![Disable non MS store apps in Windows 11 post picture](https://errortools.com/wp-content/uploads/2021/08/Disable-non-MS-store-apps-in-Windows-11-post-picture.jpg)
- Press ⊞ WINDOWS + I to open Windows settings
- Select Apps and then choose Apps & Features
- Click on Choose where to get apps to bring a drop-down menu
- Select The Microsoft Store only (Recommended)
- Close settings
As you know, the Win + X menu, which is the shortcut context menu, is a useful way to launch several utilizes in Windows such as Power Options, Windows PowerShell, Event Viewer, Device Manager, and so on. However, there are times when you might experience difficulty in identifying the required utility. This is actually a part of the Windows 10 shell that goes out of scope in the customization of Windows 10. However, there is an easy trick you can use to do that. So in this post, you will be guided on how you can rename the options in the Win + X menu in Windows 10.
In case you don’t know, the context menu is divided into three groups. Microsoft has categorized the bottom-most part as Group 1, while the middle part is categorized as Group 2 and the first part as Group 3. To rename these options, you need to use File Explorer and follow the instructions laid out below.
Step 1: First, tap the Win + E keys to open File Explorer.
Step 2: Next, navigate to this path: %LocalAppdata%MicrosoftWindowsWinX
Step 3: From there, you should see three folders as Group 1, Group 2, and Group 3. Open the appropriate folder of your choice.
Step 4: After that, right-click on the shortcut option you want to rename and then select Properties.
Step 5: Next, navigate to the Shortcut tab under the Properties window.
Step 6: Now in the text field of Comment, enter the new name of the option you selected.
Step 7: Click on the Apply and OK buttons to save the changes made.
Note: You can now either Sign back in or sign out of your Windows 10 User Account to see the result of the changes you’ve made. You could also restart the process of File Explorer via Task Manager. This will close the File Explorer as well as the shell components and then only launch the shell components again. In addition, you can check the Win + X menu to see the customized name that you’ve just set for a particular option. As you can see, even though it does not add anything extra, it is still a lot better in knowing how you can customize it.
Error code 0xc0000001 on Windows 10 has been reported by some users when attempting to install Windows 10. When you encounter this error, the setup will be in a loop and the error message will keep popping up.
If you encounter the error code 0xc0000001 while trying to install Windows 10, it most probably be due to corrupted installation file. However, it can also be caused by any of the following:”
Here are some methods that will help you fix the error code 0xc0000001 while trying to install Windows 10. Do not perform these methods unless you’re absolutely confident you can do it properly. Otherwise, you might make things worse.
If you’re not that confident, consider seeking advice from a technical expert. If you can’t afford one, you may want to consider getting an automated software to fix the job.
If you need to manually wipe the drive and then convert it to GPT, follow these steps:
select disk <disk number> (press enter)
clean (press enter)
convert gpt (press enter)
exit (press enter)
Note: when you’re prompted to choose the installation type, make sure to choose Custom. Then, choose unallocated space and click Next. This will automatically start the installation of Windows 10.
Automatic Repair is a Windows feature/utility that allows you to fix certain system problems preventing you from installing or starting Windows. It works by scanning your computer system for any potential problem and tries to fix it.
This will automatically run the utility.
Another possible reason why you are getting this error while installing Windows 10 is due to the connected external hard drives. To fix this, power down your computer. Afterward, unplug and remove all connected external hard drives. If you’re using USB device to install Windows 10, ensure your BIOS is set to boot your computer from the USB.
Another possible reason why you experience this error is that your copy of the Windows 10 installer is corrupted. To fix this, it’s better to create a new copy of the Windows 10 installer.
If you still encounter these errors after performing the above methods, find a trustworthy automated tool. As long as the automated tool is powerful and reliable, it will help you fix this error.
22H2 update for Windows 11 will arrive later this year and although Microsoft is not releasing anything big there will be some interesting improvements and fixes. We take a look at some that caught our attention.
One of the most interesting upcoming features is enhanced phishing protection. Microsoft Defender SmartScreen will be upgraded to alert users when they try to store passwords in plain text files and also if they accidentally type in a Microsoft account password on phishing sites.
"These enhancements will make Windows the world's first operating system with phishing safeguards built directly into the platform and shipped out of the box to help users stay productive and secure without having to learn to be their own IT department,"
Microsoft
Finally, Windows File explorer is getting tabs that will allow much easier management of folders and files inside it.
It is confirmed that Microsoft is also working on a new 'HOME' sidebar that should be modern in design and in features including OneDrive so you can find everything in one place.
