,00,64,00,6c,00,6c,\
00,22,00,2c,00,20,00,49,00,6d,00,61,00,67,00,65,00,56,00,69,00,65,00,77,00,\
5f,00,46,00,75,00,6c,00,6c,00,73,00,63,00,72,00,65,00,65,00,6e,00,20,00,25,\
00,31,00,00,00

[HKEY_CLASSES_ROOT\PhotoViewer.FileAssoc.Wdp\shell\open\DropTarget]
"Clsid"="{FFE2A43C-56B9-4bf5-9A79-CC6D4285608A}"

[HKEY_CLASSES_ROOT\SystemFileAssociations\image\shell\Image Preview\command]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,72,00,75,00,\
6e,00,64,00,6c,00,6c,00,33,00,32,00,2e,00,65,00,78,00,65,00,20,00,22,00,25,\
00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,6c,00,65,00,73,00,\
25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,00,20,00,50,00,68,00,6f,\
00,74,00,6f,00,20,00,56,00,69,00,65,00,77,00,65,00,72,00,5c,00,50,00,68,00,\
6f,00,74,00,6f,00,56,00,69,00,65,00,77,00,65,00,72,00,2e,00,64,00,6c,00,6c,\
00,22,00,2c,00,20,00,49,00,6d,00,61,00,67,00,65,00,56,00,69,00,65,00,77,00,\
5f,00,46,00,75,00,6c,00,6c,00,73,00,63,00,72,00,65,00,65,00,6e,00,20,00,25,\
00,31,00,00,00

[HKEY_CLASSES_ROOT\SystemFileAssociations\image\shell\Image Preview\DropTarget]
"{FFE2A43C-56B9-4bf5-9A79-CC6D4285608A}"=""

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Photo Viewer\Capabilities]
"ApplicationDescription"="@%ProgramFiles%\\Windows Photo Viewer\\photoviewer.dll,-3069"
"ApplicationName"="@%ProgramFiles%\\Windows Photo Viewer\\photoviewer.dll,-3009"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Photo Viewer\Capabilities\FileAssociations]
".cr2"="PhotoViewer.FileAssoc.Tiff"
".jpg"="PhotoViewer.FileAssoc.Jpeg"
".wdp"="PhotoViewer.FileAssoc.Wdp"
".jfif"="PhotoViewer.FileAssoc.JFIF"
".dib"="PhotoViewer.FileAssoc.Bitmap"
".png"="PhotoViewer.FileAssoc.Png"
".jxr"="PhotoViewer.FileAssoc.Wdp"
".bmp"="PhotoViewer.FileAssoc.Bitmap"
".jpe"="PhotoViewer.FileAssoc.Jpeg"
".jpeg"="PhotoViewer.FileAssoc.Jpeg"
".gif"="PhotoViewer.FileAssoc.Gif"
".tif"="PhotoViewer.FileAssoc.Tiff"
".tiff"="PhotoViewer.FileAssoc.Tiff"


Yup, that is a lot of keys and settings but you are almost done. Once you have pasted text into your new notepad document save it but as .REG, you can name it however you want but it has to be .REG extension.

Once the file is saved double click on it to merge it into the Windows registry. You might need to turn off UAC for this operation (check our tutorial on this topic) and accept warning messages but once it is done you should now have an old photo viewer as a choice for your default viewing application.

All you have to do now is to go to settings and go to default apps, under photo viewer you should see your current default viewing application, probably photos, click on it to see options and choose photo viewer and exit the Settings menu, and you're done.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Fix Windows Update Error 0x80072EE2
If you got an error code of 0x80072EE2 while trying to download a Windows 10 update then it could be that something is blocking the Windows Update service on your Windows 10 PC and is preventing it from connecting to the Microsoft server. In addition, the error code 0x80072EE2 also indicates “ERROR_INTERNET_TIMEOUT” and together with this message, you might also see a message as Windows Update encountered an unknown error or you might also find it hard to search for new updates. So in this post, you will be guided on how you can fix the Windows Update error code 0x80072EE2. Make sure to follow the steps below carefully.

Option 1 – Restart your computer and try installing the Updates again

You can restart your computer and then try installing the updates once again. There are instances when a simple restart resolves Windows Update errors. Aside from that, it would also be better if you make sure that your internet connection is working and that it’s stable. And so after you restart your computer, check for updates once again and see if you’re still getting the error or not.

Option 2 – Run the Windows Update Troubleshooter

Running the built-in Windows Update troubleshooter is one of the things you can first check out as it is known to automatically resolve any Windows Update errors like error code 0x80072EE2. To run it, go to Settings and then select Troubleshoot from the options. From there, click on Windows Update and then click the “Run the troubleshooter” button. After that, follow the next on-screen instructions and you should be good to go.

Option 3 – Try to disable your antivirus program

Disabling the antivirus program or any security software installed in your computer is always a good idea you can try when the Windows Update process does not go smoothly. So before you try updating your computer again, make sure to disable the antivirus or security program and once the Windows Update is done, don’t forget to enable the antivirus program back again.

Option 4 – Try to restart the Background Intelligent Transfer Service

The Background Intelligent Transfer Service or BITS is a part of the Windows Update service and is the one that manages the background download of Windows Update, as well as scans for new updates and so on. And if Windows Update is experiencing some problems, you can try restarting BITS but make sure that you have admin privileges to do so.
  • Tap the Win + R keys to open the Run dialog box.
  • Next, type “services.msc” in the field and hit Enter to open Windows Services.
  • From the list of Services, look for the Background Intelligent Transfer Service and double-click on it to open Properties.
  • After that, you need to set the Startup type to “Automatic (Delayed Start) and click on Apply.
  • Now click the Stop button to stop BITS and then click the Start button to restart the service.
  • Click OK to save the changes made and then restart your PC.

Option 5 – Try installing the updates in a Clean Boot State

It could be that some third-party application is the one that’s causing the problem so it’s best if you put your computer in a Clean Boot state. During this state, you can start the system with a minimum number of drivers and startup programs that will surely help you in isolating the root cause of the issue.
  • Log onto your PC as an administrator.
  • Type in MSConfig in the Start Search to open the System Configuration utility.
  • From there, go to the General tab and click “Selective startup”.
  • Clear the “Load Startup items” check box and make sure that the “Load System Services” and “Use Original boot configuration” options are checked.
  • Next, click the Services tab and select the “Hide All Microsoft Services” check box.
  • Click Disable all.
  • Click on Apply/OK and restart your PC. (This will put your PC into a Clean Boot State. And configure Windows to use the usual startup, just simply undo the changes.)
  • After that, try to install the Windows app again.
Note: If you are able to install the app without any trouble at all then it means that the error is caused by some third-party application on your computer. You need to look for the culprit and uninstall it once you found it.

