Logo

Resize icons on desktop quickly in Windows 10

Resize icons on desktop in Windows 10 in a matter of seconds!

Hello everyone and welcome to today's quick tip. If you have ever been dissatisfied with icon size on your desktop and any of the default sizes like small, medium large, etc have not been appropriate know that there is a quick way to resize icons on your desktop in between sizes.

All that you have to do in order to use this built-in feature is:

Press and hold CTRL and scroll with the mouse. That's it! Find your appropriate size for icons and enjoy.

icons on desktop

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Jzip PUP Easy Removal Tutorial

jZip is a software utility published by Bandoo Media and is classified as a Potentially Unwanted Program. The software is an archive tool that used to compress and extract files in the rar, zip, and other formats. The program is typically bundled upon installation with other unwanted applications and is itself often installed in co-bundles. As of publication time, over 40 AntiViruses have flagged jZip as malicious or potentially unwanted.

It injects itself in Windows shell, providing quick access to the program by right-clicking on any file. jZip displays it's advertising in your browser, instead of the default search results, to better do this, it collects information about your browsing history and your current browsing session, so it can better target ads. This software, upon install, defines an auto-start registry key in your system, this allows the software to launch every time your computer is rebooted, no matter what Windows account you log in to, it also adds Windows Tasks, to allow it to launch by itself at random times, even when closed.

About Potentially Unwanted Applications

If you have ever downloaded software programs from the internet (shareware, freeware, etc,), odds are high you’ve unintentionally installed unwanted programs on your personal computer. Potentially Unwanted Programs (PUP), also referred to as Potentially Unwanted Applications (PUA), are applications that you never wanted in the first place and quite often come bundled with freeware software. Once installed, most of these applications can be hard to remove and become more of a nuisance rather than a necessity. The idea of PUP was actually coined to define this crapware as something other than malware. The primary reason for this is that most PUPs get into users’ computers not because they exploit security vulnerabilities, for instance, but because the users grant consent to install it – unwittingly in many instances. Nevertheless, there isn’t any doubt that PUPs are still bad news for PC users as they could be incredibly damaging to the computer in lots of ways.

What do PUPs do on your computer, precisely?

The unwanted programs after installation display a lot of annoying pop-up advertisements create fake alerts, and quite often it even pushes the end-user to buy the software. PUPs which come as browser add-ons and toolbars are widely identifiable. Not just they needlessly take up space on your computer screen, toolbars could also manipulate search results, monitor your browsing activities, decrease your internet browser’s overall performance, and slow your net connection to a crawl. They might seem innocent but PUPs tend to be spyware. The worst part of setting up a PUP is the spyware, adware, and keystroke loggers that might lurk inside. Even if the PUPs aren’t inherently malicious, these programs still do absolutely nothing good on your PC – they will take valuable system resources, slow down your computer or laptop, weaken your device’s security, and make your PC more susceptible to trojans.

Some tips on protecting yourself from unwanted software

• Read the EULA meticulously. Look for clauses that say that you have to accept advertisements and pop-ups or bundled programs from the company. • Typically, when setting up a program you will get two options, ‘Standard Installation (recommended)’ and ‘Custom Installation’. Don’t pick ‘Standard’ as unwanted programs will automatically be installed that way! • Have a solid anti-virus program such as Safebytes Anti-Malware that will protect your personal machine from PUPs. Once you install this software, the defense against viruses and PUPs is already switched on. • Avoid installing freeware software you will not utilize. Turn off or get rid of toolbars and internet browser extensions you don’t really need. • Only download programs from the original providers’ websites. Avoid download portals since they use their own download manager to bundle extra programs along with the initial download.

Can't Install Safebytes Anti-malware because of a Virus? Do This!

Malware may cause several kinds of damage to computers, networks, and data. Some malware types alter browser settings by including a proxy server or change the computer’s DNS configuration settings. In such cases, you will be unable to visit some or all of the websites, and therefore unable to download or install the required security software to clear out the infection. So what to do if malicious software keeps you from downloading or installing Safebytes Anti-Malware? Follow the instructions below to eliminate malware in alternate ways.

Make use of Safe Mode to fix the issue

In Safe Mode, you are able to modify Windows settings, un-install or install some software, and eliminate hard-to-delete viruses. In case the virus is set to load immediately when the computer starts, switching to this particular mode may well prevent it from doing so. In order to get into Safe Mode or Safe Mode with Networking, press the F8 key while the system is booting up or run MSConfig and find the “Safe Boot” options in the “Boot” tab. After you restart the PC into Safe Mode with Networking, you may download, install, and update the anti-malware program from there. After installation, run the malware scanner to remove most standard infections.