Pinning of favorite files was also mentioned so you can easily pin favorites for quick access.
Windows 11 has brought back widgets in a new way and from all the feedback users are loving them. Currently, you have a widget sidebar on the left part of the screen where you have your chosen store widgets but from the Microsoft teaser, we will have soon the option to have them in full screen.
If you are using a widget for reading news, blogs, etc. this feature will be very good since you will be able to use your whole screen for information and not just a part of it.
Another new feature is 'suggested actions' which is going to be particularly useful in apps like Microsoft Teams. With this new feature, you can highlight a date in a Teams message and Windows will suggest actions.
For example, if you highlight a date, you'll see a recommendation to create an event in Microsoft Calendar for that day.
New Tab Aid is an extension for Google Chrome. It is published by Spigot Inc. It is classified as a potentially unwanted browser hijacker as it injects Yahoo search into your new tab windows. This extension also adds recently viewed tabs under the search bar. It also redirects all your searches to Yahoo instead of your default browser search engine. It is often found bundled with other software found on the internet and not installed directly by the user. For these reasons, numerous anti-malware utilities flag New Tab Aid as potentially unwanted or malicious.
Ever gotten an e-mail offer that seemed just a little bit too good to be true? Might’ve been a phishing attempt! These are everywhere and can come in many different forms.
So what’s phishing exactly, how can you detect it and how can you keep safe?
Phishing (pronounced like fishing) is a type of cyberattack that tricks the user into trusting the source and revealing sensitive information. Fishing being the perfect analogy, the bait is a legitimate-looking site, e-mail or file and when you take a bite, your identity, banking information and much more can be revealed and stolen.
Some phishing attempts are incredibly obvious, others are super elaborate. Like with most types of malware, cybercriminals have become extremely well-versed in phishing and anyone can fall for it. To help you recognize and avoid it, we’ll take you through a couple of phishing types and give you tips on what to do if faced with them.
This is actually the most common type of phishing. A cybercriminal creates an e-mail containing stuff like attractive offers, legitimate-looking attachments or links and makes it appear as though it’s coming from a trusted source.
For example, it looks like it’s coming from your bank or your favorite retailer. The logo looks legit and the structure of the e-mail seems familiar, so you might get tricked into clicking on whatever clickable content is in it.
Unfortunately this exposes your device to malware that hands your data off to the hacker, who can decide what to do with it further.
Like the above example, you could be approached with lucrative offers or links via text messages or social media messages. Typically, the messages seem relevant to the user as they will be made to look like they’re related to apps or services you’re using.
Voice phishing attacks are schemes that appear as though they’re coming from a credible number. Normally, you’ll get a call about something related to credit cards or taxes to get you into a state of worry, leading you to disclose personal information on the phone.
Spear phishing normally targets specific individuals within a company who are likely to have access to sensitive data. Spear phishers spend time collecting information they can use to reach out to the individual looking as trustworthy as possible. They’ll typically lead with something relevant, for example mentioning an upcoming company event, and make a seemingly legitimate request.
Whaling is a more elaborate form of spear phishing, which targets people in even stronger positions such as executives or high-value individuals. The ultimate goal is to get them to transfer financial or other sensitive information that can be used to compromise the entire business.
BEC, or Business e-mail compromise, is a specific spear phishing technique carried out via e-mail. While there are many ways this is done, most commonly you’ll see instances where the phisher poses as a CEO or similar executive, or as a lower-level employee in specific positions (e.g. sales managers or financial controllers).
In the first situation, the impersonator reaches out to employees requesting them to transfer certain files or pay invoices. In the second situation, the phisher takes control of the employee’s e-mail account and sends false instructions to other employees in order to obtain data and information from them.
There are many ways you can be aware and spot a phishing attempt. Here are some tips:
Those are some of the ways to identify and prevent phishing attacks. However, sometimes phishers disguise themselves a little too well or a misclick happens and there you go - you’ve been exposed to malware.
This won’t happen if you invest in powerful protection software from the get-go, though. A good antivirus program like Bitdefender will keep you safe from becoming a victim of phishing scams. In fact, it will protect you from malicious attacks overall.
Be it your household or your business you’re concerned about, there are a bunch of different packages and options available, providing different kinds of cybersecurity services. That’s the only way you can ever really be sure you aren’t at risk of a digital attack.
Have you ever been targeted by phishers and didn’t know that’s what it was until you read this article? Many can relate. Protect yourself before it’s too late!