Option 6 – Run Microsoft’s online troubleshooter

Running Microsoft’s online troubleshooter might also help you fix the Windows update error code 0x80072EE2. This online troubleshooter is known to help in fixing Windows Update errors, it scans your computer for issues that might be causing the problem and then fixes them automatically.
Read More
Repair Windows 10 Error Code 0xC1900208, 0x4000C

Code 0xC1900208 0x4000C, What is it?

The Error Code 0xC1900208 – 0x4000C is an error that is caused by an installed application or program on your computer that is not compatible with Microsoft Windows 10. The incompatible application prevents you from being able to complete the upgrade to Microsoft Windows 10 and will continue to do so until the issue is resolved. Common symptoms include:
  • You receive a dialog box displaying Error Code 0xC1900208 – 0x4000C
  • You are unable to successfully complete the Microsoft Windows 10 upgrade process.

Solution

Restoro box imageError Causes

Error Code 0xC1900208 – 0x4000C is caused by a non-compatible application or program that is currently installed on your computer, and is not allowing the Microsoft Windows 10 upgrade to finish the installation and update process.
  • The upgrade is stopped due to an incompatible app or program.
  • Out of date or no longer supported software can cause this error to occur.
  • Device drivers that are not up to date or no longer compatible.
  • The computer might pick up malware along the way and might be preventing the upgrade. If error code 0xC1900208 – 0x4000C is not rectified, you’ll not be able to proceed with your Windows 10 upgrade.

Further Information and Manual Repair

The good news is, error code 0xC1900208 – 0x4000C is a relatively common problem that is usually easily fixed by the user at home, though it can be a little time-consuming. To elude this time-consuming process, use a powerful tool to rectify the issue in no time (TSC). Before making any attempts to repair this error, ensure to perform a compatibility test.
  • Check the compatibility of applications and programs installed on your computer to locate and remove, or fix the one that is incompatible. (Don't stop at the first one you find, there could be multiple incompatibility issues.)
  • Check to ensure all programs and software are not outdated or no longer supported, and remove or fix any outdated or unused, unnecessary programs or software. (This is also a great way to free up space and clean your computer up a bit.)
  • Check to ensure that all of your device drivers are current, up to date, and compatible with Microsoft Windows 10, and replace or update where necessary.

Method 1:

Use the get Microsoft Windows 10 application on your computer to check its compatibility, follow the steps below to run the check.
  1. Look at the taskbar, to the right; you will see an icon for Microsoft Windows 10, right-click the icon. Locate the option in the menu to check the status of your upgrade. This will open an app for getting Microsoft Windows 10.
  2. Next, you will see 3 lines on top of one another on the upper left side, this will open a drop-down menu, once you have this menu open, locate the option to check the compatibility of your computer.
  3. Microsoft Windows will then run a check of your entire computer to check for compatibility with Microsoft Windows 10. Once it has finished its check, a pop-up window will display whether or not your computer will work with Microsoft Windows 10, and will also display a list of any hardware and software that are not compatible with the upgrade.
  4. This may not catch everything and there may still be incompatible programs so the previous steps, though time-consuming may still be necessary.

Method 2:

Once the incompatible applications are discovered, use the control panel to remove/uninstall them. The steps are below:
  1. Locate your computer’s Control Panel.
  2. Choose the option that says “Programs”
  3. From the options available, select the ‘Programs and Features’ link.
  4. Locate the app in the queue or menu.
  5. Right-click and choose the uninstall option.
… another option
You can also locate the app on the ‘app homepage’, right-click and choose the ‘uninstall’ option. If after following these steps the problem is still not corrected, download and install an automated tool for a quick fix.
Read More
How to remove Sadooma from your PC

Sadooma is a Browser Extension for Google Chrome. This extension offers users the ability to search for any trending news on the web.

This extension changes your default search engine to Yahoo, and while active it changes the displayed ads on your browser, allowing it to make revenue on every ad you click. While this is not inherently malicious, the extension redirects your search to its servers first before forwarding it to yahoo and displaying search results. The information that is sent back to the servers contains your browsing data & visited web pages. As this represents a security and privacy risk, Sadooma is classified as a browser hijacker for its potentially unwanted functions and poor user experience. From the Author:
We’ve got what you need! If you are like us, addicted to interesting viral content, you’ve reached the best place for this. Sadooma will help you to find what is trending right now on the internet in an easy and immediate way. Privacy – We don’t share your information with others. Trending Content – New viral content every day Up to Date – We update sources to keep things fresh. Made with Love – Our content is safe and suitable for all ages.

About Browser Hijackers

Browser hijacking is a type of unwanted software, commonly a browser add-on or extension, which then causes modifications in the web browser’s settings. Browser hijackers can do more than simply modifying home pages. It redirects you to the sponsored sites and inserts advertisements on the internet browser that helps its creator generate earnings. A lot of people think that these types of sites are legitimate and harmless but that is not true. Nearly all browser hijackers pose an existent threat to your online safety and it is vital to classify them under privacy dangers. In a much worst case, your web browser could be hijacked to download malicious software that will do a lot of damage to your computer.

Indications of browser hijack

There are many symptoms that point to a browser hijacking: you see unauthorized modifications to your web browser’s homepage; you get re-directed to sites you never intended to visit; default web engine is modified; you’re getting browser toolbars you haven’t noticed before; your internet browser will display constant pop-up windows; your web browser starts running slowly or presents frequent errors; You can’t access certain websites, particularly anti-virus websites.

How they get into your computer or laptop

Browser hijackers infect computers via malicious email attachments, downloaded infected computer files, or by visiting infected sites. Many web browser hijackings originate from add-on software, i.e., browser helper objects (BHO), toolbars, or extensions added to web browsers to give them extra features. Browser hijackers sneak to your computer along with free software application downloads that you unknowingly install alongside the original. An example of some well-known browser hijacker includes Conduit, Anyprotect, Babylon, SweetPage, DefaultTab, RocketTab, and Delta Search, but the names are regularly changing.

Removal

Certain browser hijacking could be quite easily stopped by finding and removing the corresponding malware application from your control panel. But, the majority of hijackers are really tenacious and require specialized applications to remove them. You should think about undertaking manual repairs only if you’re a tech-savvy individual, as potential risks are associated with fiddling with the system registry and HOSTS file. You might opt for automatic browser hijacker removal methods by simply installing and running a reliable anti-malware application. One of the top tools for correcting browser hijacker malware is SafeBytes Anti-Malware. It can help you remove any pre-existing malware in your computer and gives you real-time monitoring and protection from the latest internet threats. Together with the anti-malware tool, a system optimizer will help you in removing all linked files and modifications in the computer registry automatically.