Download the security program using an alternate internet browser

Web-based viruses can be environment-specific, aiming for a particular web browser or attacking particular versions of the browser. The most effective solution to avoid this issue is to opt for an internet browser that is known for its security measures. Firefox contains built-in Phishing and Malware Protection to help keep you safe online.

Create a portable USB antivirus for eliminating viruses

Another solution is to save and run an anti-malware software tool completely from a USB drive. Adopt these measures to employ a USB drive to clean your corrupted system. 1) Download Safebytes Anti-Malware or MS Windows Defender Offline onto a clean computer. 2) Plug the Flash drive into the uninfected computer. 3) Double-click the exe file to open the installation wizard. 4) When asked, choose the location of the USB drive as the place in which you want to store the software files. Follow the activation instructions. 5) Now, plug the thumb drive into the corrupted PC. 6) Run the Safebytes Anti-malware directly from the pen drive by double-clicking the icon. 7) Run Full System Scan to detect and clean-up up all kinds of malware.

SafeBytes Anti-Malware Features

These days, anti-malware software can protect your laptop or computer from different kinds of internet threats. But how to select the right one among several malware protection application that is available in the market? Perhaps you might be aware, there are many anti-malware companies and tools for you to consider. Some of them are good, some are decent, while some will ruin your computer themselves! You must pick one that is dependable, practical, and has a good reputation for its malware source protection. On the list of recommended software programs is SafeBytes Anti-Malware. SafeBytes carries a superb track record of top-quality service, and customers seem to be happy with it. Safebytes is one of the well-established PC solutions companies, which offer this comprehensive anti-malware program. Once you’ve got installed this software program, SafeByte's state-of-the-art protection system will ensure that absolutely no viruses or malicious software can seep through your computer. SafeBytes anti-malware comes with a myriad of enhanced features which sets it aside from all others. Here are a few typical features found in this application: Active Protection: SafeBytes provides real-time active monitoring service and protection against all known computer viruses and malware. This software will constantly monitor your PC for any suspicious activity and updates itself continuously to keep current with the newest threats. Most effective AntiMalware Protection: By using a critically acclaimed malware engine, SafeBytes offers multilayered protection that is designed to catch and remove viruses and malware which are concealed deep in your computer system. Safe Browsing: SafeBytes gives an instant safety rating about the web pages you are about to check out, automatically blocking harmful sites and make sure that you’re certain of your safety while browsing the world wide web. Fast Multithreaded Scanning: Safebytes Anti-Malware, using its enhanced scanning engine, gives super-fast scanning which can promptly target any active internet threat. Minimal CPU Usage: SafeBytes is a lightweight tool. It consumes a really small amount of processing power as it works in the background which means you won’t observe any computer performance issues. 24/7 Customer Support: You will get 24/7 technical support to quickly resolve any issue with your security application.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove Jzip without the use of an automated tool, it may be possible to do so by removing the program from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. You will likely also want to reset your browser. To ensure the complete removal, manually check your hard drive and registry for all of the following and remove or reset the values accordingly. Please note that this is for advanced users only and may be difficult, with incorrect file removal causing additional PC errors. In addition, some malware is capable of replicating or preventing deletion. Doing this in Safe Mode is advised.

The following files, folders, and registry entries are created or modified by Jzip