What To Do When You Cannot Install Any Antivirus?

All malware is inherently dangerous, but certain kinds of malware do a lot more damage to your computer than others. Some malware variants modify internet browser settings by including a proxy server or change the computer’s DNS configurations. In such cases, you’ll be unable to visit some or all websites, and thus unable to download or install the required security software to clear out the computer virus. If you are reading this, you may have infected by a virus that prevents you from downloading computer security software like Safebytes Anti-Malware. Although this sort of issue will be difficult to circumvent, there are some steps you can take.

Make use of Safe Mode to resolve the problem

In Safe Mode, you could adjust Windows settings, un-install or install some programs, and eliminate hard-to-delete malware. If the malicious software is set to load immediately when the computer starts, switching into this mode may well prevent it from doing so. In order to enter into Safe Mode or Safe Mode with Networking, press the F8 key while the computer is starting up or run MSCONFIG and locate the “Safe Boot” options under the “Boot” tab. Once you are in safe mode, you can try to download and install your anti-malware software program without the hindrance of malicious software. After installation, run the malware scanner to eliminate most standard infections.

Switch to some other browser

Malicious code may exploit vulnerabilities on a specific internet browser and block access to all anti-virus software websites. When you suspect that your Internet Explorer happens to be hijacked by a computer virus or otherwise compromised by hackers, the best plan of action is to switch to a different internet browser such as Google Chrome, Mozilla Firefox, or Apple Safari to download your chosen security application – Safebytes Anti-Malware.

Install and run anti-virus from your Thumb drive

Another solution is to save and run an antivirus program entirely from a USB drive. Try these simple actions to clear up your infected PC using a portable antivirus. 1) Make use of another virus-free PC to download Safebytes Anti-Malware. 2) Plug the Flash drive into the clean computer. 3) Double-click the Setup icon of the antivirus software to run the Installation Wizard. 4) Select the drive letter of the flash drive as the location when the wizard asks you where you would like to install the anti-virus. Follow the on-screen instructions to finish the installation process. 5) Remove the pen drive. You may now use this portable anti-malware on the infected computer. 6) Double click the Safebytes Anti-malware icon on the flash drive to run the program. 7) Run Full System Scan to identify and get rid of all kinds of malware.

Let's Talk About SafeBytes Anti-Malware!

If you are looking to download the anti-malware program for your computer, there are several tools in the market to consider however, you cannot trust blindly anyone, no matter whether it is paid or free program. Some of them do a great job in getting rid of malware threats while some will affect your PC themselves. You have to purchase a tool that has got a good reputation and detects not just viruses but other sorts of malware as well. One of the recommended tools by industry analysts is SafeBytes Anti-Malware, the safest program for Microsoft Windows. SafeBytes anti-malware is a powerful, very effective protection software made to assist users of all levels of IT literacy in finding and removing malicious threats out of their personal computers. Using its cutting-edge technology, this application will help you get rid of several types of malware including computer viruses, PUPs, trojans, worms, ransomware, adware, and browser hijackers. There are many great features you’ll get with this security product. Below are some of the highlighted features included in the tool. Real-time Threat Response: SafeBytes provides round-the-clock protection for your PC restricting malware intrusions instantly. It will regularly monitor your laptop or computer for hacker activity and also provides users with advanced firewall protection. World-class AntiMalware Protection: Safebytes is made on the best virus engine in the industry. These engines will find and get rid of threats even during the early phases of a malware outbreak. Faster Scanning: This software has got one of the quickest and most effective virus scanning engines in the industry. The scans are very accurate and take a short amount of time to complete. Safe Web Browsing: SafeBytes provides an instant safety rating on the web pages you are about to check out, automatically blocking unsafe sites and make sure that you’re certain of your online safety while browsing the net. Lightweight Tool: SafeBytes is a lightweight and user-friendly anti-virus and antimalware solution. Since it uses minimal computer resources, this application leaves the computer’s power exactly where it belongs to: with you actually. 24/7 Online Technical Support: You could get high levels of support round the clock if you’re using their paid software. To sum it up, SafeBytes Anti-Malware is pretty great for securing your laptop or computer against all sorts of malware threats. There is no doubt that your computer will be protected in real-time as soon as you put this software to use. So if you’re trying to find a comprehensive antivirus program that’s still simple enough to use, SafeBytes Anti-Malware is exactly what you will need!

Technical Details and Manual Removal (Advanced Users)

If you don’t want to use malware removal software and prefer to eliminate Sadooma manually, you could do so by going to the Add/Remove Programs menu in the Control Panel and removing the offending software; in cases of browser add-ons, you may uninstall it by visiting the browser’s Add-on/Extension manager. You might even want to reset your browser settings, as well as clear your web browser cache and cookies. In order to ensure the complete removal, manually examine your hard disk and registry for all the following and eliminate or reset the values as needed. However, editing the Windows registry is actually a complicated job that only advanced users and professionals should try to fix it. In addition, certain malicious programs have the capability to defend against its deletion. You are encouraged to do this procedure in Safe Mode.
Files: %USERPROFILE%\AppData\Local\Google\ Registry: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run
Read More
Sandbox failed to start with error 0xc030106
If you suddenly encountered an error when you try to run the Windows Sandbox that says, “Windows Sandbox failed to start, Error 0xc030106, The virtual machine or container exited unexpectedly”, read on as this post will guide you on what you can do to resolve the problem. According to security experts, this kind of error in Windows Sandbox is due to some issues with the supporting virtualization component. It could also be caused by other factors and to fix it, there are several potential fixes you need to check out. You can try running the Windows Sandbox as an administrator. You should also make sure that all the supporting processes are running properly, as well as try to install any pending Windows Updates.

Option 1– Try to run Windows Sandbox as an admin

  • In the Start Menu, scroll down until you see the entry for the Windows Sandbox.
  • Then right-click on it and select More and then select the “Run as administrator” option to open it with admin privileges.
  • Next, if a User Account Control or UAC prompt pops up, just click on Yes to proceed.
  • You should now be able to open the Windows Sandbox without the error. However, if the error persists, proceed to the next given options below.

Option 2 – Ensure that all the supporting processes and services are running properly

If running Windows Sandbox as an administrator didn’t fix the error, you have to ensure that all related processes for Windows Sandbox are running properly. To do that, follow these steps:
  • Tap the Win + R keys to launch the Run utility and type “services.msc” in the field and hit Enter to open the Windows Services Manager.
  • Next, from the list of services, look for the following services in the given order:
    • Network Virtualization Service
    • Virtual Disk
    • Hyper – V Virtual Machine
    • Hyper – V Host Compute Service
    • Container Manager Services
  • After you find the aforementioned services, restart each one of them.
  • Once done, try to open the Windows Sandbox again and see if the error is fixed or not.

Option 3 – Try to install any pending Windows Updates

If the second option still didn’t work, then you might want to check Windows Updates on your computer and see if there are any pending Windows Updates you have to install. All you have to do is go to the Windows 10 Settings app and then go to the Windows Updates section and click on the “Check for updates” button to check if there are any pending updates that are needed to be installed. This could fix the Windows Sandbox error.
Read More
How to get rid of Gardening Enthusiast Toolbar

The Gardening Enthusiast toolbar is another product that is advertised as a helpful addition to your browsing experience when it is really nothing more than the software you should remove as soon as possible. It is touted as a toolbar that will provide you with a lot of useful gardening tips. That is the hook to get you to install it. But, in truth, the only thing that it does is provide you with links to popular gardening websites that you can easily find on any search engine.

When installed the extension will change your default search engine and home page to MyWay.com

While browsing the internet with this extension you will see additional sponsored ads and links throughout your browsing session.

Anti-virus applications have marked this extension as a Browser Hijacker and are therefore marked for removal. While not considered malware, the fact that many users find it to hinder browser performance has led to its detection and flag for optional removal.

About Browser Hijackers

Browser hijacking means a malicious program code has control over and modified the settings of your browser, without your permission. Practically all browser hijackers are made for marketing or advertising purposes. Usually, hijackers will force hits to internet sites of their preference either to increase web traffic producing higher ad earnings, or to obtain a commission for every user visiting there. Nevertheless, it isn’t that harmless. Your internet safety is jeopardized and it is extremely annoying. Once the malware attacks your laptop or computer, it starts to mess things up a whole that slows your PC down to a crawl. In the worse case, you will be forced to tackle serious malware threats too.

Browser hijacking symptoms

The typical symptoms that suggest having this malware on your PC are: your home page has been reset to some unfamiliar website; you see new unwanted favorites or bookmarks added, usually directed to ad-filled or pornography sites; the default online search engine has been changed and the web browser security settings have been lowered without your knowledge; find new toolbars that you didn’t add; you notice lots of pop-up ads on your screen; your web browser gets sluggish, buggy, crashes quite often; Inability to navigate to certain sites, especially anti-malware and also other security software webpages.

Exactly how browser hijacker finds its way to your PC

A browser hijacker can be installed on your computer when you go to an infected site, click an e-mail attachment, or download something from a file-sharing website. They could be included with toolbars, BHO, add-ons, plug-ins, or browser extensions. Other times you might have accidentally accepted a browser hijacker as part of a software program package (generally freeware or shareware). Examples of popular browser hijackers are Fireball, Ask Toolbar, GoSave, CoolWebSearch, Babylon Toolbar, and RocketTab. Browser hijackers can record user keystrokes to gather potentially invaluable information that leads to privacy issues, cause instability on computers, significantly disrupt user’s browsing experience, and ultimately slow down the PC to a point where it will become unusable.

Removing browser hijackers

Certain browser hijacking could be easily reversed by identifying and eliminating the corresponding malware application from your control panel. Unfortunately, many of the software products used to hijack an internet browser are deliberately designed to be hard to detect or get rid of. You should think of undertaking manual fixes only if you are a tech-savvy person, as risks are associated with tinkering with the computer registry and HOSTS file. Browser hijackers can be effectively removed by installing anti-malware software on the affected PC. If you need to remove persistent hijackers effectively, install the award-winning anti-malware tool Safebytes Anti-Malware. And employ a system optimizer, like Total System Care, to eliminate all related files in the registry and fix browser issues.

How To Get Eliminate Malware That Is Preventing Anti-Malware Installation?

All malware is inherently harmful, but certain kinds of malicious software do more damage to your computer or laptop than others. Certain malware types alter internet browser settings by including a proxy server or change the computer’s DNS configuration settings. When this happens, you’ll be unable to visit certain or all of the sites, and thus unable to download or install the necessary security software to get rid of the computer virus. If you are reading this, chances are you’re stuck with a virus infection that is preventing you to download and/or install Safebytes Anti-Malware software on your computer. Even though this sort of problem can be harder to get around, there are some steps you can take.

Remove viruses in Safe Mode

Safe Mode is a special, basic version of Microsoft Windows where only the bare minimum services are loaded to prevent viruses as well as other problematic applications from loading. In the event, the malware is set to load immediately when PC boots, shifting to this particular mode can prevent it from doing so. To enter into Safe Mode or Safe Mode with Networking, press F8 while the PC is starting up or run MSCONFIG and locate the “Safe Boot” options under the “Boot” tab. Once you reboot into Safe Mode with Networking, you could download, install, as well as update anti-malware software from there. At this point, you can run the antivirus scan to eliminate viruses and malware without any interference from another application.

Switch over to an alternate internet browser

Malicious code might exploit vulnerabilities on a specific browser and block access to all antivirus software websites. In the event you suspect that your Internet Explorer happens to be hijacked by a virus or otherwise compromised by cybercriminals, the most effective thing to do would be to switch over to a different browser like Firefox, Chrome, or Safari to download your chosen computer security software – Safebytes Anti-Malware.

Install security software on a flash drive

To successfully get rid of the malware, you need to approach the problem of installing the anti-malware program on the affected computer system from a different perspective. To run antivirus from a USB drive, follow these simple measures: 1) Make use of another virus-free computer to download Safebytes Anti-Malware. 2) Plug the USB drive into the clean computer. 3) Double click on the downloaded file to open the installation wizard. 4) When asked, select the location of the pen drive as the place in which you want to store the software files. Follow the activation instructions. 5) Unplug the pen drive. You may now use this portable antivirus on the infected computer. 6) Double-click the anti-malware program EXE file on the pen drive. 7) Click on “Scan Now” to run a complete scan on the affected computer for viruses.

Benefits and Features of SafeBytes Security Suite

If you’re planning to purchase anti-malware for your desktop, there are numerous brands and utilities for you to consider. Some are well worth your money, but most aren’t. You must select a company that creates industry-best anti-malware and has earned a reputation as trustworthy. Among few good applications, SafeBytes Anti-Malware is the highly recommended software program for security-conscious people. SafeBytes anti-malware is a very effective and easy-to-use protection tool that is designed for end-users of all levels of IT literacy. Using its cutting-edge technology, this application will help you get rid of several types of malware like viruses, worms, PUPs, trojans, adware, ransomware, and browser hijackers.

SafeBytes anti-malware takes PC protection to a totally new level with its enhanced features. Here are some of the features you will like in SafeBytes.