Files: File APPDATAjziptoolbaruninstallIE.dat. File APPDATAMozillaExtensions1FD91A9C-410C-4090-BBCC-55D3450EF433. File COMMONDESKTOPEmoticons for your messenger!.url. File LOCALSETTINGSTempinstallhelper.dll. File LOCALSETTINGSTempnsb2.tmp.exe. File LOCALSETTINGSTempSetupDataMngr_jZip.exe. File PROGRAMFILESMozilla Firefoxextensions1FD91A9C-410C-4090-BBCC-55D3450EF433. File PROGRAMFILESMozilla FirefoxsearchpluginsjZipWebSearch.xml. Directory APPDATAjzipband. Directory APPDATAjziptoolbar. Directory APPDATAMozillaFirefoxProfilesENV(jZip_ff_profile)extensions1e48c56f-08cd-43aa-a6ef-c1ec891551ab. Directory APPDATAMozillaFirefoxProfilesENV(jZip_ff_profile)jziptoolbar. Directory PROGRAMFILESWindows jZip ToolbarDatamngr. Directory PROGRAMFILESWindows jZip ToolbarToolBar. Registry: Key in HKEY_CLASSES_ROOT named JzipIEHelper.DNSGuard.*, plus associated values. Key in HKEY_CLASSES_ROOT named JzipIEHelper.DNSGuard, plus associated values. Key 1e48c56f-08cd-43aa-a6ef-c1ec891551ab at HKEY_CLASSES_ROOTCLSID. Key 1e48c56f-08cd-43aa-a6ef-c1ec891551ab at HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects. Key 41C4AA37-1DDD-4345-B8DC-734E4B38414D at HKEY_CLASSES_ROOTCLSID. Key 41C4AA37-1DDD-4345-B8DC-734E4B38414D at HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects. Key 99D9640D-7DD9-4AB1-946C-AD779E1EABE0 at HKEY_CLASSES_ROOTTypeLib. Key jZipMediabarTb at HKEY_LOCAL_MACHINESOFTWARE. Key jziptoolbar at HKEY_CURRENT_USERSoftware. Value 1e48c56f-08cd-43aa-a6ef-c1ec891551ab at HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerToolbar. Value <$PROGRAMFILES>Windows jZip ToolbarToolBardtUser.exe at HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccessParametersFirewallPolicyStandardProfileAuthorizedApplicationsList. Value <$PROGRAMFILES>Windows jZip ToolbarToolBardtUser.exe at HKEY_LOCAL_MACHINESYSTEMControlSet002ServicesSharedAccessParametersFirewallPolicyStandardProfileAuthorizedApplicationsList. Value <$PROGRAMFILES>Windows jZip ToolbarToolBardtUser.exe at HKEY_LOCAL_MACHINESYSTEMControlSet003ServicesSharedAccessParametersFirewallPolicyStandardProfileAuthorizedApplicationsList. Value <$PROGRAMFILES>Windows jZip ToolbarToolBardtUser.exe at HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSharedAccessParametersFirewallPolicyStandardProfileAuthorizedApplicationsList. Remove <$PROGRAMFILES>WINDOW~4Datamngrdatamngr.dll <$PROGRAMFILES>WINDOW~4DatamngrIEBHO.dll from registry value AppInit_DLLs at HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindows.
Read More
How to place control panel in File explorer
Recent Windows updates have been slowly but surely moved a lot of control panel features into settings. This indicates that in the long term goal is probably to get rid of the control panel altogether. No matter how the setting app is easy to use and good there are still things in the control panel that we need and we will still need until they are all moved in the setting application. There are several ways to open and get to the control panel from run dialog to shortcut keys but one perhaps more convenient and easiest way is to just simply have in file explorer right beside hard drives double click away. In order to place the control panel icon inside file explorer, we will need the help of our old friend: the registry editor. As always playing with the registry editor can cause some instability and it is always a smart thing to back up it first before attempting any kind of edits.

Registry editor adding a key

To open registry editor press ⊞ WINDOWS + R to open the run dialog and inside type in REGEDIT followed by ENTER Once the registry editor is opened locate the following key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer Right-click on the NameSpace folder on the left navigation pane and then select New > Key Rename the key with {21EC2020-3AEA-1069-A2DD-08002B30309D} (This CLSID code will add access to the Category view of the Windows 10 Control Panel) or with {26EE0668-A00A-44D7-9371-BEB064C98683} (This CLSID code will add access to the large icons view of the Windows 10 Control Panel) Save and exit the registry editor Now when opened, file explorer will show a control panel icon for easy access.
Read More
Windows 10 tips and tricks for easy work
Hello everyone and welcome to our new Windows 10 tips and tricks article. Today we will be focusing on small Windows tricks that could prove very useful in everyday workflow and hopefully make your life easier by implementing them in your daily routine. I am very excited to share this with you all and I hope that you will use them from now on. That being said let us begin.

Tip 1: Minimize all open windows except one.

Daily to the daily routine can involve many opened windows on a desktop and sometimes things can get messy, if you want to minimize all windows to the taskbar except one do this: Click on one window thus selecting him, click and hold the left mouse button on that windows title bar, now shake it up and down and all other windows will escape down to taskbar leaving only one you are shaking on the desktop.

Tip 2: Open the Secret Windows menu.

Through our tutorials on various errors and fixes, we have used this method already but here it is again since it is worth mentioning. If you want to open the command prompt easy and fast, or device manager, event viewer, shut down, etc. In order to open this secret menu all you need to do is press ⊞ WINDOWS + X.

Tip 3: Create an Event without opening the calendar application.

You can easily create an event without opening a calendar application, all you have to do is left-click on the clock in the taskbar, click once on a date for the event, and under calendar in event field type event description. The event will show in the calendar application like it was entered there.

Tip 4: Taking a screenshot.

This one is my favorite and it speeds up workflow very very much. Typically you take screenshots by pressing the PrntScr button on your keyboard. Now, the problem with this approach is that the screen is placed in computer memory, in the clipboard and you will need another picture processing application in order to save it. Now if you would press ⊞ WINDOWS + PrntScr, the picture would be automatically saved in your pictures/screenshots folder. And if that is not enough, you can press ⊞ WINDOWS + S + SHIFT to start Snip & Sketch tool and select the area which you would like to screen capture, this method will also place pictures in the clipboard.