Anti-Malware Protection: Built upon a highly acclaimed anti-virus engine, this malware removal tool can detect and remove several stubborn malware threats such as browser hijackers, potentially unwanted programs, and ransomware that other typical antivirus programs will miss. Real-time Threat Response: SafeBytes offers real-time active supervision and protection from all known viruses and malware. It will constantly monitor your computer for hacker activity and also gives end-users sophisticated firewall protection. Safe Browsing: Safebytes allots all sites a unique safety ranking that helps you to have an idea of whether the website you’re about to visit is safe to browse or known to be a phishing site. Lightweight: SafeBytes is renowned for its low impact on processing power and great detection rate of countless threats. It works silently and efficiently in the background so you are free to make use of your personal computer at full power all the time. 24/7 Premium Support: You will get 24/7 technical support to quickly resolve any issue with your security software. SafeBytes will keep your personal computer safe from the latest malware threats automatically with hardly any input needed from you again. Malware problems will become a thing of the past once you put this software to use. You’ll get the best all-around protection for the money you spend on SafeBytes Anti-Malware subscription, there is no doubt about it.

Technical Details and Manual Removal (Advanced Users)

If you do not wish to use malware removal software and like to remove Gardening Enthusiast manually, you could do so by going to the Add/Remove Programs menu in the Control Panel and deleting the offending program; in cases of browser add-ons, you may uninstall it by visiting the browsers Add-on/Extension manager. You might also want to reset your home page and search engine providers, and also delete browsing history, temporary files, and internet cookies. To make sure of complete removal, find the following Windows registry entries on your computer and remove them or reset the values appropriately. However, editing the Windows registry is really a difficult job that only experienced computer users and professionals should attempt to fix the problem. In addition, certain malware keeps replicating which makes it difficult to eliminate. Completing this task in Safe Mode is advised.
Folders: C:\Program Files\GardeningEnthusiast_7j Files: Search and Delete: 7jbar.dll 7jhighin.exe 7jmedint.exe 7jregfft.dll 7jregiet.dll 7jhkstub.dll 7jreghk.dll 7jSrcAs.dll 7jSrchMn.exe NP7jStub.dll 7jPlugin.dll 7jauxstb.dll 7jbprtct.dll 7jdlghk.dll 7jradio.dll 7jieovr.dll INSTALL.RDF
Read More
The boot configuration data store can not open
The Boot Configuration Data or BCD files have the instructions required by the Windows operating system in order to properly boot the computer. So if you experience any trouble when you boot your computer, then it is possible that it is due to some misconfiguration or even corrupted Boot Configuration Data files. And if you also encounter an error saying,
“The boot configuration data store could not be opened”
while you try to carry out any command on the bcedit.exe, then you’ve come to the right place as this post will guide you on how you can fix this error in Windows 10. This kind of error could pop up if the system is not able to locate the specified file. It is also possible that the requested system device can’t be found or that the boot configuration data store could not be opened. In addition, when you open the System Configuration or MSConfig, you might notice that there is no Boot data, and according to the reports, is that when you try to dual boot the computer, the installer will replace the default bootloader.

Explanation

In case you don’t know, Windows’ earlier versions were stored in the “Boot.ini” file. You can find the entry in the EFI firmware boot manager of the EFI-based operating system which is located at EFIMicrosoftBootBootmgfw.efi. Whatever the cause of the error is, there are several suggestions you can check out to resolve the problem. You can try to set an entry option value in BCD or enable the Advanced options menu, as well as rebuild the BCD. Before you proceed with the troubleshooting options provided below, make sure that you boot your computer into the Advanced Recovery Mode first since that’s where you can find Command Prompt under the Advanced Options. In addition, you also have to suspend or disable BitLocker and Secure Boot on your PC.

Option 1 – Try to set an entry option value in BCD

  • Once you’re in the Advanced Options, select Command Prompt.
  • Next, execute this command to set an entry point: bcdedit /set {current} Description "TheNameYouWant"
  • After the command has been executed, it will enable the system to trust a version of Windows that is not trusted by default. This should fix the problem, if not, follow the next given options below.

Option 2 – Try to specify the BCD file

  • In the elevated Command Prompt, execute this command: bcdedit /store c:BootBCD
  • Once done, the command will give you a list of options and then execute this next command: bcdedit /store c:BootBCD /set bootmenupolicy legacy
  • After that, restart your computer and select your Windows and then tap the F8 key right away.
Note: When you select the legacy option, the Advanced Options menu will be available during the computer boot up and then you can select into which operating system you can boot your computer into.

Option 3 – Try to rebuild the BCD files

The first thing you can do to resolve the issue is to Rebuild Boot Configuration Data or BCD files.
  • You can start by booting into the installation environment for Windows 10 from an installation media.
  • After that, click on Repair your computer and on the blue screen, select Troubleshoot and then select the Advanced options menu.
  • From there, select Command Prompt and once you open it, enter each one of the commands given below by sequence.
    • bootrec /FixMbr
    • bootrec /FixBoot
    • bootrec /ScanOS
    • bootrec /RebuildBcd
  • Once you’re done executing the commands given above, type “exit” to close the Command Prompt window and then restart your computer and see if it fixed error code 0xc000014c.
Read More
How to fix Windows 10 Error 0x803f7000

Error code 0x803f7000 -What is it?

Error code 0x803f7000 refers to an issue in Windows 10 with downloading apps through Windows Store. When you choose the app or game to download, it heads to Downloads in the Store app. Then it says it is acquiring a license but then fails. When you click the “See details” link, you see the error code 0x803F7000. It could mean that the date and time or region settings in your Windows 10 are incorrect or there are some problems with the Windows Store Cache.

Symptoms

  • This error appears when you are running Windows 10 and trying to download an app through the Microsoft store. The error code may appear with this message: Something went wrong. The error code is 0x803f7000, in case you need it
  • You might also see this message along with the error code: "It looks like you've reached your device limit for installing apps and games from the Store on your Windows 10 device. If you want to install apps and games from the Store on another Windows 10 device, remove a device from the device list."

Solution

Restoro box imageError Causes

There may be several reasons for this error:
  1. This problem may arise if the date and time in Windows 10 are incorrect.
  2. If the region has been set incorrectly.
  3. Problems with Windows store cache.
  4. Windows store server overloaded.
  5. The Windows version you are using is pirated.

Further Information and Manual Repair

Method 1:

Correcting date and time:
  • Open up Control Panel > Clock, Language, and Region.
  • Then click on Date & Time.
  • Now click on Change date & time to correct your time.

Method 2:

Correcting region:
  • Navigate to Control Panel > Clock, Language, and Region.
  • Then click on Region.
  • Then click on the Location tab.
  • Now set your actual region from Home location section.
  • Click Apply & OK.