Tip 5: Open pinned applications in your taskbar with your keyboard.

We have covered this one in our Windows keyboard shortcuts tips and tricks here, but if you missed that article here is the tip again. By pressing ⊞ WINDOWS + number 1,2,3...0 you will start the application from your taskbar counted from left to right.

Tip 6: Check how much Hard drive space installed applications are taking.

Applications and temporary files grow over time and can slow the system and cause some other unpleasant experiences. Go to Settings > System > Storage, click on the Hard drive on which you have installed applications, and see how much each one is taking, you can remove it from this screen also freeing some space.

Tip 7: Remove ads from the START menu.

Windows has so-called suggestions in the START menu, no matter how Microsoft is calling them, let's face it, they are ads and in my opinion, they do not belong in my START menu. To turn them off, go to Settings > Personalization > Start. Toggle the setting called Show suggestions occasionally in Start to the off position.

Tip 8: Shut down background applications.

Some applications are running in the back and are taking system resources and can send telemetry information, if you want to turn them all off go to Settings > Privacy > Background apps. To stop all apps from running in the background, toggle Let apps run in the background to off. You can choose which apps to run in the background individually by going down the list on the same page.

Tip 9: Use Background scrolling.

Did you know that you can scroll on inactive windows? To do this, just hover over the inactive background window and roll your mouse when the content of the window should be scrolling even if it's not one you are working on. If by any chance this is not happening, go to Settings > Devices > Mouse, and toggle Scroll inactive windows when I hover over them to On.

Tip 10: Show file extensions in File Explorer.

By default extensions of files are hidden, so let's say that for example, you are in a folder with pictures, you have plenty of pictures there but you do not know are they JPG or JPEG for example, do not worry there is an easy fix to bring showing extensions back. Start File Explorer, click on view top menu item, click on options, Uncheck the box that says Hide extensions for known file types. Click Apply, and OK.

Tip 11: Use focus assist.

Set it up by going to Settings > System > Focus assist. Choose from three options: Off (get all notifications from your apps and contacts), Priority (see only selected notifications from a priority list that you customize, and send the rest to your action center), and Alarms only (hide all notifications, except for alarms). You can also choose to automatically turn this feature on during certain hours, or when you're playing a game.

Tip 12: Rotate your screen.

If you have multiple screens set up or you have the rotatable screen press and hold CTRL + ALT together, then use a directional arrow to flip the screen. The right and left arrows turn the screen 90 degrees, while the down arrow will flip it upside down. Use the up arrow to bring the screen back to its normal position.

Tip 13: Enable GOD mode.

Have you always felt limited with Windows settings? Don't be, Right-click on the desktop and select New > Folder. Re-name the new folder with this bit of code: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C} To enter the "God Mode" window, double-click the folder.

Tip 14: Use Virtual Desktops.

Click on Task View (the icon next to the search box). This will separate all your open windows and apps into icons. You can then drag any of them over to where it says "New desktop," which creates a new virtual desktop. Once you click out of Task View, you can toggle between virtual desktops by pressing the ⊞ WINDOWS + CTRL + right/left arrows. To remove the virtual desktops, just go back into task view and delete the individual virtual desktops, this will not close out the apps contained within that desktop, but rather just send them to the next lower desktop.

Tip 15: Customize the command prompt.

Yes, you can customize the command prompt, in order to do so, open it and right-click on its title bar, choose properties and go wild. Special badge if you make it look like commodore 64 BASIC.

Tip 16: Dictate, not type.

If you have speech recognition ON, pressing ⊞ WINDOWS + H will bring up a voice recorder, just speak and see how you can easily "write" emails, etc.

Tip 17: Use sandbox.

In Windows you have a sandbox option, which will open another Windows instance inside Windows, what do you need this? Well once the sandbox is closed everything in it is closed and if you catch the virus or other dangerous software, closing the sandbox will destroy it not affecting your actual Windows. Use it for safety testing and enjoy an easy life. Enable Windows Sandbox inside the Control Panel.

Tip 18: Use a hidden game bar.