Method 3:

Resetting Windows Store:
  • Press Windows Flag Key + X from your keyboard. Then select Command Prompt (Admin). It will launch Command prompt as administrator.
  • Then type wsreset and hit Enter.
  • Wait for a few seconds. It will automatically open Windows Store.
  • Then try to download any apps.

Method 4:

  1. Open Command prompt in local machine and type in the Windows Store reset tool exe
  2. Activate Windows by going to Settings>Updates and Security
  3. Run the Modern UI/metro app troubleshooter from Microsoft
  4. Keep trying it several times.
  5. Try changing locale and time zone to the United States as shown below
  6. Go to control panel, Language settings
  7. Select location to the United States
  8. This will reset the language to US English. After this try downloading the apps again.
  9. Try restarting the Windows Updater service or restart the machine once.
You must make sure that you have a good internet connection. You need that for the updates and downloads complete without disruption.

Method 5:

Make sure the app isn’t blocked by the Windows firewall: To make your PC more secure, some apps are blocked by Windows Firewall by default. For proper functioning, you might need to enable an app to receive info through the firewall. For more info, see the "Allow an app to receive info through the firewall," and follow the procedure from start to finish.

Method 6:

Check with your system admin: If your PC is part of a network in an organization, like a business, school, or government agency, your system administrator might have turned off the use of certain apps using the Group Policy. Contact your system admin if you believe that Group Policy is preventing you from using an app.

Method 7:

Make sure your apps are up-to-date: To make the apps working properly, you must keep your apps up-to-date. This could be done by turning on automatic updates in the Windows Store.

Method 8:

Contact the app publisher To view the publisher’s app support info, follow these steps:
  1. On the Start screen, tap or click Store to open the Windows Store.
  2. Search or browse for the app, and then tap or click it.
  3. Scroll to the Details section of the app's description page, and then tap or click the support link for the app under Learn more. The link will open an email message for you to contact support or will take you to a support website.
If you do not possess the technical expertise required to accomplish this yourself or do not feel comfortable doing so, download and install a powerful automated tool to get the job done.
Read More
Motitags Browser Hijacker Removal Guide

The Motitags toolbar browser add-on was created by Mindspark Inc. and is compatible with Internet Explorer and Mozilla Firefox. It claims to enhance users’ Internet browsing experience by enabling smileys within popular email clients such as Gmail, Yahoo!, AOL, and Outlook Live. While such added functionality may seem useful, Internet users should be aware that this browser plugin is categorized as a Browser Hijacker due to its behavior.

When installed this extension changes your default search engine, the home page, and new tab to MyWay.com, and while installed it gathers user browsing data and sends it back to Mindspark servers. This data is later used to inject additional unwanted ads into the user’s browser search results.

About Browser Hijackers

Browser hijacking is actually a type of unwanted software program, often a web browser add-on or extension, which then causes modifications in the web browser’s settings. Browser hijacker malware is developed for a number of reasons. These are generally used to force hits to a specific website, manipulating web traffic to generate ad revenue. It could seem harmless, but the majority of these websites aren’t legitimate and could pose a serious threat to your online safety. In a much worst case, your internet browser could be hi-jacked to open up your computer to a host of additional computer infections.

How one can identify a browser hijack

There are several signs of browser hijacking. Here are a few of them: the home page of your browser is changed unexpectedly; you get re-directed to websites you never intended to visit; the essential web browser settings are altered and unwanted or unsafe resources are added to the trusted websites list; discover new toolbars that you didn’t add; endless pop-up adverts show up and/or your web browser popup blocker is disabled; your browser gets sluggish, buggy, crashes frequently; you can’t navigate to certain internet pages, for example, security software related websites.

So how does a browser hijacker infect a computer?

Browser hijackers infect computers via malicious email attachments, downloaded infected files, or by going to infected sites. Many internet browser hijackings come from add-on software, i.e., toolbars, browser helper objects (BHO), or plug-ins added to browsers to provide them extra capabilities. Browser hijackers sneak into your pc in addition to free software application downloads that you unwittingly install along with the original. An example of some infamous browser hijacker includes Babylon, Anyprotect, Conduit, SweetPage, DefaultTab, RocketTab, and Delta Search, but the names are often changing. Browser hijacking can bring about severe privacy problems and also identity theft, affect your browsing experience by taking control over outgoing traffic, drastically slows down your PC by consuming lots of resources, and result in system instability also.

Getting rid of browser hijackers

Some browser hijacking could be easily stopped by discovering and eliminating the corresponding malware program through your control panel. But, most browser hijackers are difficult to eliminate manually. No matter how much you try to eliminate it, it can return over and over. Rookie PC users should not try for the manual form of removal, since it needs thorough computer knowledge to perform fixes on the system registry and HOSTS file. Professionals always recommend users to remove any malware including browser hijacker with an automatic removal tool, which is easier, safer, and quicker than the manual removal technique. Safebytes Anti-Malware has a state-of-the-art anti-malware engine that will help you stop browser hijacking in the first place, and clean up any existing issues.

What To Do If You Cannot Download Safebytes Anti-Malware?

Malware could potentially cause all sorts of damage once they invade your computer, starting from stealing your private details to erasing data files on your computer system. Some malware sits in between your computer and your internet connection and blocks some or all sites that you would like to visit. It might also prevent you from installing anything on your PC, particularly anti-virus programs. If you’re reading this, you probably have infected by malware that prevents you from downloading a computer security program such as Safebytes Antimalware on your PC. There are a few options you could try to get around with this particular obstacle.

Install in Safe Mode

If the malware is set to load automatically when Windows starts, entering Safe Mode could block this attempt. Only minimal required programs and services are loaded whenever you start your personal computer in Safe Mode. To start your Windows XP, Vista, or 7 computers in Safe Mode with Networking, please do as instructed below. 1) At power on/start-up, press the F8 key in 1-second intervals. This would conjure up the Advanced Boot Options menu. 2) Choose Safe Mode with Networking with arrow keys and press Enter. 3) When you are into this mode, you will have online access again. Now, get the virus removal application you want by using the web browser. To install the program, follow the directions within the setup wizard. 4) Right after the software is installed, allow the scan run to eliminate viruses and other threats automatically.

Use an alternate web browser to download security software

Malicious code could exploit vulnerabilities on a particular internet browser and block access to all anti-virus software sites. The most effective way to avoid this issue is to choose a web browser that is renowned for its security features. Firefox contains built-in Malware and Phishing Protection to keep you safe online.

Install security software on a USB drive

To effectively eliminate the malware, you need to approach the problem of installing an anti-virus software program on the infected PC from a different angle. Follow these steps to run the antivirus on the affected computer. 1) Download Safebytes Anti-Malware or Microsoft Windows Defender Offline onto a virus-free computer system. 2) Plug the pen drive into the uninfected computer. 3) Double click on the downloaded file to open the installation wizard. 4) Choose the USB stick as the destination for saving the software file. Follow the instructions on the screen to finish up the installation process. 5) Disconnect the flash drive. You may now use this portable anti-malware on the infected computer. 6) Double-click the anti-malware program EXE file on the USB flash drive. 7) Run Full System Scan to detect and get rid of all sorts of malware.

Benefits and Features of SafeBytes Security Suite

To protect your laptop or computer from many different internet-based threats, it is very important to install an anti-malware program on your PC. However, with so many anti-malware companies in the marketplace, nowadays it’s difficult to decide which one you should obtain for your laptop. A few are very good ones, some are ok types, and some are simply just fake anti-malware applications that could damage your computer themselves! When looking for an anti-malware program, pick one which gives reliable, efficient, and total protection against all known viruses and malware. One of the highly recommended software by industry analysts is SafeBytes Anti-Malware, a popular security application for Microsoft Windows. Safebytes is one of the well-established computer solutions companies, which provide this complete anti-malware software. Using its cutting-edge technology, this application can assist you to eliminate multiples types of malware such as viruses, PUPs, trojans, worms, ransomware, adware, and browser hijackers.

SafeBytes possesses a variety of wonderful features that can help you protect your laptop or computer from malware attack and damage. Below are some typical features found in this application:

World-class AntiMalware Protection: Built upon a greatly acclaimed anti-virus engine, this malware removal application can find and remove numerous stubborn malware threats like browser hijackers, PUPs, and ransomware that other typical anti-virus applications will miss. Real-time Threat Response: SafeBytes gives complete and real-time security for your computer. They’re extremely effective in screening and getting rid of numerous threats since they’re regularly improved with the latest updates and alerts. “Fast Scan” Features: Safebytes Anti-Malware, using its enhanced scanning engine, provides ultra-fast scanning which can quickly target any active online threat. Website Filtering: Through its unique safety ranking, SafeBytes notifies you whether a site is safe or not to visit it. This will ensure that you’re always certain of your online safety when browsing the internet. Light-weight: The program is lightweight and can run silently in the background, and will not have an effect on your PC efficiency. 24/7 Premium Support: SafeBytes provides you with 24/7 technical support, automatic maintenance, and software upgrades for the best user experience. Simply put, SafeBytes has developed a meaningful anti-malware solution that is aimed to protect you against various malware. Malware issues can become a thing of the past when you put this tool to use. So if you’re seeking the very best malware removal application out there, and when you don’t mind shelling out a few bucks for it, go for SafeBytes Anti-Malware.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove Motitags without using an automated tool, it may be possible to do so by removing the application from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. Additionally, it is advised to factory reset your web browser to its default state to fix corrupt settings. Finally, check your hard drive for all of the following and clean your computer registry manually to get rid of leftover application entries after uninstalls. Please remember that only advanced users should try to manually edit the system files simply because removing any single vital registry entry leads to a serious issue or even a PC crash. Moreover, certain malicious programs have the capability to defend against its removal. Carrying out this in Safe Mode is recommended.
Folders: C:\Program Files\Motitags_94 C:\Program Files\Motitags_94EI C:\Users\(username)\AppData\Local\Motitags_94 C:\Users\(username)\AppData\LocalLow\Motitags_94 C:\Users\(username)\AppData\LocalLow\Motitags_94EI C:\Users\(username)\AppData\Roaming\Mozilla\Firefox\Profiles\g75s8p2u.default\extensionsffxtbr-bs@Motitags_94.com C:\Users\(username)\AppData\Roaming\Mozilla\Firefox\Profiles\g75s8p2u.default\extensionsffxtbr@Motitags_94.com C:\Users\(username)\AppData\Roaming\Mozilla\Firefox\Profiles\g75s8p2u.default\Motitags_94 Files: Search and Delete: 94auxstb.dll 94auxstb64.dll 94bar.dll 94barsvc.exe 94bprtct.dll 94brmon.exe 94brmon64.exe 94brstub.dll 94brstub64.dll 94datact.dll 94dlghk.dll 94dlghk64.dll 94feedmg.dll 94highin.exe 94hkstub.dll 94htmlmu.dll 94httpct.dll 94idle.dll 94ieovr.dll 94medint.exe 94mlbtn.dll 94Plugin.dll 94radio.dll 94regfft.dll 94reghk.dll 94regiet.dll 94script.dll 94skin.dll 94skplay.exe 94SrcAs.dll 94SrchMn.exe 94srchmr.dll 94tpinst.dll AppIntegrator64.exe AppIntegratorStub64.dll BOOTSTRAP.JS chromeffxtbr.jar CHROME.MANIFEST CREXT.DLL CrExtP94.exe DPNMNGR.DLL EXEMANAGER.DLL FF-NativeMessagingDispatcher.dll Hpg64.dll INSTALL.RDF installKeys.js LOGO.BMP NP94Stub.dll T8EPMSUP.DLL T8EXTEX.DLL T8EXTPEX.DLL T8HTML.DLL T8RES.DLL T8TICKER.DLL UNIFIEDLOGGING.DLL VERIFY.DLL 94EIPlug.dll 94EZSETP.dll NP94EISb.dll Registry: Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Value: Motitags_94 Browser Plugin Loader Data: 94brmon.exe Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Value: Motitags Search Scope Monitor Data: C:\PROGRA~1\MOTITA~2\bar.binsrchmn.exe” /m=2 /w /h Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Value: Motitags Home Page Guard 32 bit Data: C:\PROGRA~1\MOTITA~2\bar.bin\AppIntegrator.exe Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Value: Motitags EPM Support Data: C:\PROGRA~1\MOTITA~2\bar.binmedint.exe” T8EPMSUP.DLL,S Key HKCU\Software\AppDataLow\Software\Motitags_94 Key HKLM\SOFTWARE\Motitags_94 Key HKLM\SOFTWARE\MozillaPlugins\@Motitags_94.com/Plugin Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Motitags_94bar Uninstall Firefox Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\6df8a038-1b03-41eb-a92b-0e82de08ee4a Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\598f4e85-2ee6-43a8-bf43-c75c82b925fe Key HKLM\SOFTWARE\Classes\Motitags_94.ToolbarProtector.1 Key HKLM\SOFTWARE\Classes\Motitags_94.ToolbarProtector Key HKLM\SOFTWARE\Classes\Motitags_94.ThirdPartyInstaller.1 Key HKLM\SOFTWARE\Classes\Motitags_94.ThirdPartyInstaller Key HKLM\SOFTWARE\Classes\Motitags_94.SettingsPlugin.1 Key HKLM\SOFTWARE\Classes\Motitags_94.SettingsPlugin Key HKLM\SOFTWARE\Classes\Motitags_94.ScriptButton.1 Key HKLM\SOFTWARE\Classes\Motitags_94.ScriptButton Key HKLM\SOFTWARE\Classes\Motitags_94.RadioSettings.1 Key HKLM\SOFTWARE\Classes\Motitags_94.RadioSettings Key HKLM\SOFTWARE\Classes\Motitags_94.Radio.1 Key HKLM\SOFTWARE\Classes\Motitags_94.Radio Key HKLM\SOFTWARE\Classes\Motitags_94.PseudoTransparentPlugin.1 Key HKLM\SOFTWARE\Classes\Motitags_94.PseudoTransparentPlugin Key HKLM\SOFTWARE\Classes\Motitags_94.MultipleButton.1 Key HKLM\SOFTWARE\Classes\Motitags_94.MultipleButton Key HKLM\SOFTWARE\Classes\Motitags_94.HTMLPanel.1 Key HKLM\SOFTWARE\Classes\Motitags_94.HTMLPanel Key HKLM\SOFTWARE\Classes\Motitags_94.HTMLMenu.1 Key HKLM\SOFTWARE\Classes\Motitags_94.HTMLMenu Key HKLM\SOFTWARE\Classes\Motitags_94.FeedManager.1 Key HKLM\SOFTWARE\Classes\Motitags_94.FeedManager
Read More
GoDaddy data breach compromised 1.2M accounts
A very serious data breach has happened to the unfortunate GoDaddy hosting service placing a little over 1.2 million accounts affected. Security breaches sadly are not a rare occurrence but this time it is a little different. GoDaddy breachEach time when the company is breached data is stolen and that places the company in a bad light usually because its user database has been compromised and people are concerned about their data being misused. This is very rational fear and concern but this time things are a little bit different than usual, why is that, you might ask? Well, as before mentioned GoDaddy is a hosting company and the vector of attack was aimed at the part where it is hosting WordPress. Attackers were able to get their hands on the sFTP credentials of customers on that server meaning that all of the websites are also been relieved of their user base as well. This potentially means that there is a high chance that all of the hosted web site's content is also compromised, meaning that your data could also be compromised even if you were not a GoDaddy customer, all you needed to do is to be a member of any site hosted on their platform. GoDaddy has reset WordPress passwords and private keys, so it’s already taken the steps required to stock the attacker from exploiting anything with the passwords obtained. The company is in the process of generating new SSL certificates for customers. Bad thing is that the attack used a compromised password to get into systems all the way back around September 6th, 2021, the breach was discovered on November 17th, 2021, which is more than a 2-month active time where the attacker could harvest tons of data. The outcome of this attack will be seen in the upcoming time, until then be safe, and Just in case change your passwords.
Read More
Command prompt tips and tricks
Hello and welcome to errortools articles. Today we will talk about some great and awesome tips and tricks for the command prompt. Commands which can make your life easier and your workday more pleasant. That being said let's dive in right into muddy waters and swim out with new knowledge.