Press the ⊞ WINDOWS + G, you can pull up the new-and-improved Game Bar. This lets you switch your Windows PC into gaming mode, which pools system resources to the game, turns off notifications, and lets you record and broadcast your gaming, along with added panels for controlling your audio, monitoring FPS, and tracking achievements. And that's it, Our 18 tips and trick to make your Windows 10 life easier, more productive, and overall more enjoyable. I certainly hope you have enjoyed reading this article same as I was writing it. Until next time if I do not see you, good afternoon, good evening, and good night.
Read More
New Snipping tool redesigned in Windows 11
Windows 11 Snipping toolThe latest update from Panos Panay on Twitter is including New and redesigned Snipping tool inside Windows 11. From the shared video, we can see that it includes modern Windows 11 UI redesign and it looks and feels like a part of Windows 11. More things that can be seen from the shared video is that it looks like the new snipping tool is a merged version of the old with snip & sketch. It is good to see that it is still possible to capture screen with easier way natively inside Windows 11 but some more functionality would be more welcome I guess. Users were asking for added functions for a long time like adding simple text for example but from shared video, no new features were presented so for some users 3rd party solutions will still be the way to go. The new and redesigned Snipping tool will roll out with the next update and we will see then about all new features inside it firsthand. Until then, take care.
Read More
Your computer is running low on resources
Signing in to a computer that runs a Windows 10 version OS is usually fast and straightforward. However, there are instances when signing in takes too long especially if there are a lot of programs in the Startup. So if many things are loading as soon as you log into your computer, it will slow down the sign-in process. Aside from programs in Startup, it is also possible that there are too many users that are logged in to the account. In such a case, you will most likely encounter an error that says, “Your computer is running low on resources, so no new users can sign in. Please use an account that has already been signed in”. If you’ve encountered such an error when you try to log into your computer, read on as this post will be guiding you on how you can fix it. Each time a user signs in to Windows 10, it will allocate resources in order to work smoothly. But, in many cases, the system is running low on resources which is why this error pops up and blocks a sign-in of a new user. To fix it, you can try to log out the existing users, or perform a Cold Boot, as well as run both the DISM tool and System File Checker scan.

Option 1 - Try to logout existing users

The first thing you can do is to log out the existing users. If you have a shared Windows 10 computer, you have to check if someone hasn’t logged out. It could be that some background task or there is an existing program that is still running under that account. So you have to make sure to ask the same user to log out in case there is some unsaved work. On the other hand, if that user is not around, then you reboot the computer right away.

Option 2 - Try Performing a Cold Boot

You could also try to perform a Cold Boot to fix the problem. A Cold Boot is a process that makes sure that the Windows 10 Kernel shuts down properly and releases all the resources held by any account. To perform a Cold Boot, just press and hold the physical power button on your CPU until it goes off. After that, boot your computer regularly and see if you can now log into your account without any error.

Option 3 - Try to run a System File Checker scan

System File Checker is a built-in command utility in Windows that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files to good system files that might be the cause why you’re getting the error when you log into your computer. To run the SFC command, follow the steps given below.
  • Boot your computer into the Advanced Recovery mode and from there open Command Prompt.
  • After opening Command Prompt, type in sfc /scannow
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.
 Now restart your computer and see if the problem is fixed or not.

Option 4 - run the dism tool

You might also want to run the DISM tool. This tool is known to repair potentially corrupted files in your system as having them could also system issues like the “Your computer is running low on resources, so no new users can sign in” error. To repair these corrupted system files, you can run the DISM commands:
  • Go to the Advanced Recovery mode and select Command Prompt.
  • After that, input each one of the commands listed below sequentially to execute them:
    • Dism /Online /Cleanup-Image /CheckHealth
    • Dism /Online /Cleanup-Image /ScanHealth
    • Dism /Online /Cleanup-Image /RestoreHealth
  • Once you’ve executed the commands given above, restart your computer and check if the problem is now fixed.
Read More
How to Rectify Error 0xC1900101, 0x20017 in Windows 10

Error Code 0xC1900101, 0x20017 – What is it?

Error code 0xC1900101, 0x20017 in Windows 10 occurs when Windows users attempt to upgrade to Windows 10 but fail to complete the installation process. This Windows error code may occur due to issues with a third-party antivirus program or problems related to a driver or hardware. When this occurs users will receive an error message and their machine will automatically revert to the original operating system on the device. Common symptoms of the error code include the following:

  • Error code 0xC1900101-0x20017 message box
  • Inability to complete Windows 10 upgrade

Solution

Restoro box imageError Causes

Like many other error codes affecting Windows 10 users, 0xC1900101-0x20017 may result due to several different reasons. Oftentimes, error code 0xC1900101 -0x20017 affects users who attempt to upgrade their operating system but have incompatible drivers or hardware as well as antivirus or other security systems which prevent the upgrade from occurring. If this error message is not resolved, it could give birth to other error messages such as error code 0x80070652

Further Information and Manual Repair

To fix this particular error code affecting Windows 10 devices, you will need to employ at least one manual repair method mentioned within this article. Manual repair methods offer effective solutions as they seek to address the root causes related to Windows error codes. When the manual repair methods are implemented correctly, users are usually able to quickly overcome issues that cause Windows error codes and can thereafter access all the benefits Windows has to offer to its users.

Note, however, that in a few cases where technical skills are required, the need for a Windows repair technician may present itself. In such a case, resort to Windows forums and other resources to access help from a certified Windows professional. Also, consider using an automated tool where necessary.