Tip 1: Read Motherboard information

There are a lot of reasons why you would like to read information from your motherboard, maybe you would like to upgrade your BIOS, perhaps you would like to know the serial number, maybe even the version number. Well, you can, type the following code into the command prompt and you will receive all information about your motherboard.
wmic baseboard get product,version,serialnumber,product

Tip 2: Copy command output to clipboard

Getting information from the command prompt to a word processor, into an email or any other medium can be somewhat troublesome, usually, people tend to screenshot or write from a command prompt into another destination, which could induce errors, and let's be honest, it is not practical. You can copy command output directly into the clipboard ready for pasting it anywhere with | clip. So for example if you would like to paste the directory structure of your c drive command would look like: dir c: | clip, now output would be placed into the clipboard ready to be pasted anywhere needed.

Tip 3: Erase data permanently

When you delete data on your hard drive, what really happens is that files are marked with a marker which marks that space for new data writing, but the data itself is still present and can be brought back. This sometimes could impose problems but if you would type: cipher /w:c Windows will write random data over each marked file deleting it forever without means to be brought back.

Tip 4: Manage your IP address

If you would like to play with your IP address and do fancy stuff with it do the following: ipconfig /release to release your IP address ipconfig /renew to renew your IP address ipconfig /flushdns to flush down DNS information and enjoy a new browsing start.

Tip 5: Check to see are packets reaching the desired location

You installed a new LAN printer, or a new switch, maybe you want to check if your new site is up and running. Use ping destination in order to see if TCP packets are reaching desired information, you can use it with a specific address like ping 192.168.1.1 or you can type a web address, for example, ping google.com and see if a connection can be established.

Tip 6: Get information about a specific command

So you learned some command prompt commands, but you do not know all of their configuration or switches? No worries, just type command/? to get a list of available switches for it. For example ipconfig/? will write you a list of available switches for ipconfig command.

Tip 7: Link and execute multiple commands one after another.

Let us say that for example, you would like to copy files into a different folder, then rename some and delete others and you need to do a couple of times. Instead of writing command after command once each one is finished link them with && and they will execute one after another.

Tip 8: Scan and repair files.

In order to scan files and repair broke or corrupted ones write in the command prompt: sfc /scannow. Please know that this command can take a long time since it is solely dependant on the number of files, their size, and the power of the computer.

Tip 9: Manage and configure your computer energy

Command powercfg will let you manage and see the power configuration of your computer. Just write powercfg/? and see what you need and want to change or get information about.

Tip 10: Associate files with applications

Windows already has some file associations defined, and some applications take over some type of files but if you want to take control into your own hand use assoc command. For example assoc.txt= "APPLICATION NAME" will associate txt files with the provided application.

Tip 11: Hide files and folder.

Do you have some folder or file with information that you do not want to be seen when someone opens file explorer? Use attrib +h <name of file> and hide file or attrib +h /D <folder name> to hide folder.

Tip 12: Get a list of installed computer drivers

Want to know which drivers are installed in your system? Use driverquery and take a look.

Tip 13: Find and locate shared folders

have you shared a folder but forgot which one and where? Do not bang your head on the wall, we have a simple solution for you. just type in command prompt net share and see everything.

Tip 14: Run commands as an administrator

You do not have administrator privileges? Do you want to bypass common blockades?
runas /user:yourdomainadministrator command
That is all that we have for you today, I certainly hope you have found something useful here and that we have managed to teach you some valuable things.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status