Method One: Temporarily Disable or Uninstall Third-party Security Software

Some third-party security programs or antivirus software may interfere with the installation process when Windows users attempt to upgrade to Windows 10. To verify if this is the issue causing error code 0xC1900101-0x20017 on your device, temporarily uninstall or disable these applications. You may easily do so by checking the settings of these programs or visiting Settings within the Windows Start Menu.

Once you have disabled these programs on your device, reboot your machine and attempt to update to Windows 10. If the issue was caused by a third-party app, error code 0xC1900101-0x20017 will no longer occur and your machine will successfully upgrade to the version of Windows 10 you attempt to download.

However, in the case where error code 0xC1900101-0x20017 in Windows 10 reoccurs during the installation process, you will need to resort to another manual repair method listed below.

Method Two: Disable Firewall Software

Like method one, this manual repair method can be effective in combating issues related to 0xC1900101-0x20017. This is of course, dependent on whether or not the error code is due to an incompatible security program.

Temporarily disable your firewall by adjusting its settings. Once this step is complete, reboot your machine and attempt to install the latest version of Windows 10. If you are able to complete the process, this means the problem was due to an issue with your firewall. You can then enable the firewall you previously disabled or download another program as its replacement.

If the error code reoccurs, however, consider implementing the next manual repair method on this list.

Method Three: Use Command Prompt to Check for Damaged System Files

Command Prompt can be very effective in helping regular as well as technically skilled users repair issues with their PC. In the case of error code 0xC1900101-0x20017 in Windows 10, access Command Prompt using the following instructions.

  • Step one: Right-click Start Menu
  • Step two: Select Command Prompt (Admin)
  • Step three: Type sfc /scannow

Be sure to enter the command as it is written above, with a space between “sfc” and “/scannow”. Wait until the scan is complete. If there are any errors related to system files, i.e. if any system files are damaged, corrupted, or missing, your machine will begin to fix it. Once the process is complete, reboot your PC then reattempt the Windows 10 upgrade process via Windows Update. If you are successful, it means that you have rectified error code 0xC1900101-0x20017. Otherwise, you may need to contact a Windows repair technician.

Method Four: Download an Automated Tool

If you wish to always have at your disposal a utility tool to fix these Windows 10 and other related issues when they do arise, download and install a powerful automated tool.

Read More
Check if your data has been stolen for free

Website breaches and stealing user data is nothing new in the world of the internet. Although a very unpleasant experience it still happens even on some high-quality websites. In this article, we will not focus on how can you not be the target of this kind of attack, because you really cannot. Weel you can kind of if you decide not to have your data on websites at all, but let's just say that is not something you are willing to do.

stolenSo, in this case, you have some social, forum, or gaming accounts but you heard that service has been breached and that your email or password might be stolen. Well in this case all you need to do is of course to login into the service and change your password. But, what happens if you are not aware at all that service has been compromised?

Mozilla foundation has asked themselves this same question it seems and they have decided to help us out. They have placed a free online service where you can just by typing in your email address find out if your email or data has been compromised in any way.

Go to https://monitor.firefox.com/ and check it out, if you find out that there is some website that you did not know was breached, change your password right away, and if you have used the same password for anything else (I hope not), change them as well.

Read More
Should you upgrade to Windows 11
Windows 11 has been rolling out for a while now so many PC users ask the question is it wise and good to upgrade your Operating System to the latest Microsoft incarnation. No Thank you for reading, cya tomorrow in next article. Windows 10 vs Windows 11Jokes aside, I truly believe that choosing to upgrade your System to Windows 11 at this point in time is a bad decision and I will explain why I do believe it.

Reasons to upgrade to the new OS

First of all, let me say what is good in Windows 11 and provide reasons why you should upgrade your computer.
  1. The new fancy look made for modern computers. New Windows new look, Microsoft has tried their best to bring a new modern look to its flagship operating system and I must say that they have managed it. I could argue that it is a little bit late since Apple had this kind of look in years but hey, better late than never I guess.
  2. Increased security This point is very valid but it will play a role only if you have all system requirements including TPM 2.0. If that is the case new security features of OS are really well done and are perhaps one thing that might nudge some people in installing W11 on their system.
  3. New settings app The New and redesigned settings app inside Windows 11 is really great and it provides a great workflow and easy management of system settings. This is not some radical change but it will save time and make life much easier.
  4. It is better suited to the newest hardware Windows 11 was made with the newest hardware in mind and its performances on it are great so if you are punching the latest tech this reason is sufficient to make a switch, however, if you are still on an older system you will not gain much by switching.

Reasons to avoid Windows 11 for now

  1. Almost just a visual update to Windows 10 Some features of Windows 11 are great but they are not plenty of them to justify a new number and new version of OS. Considering what we really got new under the hood Windows 11 could have been just a patch and update to Windows 10 since the architecture is the same.
  2. Bugs Each day there are new bugs reporting for Windows 11, most of them are at the moment unsolvable and are caused because hardware manufacturers' drivers and software overall is not W11 ready. This hinders the stability of some systems and introduces headaches to others.
  3. Runs poorly on unsupported hardware Strange behavior has been reported on some older systems, granted systems are not officially supported but the point is OS is simply not working at the top of its game on older hardware.
  4. No updates on non supported systems Officially stated if you install Windows 11 on non-supported hardware you will not get any security updated on in. This is a deal-breaker as far as I am concerned.
  5. It is still under development When Windows 11 was released, Android native apps were not working on it, it later came with an update, this is just one example but there are more features that were promised but are not delivered on release and constant updates are fixing these things. It is obvious that Windows 11 is still under active development and not the final product that was promised.
  6. Microsoft’s edge pushing And not just edge, some other things as well but most notably is edge pushing to borders they are risking lawsuit similar as they did in the past pushing and disabling any other browser except internet explorer.

Conclusion

Firstly I want to point that this is my personal opinion but going through facts and taking into account the current state of Windows 11, at this point, it is not worth making a switch. I am sure that in time it will become a system that will be worth upgrading to but until that time comes, my advice would be to stay with Windows 10.
Read More
Desk365 Complete Removal - PUP Removal Guide

What is Desk365?

Desk 365 is a program developed by 337 Technology Limited and is classified as a potentially unwanted application by a number of Antiviruses. While not technically malware, for many users it is unwanted as it is often distributed as a bundle with other downloads. It allows a fast way to access your shortcuts and applications. Upon installation this program will insert itself into the system registry, adding startup strings to allow it to automatically start every time your system is restarted. The software adds a scheduled windows task to allow it to reopen itself even when closed. The applications also access the internet and add firewall rules to your system, that allow it to access anything without restrictions.

The main executable file for this application is Dock365.exe. It is possible to delete this file preventing the application to run, but its monitoring services and registry entities remain hidden inside your computer.

The software sends browsing information back to its ad servers, displaying custom ads and sponsored products instead of the usual search results. And the app itself pins itself to the start menu and cannot be removed.

About Potentially Unwanted Applications

Have you ever discovered an unwanted program on your PC that you didn’t consciously download and never gave authorization to be installed? Potentially Unwanted Programs (PUP), also referred to as Potentially Unwanted Applications (PUA), are applications that you never wanted in the first place and often come bundled with freeware. Once installed, the majority of these applications can be difficult to eliminate and become much more of an annoyance rather than a necessity. PUPs did not actually constitute pure “malware” in the strict sense of the definition. What normally makes a PUP different from malicious software is that whenever you download one, you’re doing it with your consent – though in many instances unconsciously and unwillingly. A PUP may not be regarded as malicious or unsafe yet still, it’s a common cause of clunky OS’s; some PUPs are a lot more aggressive by intentionally slowing down your computer or laptop.

Exactly how do unwanted programs look like?

Potentially Unwanted Programs can be found in different forms and varieties, but in the majority of cases, these are typically adware programs that exhibit irritating pop-up adverts and advertisements on websites you check out. They even come in the form of browser extension toolbars and add-ons. Not only they needlessly take up space on your screen, but toolbars can also manipulate search engine results, keep an eye on your surfing activities, decrease your internet browser’s efficiency, and slow down your internet connection to a crawl. PUPs load up a dangerous bite if left unchecked. They could include keyloggers, dialers, and other program built into them which could track you or send your sensitive information to third parties. Typically, such software will disable security protections and configuration settings to take control over your computer or laptop, leaving that PC vulnerable to online hackers and data fraud. At a minimum, PUPs slow your computer down with every added program.

Tips on how to prevent PUPs

• Read the fine print so that the end-user license agreement (EULA) you are accepting is only for the software you primarily intend to download. • Choose the “custom” install whenever installing an application. Especially, look closely at those small boxes which have been checked as default, where you may ‘agree’ to receive promotions or install software bundlers. • Use an anti-PUP program. Security applications such as Safebytes Anti-Malware gives the very best real-time protection against PUPs and also other malware. • Be alert if you download and install freeware, open-source programs, or shareware. Nowadays ‘freeware’ isn’t actually freeware – but “crapware” bundling nonsense. • Always download software from trustworthy sources like official websites rather than untrustworthy sharing space. Avoid file-hosting sites where/when possible.

What To Do If You Cannot Download Safebytes Anti-Malware?

Every malware is detrimental and the level of the damage can vary greatly according to the type of infection. Some malware is designed to restrict or prevent things that you wish to do on your PC. It may well not permit you to download anything from the web or prevent you from accessing some or all internet sites, in particular the antivirus sites. If you are reading this, chances are you’re stuck with a virus infection that is preventing you to download or install Safebytes Anti-Malware software on your computer system. There are a few fixes you could try to get around with this particular problem. Download the software in Safe Mode with Networking The Windows-based PC comes with a special mode known as “Safe Mode” in which just the minimum required programs and services are loaded. If the malicious software is set to load immediately when PC boots, shifting into this mode may well prevent it from doing so. To get into Safe Mode or Safe Mode with Networking, press the F8 key while the system is starting up or run MSCONFIG and look for the “Safe Boot” options in the “Boot” tab. After you restart the PC into Safe Mode with Networking, you can download, install, and update the anti-malware program from there. At this point, you could run the anti-virus scan to eliminate viruses and malware without any hindrance from another malicious application.

Switch over to an alternate web browser

Some malware mainly targets specific internet browsers. If this sounds like your situation, use another internet browser as it might circumvent the malware. If you are not able to download the anti-virus software using Internet Explorer, it means the virus could be targeting IE’s vulnerabilities. Here, you need to switch to a different internet browser such as Chrome or Firefox to download Safebytes Anti-malware software.

Install and run anti-virus from your flash drive

Another option would be to create a portable anti-malware program on your USB stick. To run antivirus from a thumb drive, follow these simple steps: 1) Make use of another virus-free computer to download Safebytes Anti-Malware. 2) Plug in the pen drive to a USB port on the uninfected computer. 3) Double-click the Setup icon of the antivirus software package to run the Installation Wizard. 4) When asked, choose the location of the USB drive as the place in which you want to put the software files. Follow activation instructions. 5) Now, insert the USB drive into the infected PC. 6) Run the Safebytes Anti-malware directly from the flash drive by double-clicking the icon. 7) Run Full System Scan to detect and clean-up up all kinds of malware. If all the above approaches fail to help you in downloading the anti-malware, then you’ve no alternative but to reinstall the computer’s operating system to wipe out all the data, including the malicious programs which are obstructing the anti-malware installation. If you are already our customer, technical help for Malware Removal is just a phone call away. Call 1-844-377-4107 to speak to our expert technicians and get assistance remotely.

Let's Talk About SafeBytes Anti-Malware!

To help protect your computer from many different internet-based threats, it’s very important to install anti-malware software on your personal computer. But with so many antimalware companies out there, nowadays it’s tough to decide which one you should obtain for your PC. A few are good ones, some are decent, and some are merely fake anti-malware programs that will harm your PC themselves! You need to be very careful not to pick the wrong product, especially if you buy a paid program. On the list of the highly recommended tools by industry experts is SafeBytes Anti-Malware, well-known security software for Windows computers. Safebytes is among the well-established computer solutions firms, which offer this comprehensive anti-malware software program. Using its outstanding protection system, this utility will quickly detect and eliminate the majority of the security threats, including viruses, adware, browser hijackers, ransomware, PUPs, and trojans. SafeBytes anti-malware offers an array of advanced features which sets it apart from all others. Listed below are some of the highlighted features included in the tool. Real-time Threat Response: SafeBytes delivers complete and real-time security for your PC. It will inspect your computer for suspicious activity continuously and shields your personal computer from unauthorized access. Optimum AntiMalware Protection: This deep-cleaning anti-malware software goes much deeper than most antivirus tools to clean your computer. Its critically acclaimed virus engine finds and disables hard-to-remove malware that conceals deep within your computer. Web Filtering: SafeBytes gives an instant safety rating about the web pages you’re about to visit, automatically blocking harmful sites and ensuring that you are certain of your online safety while browsing the net. Light-weight: This software program is not “heavy” on your computer’s resources, so you will not notice any performance issues when SafeBytes is working in the background. 24/7 Online Support: You can obtain high levels of support round the clock if you’re using their paid version. Overall, SafeBytes Anti-Malware is a solid program since it has plenty of features and can identify and remove any potential threats. You can rest assured that your computer will be protected in real-time once you put this tool to use. For optimum protection and the best bang for your buck, you can’t get better than SafeBytes Anti-Malware.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove Desk365 without the use of an automated tool, it may be possible to do so by removing the program from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. You will likely also want to reset your browser. To ensure the complete removal, manually check your hard drive and registry for all of the following and remove or reset the values accordingly. Please note that this is for advanced users only and may be difficult, with incorrect file removal causing additional PC errors. In addition, some malware is capable of replicating or preventing deletion. Doing this in Safe Mode is advised. The following files, folders, and registry entries are created or modified by Desk365
Files: File $APPDATACheckRun22find.exe. File $APPDATADesk 365accelerate. File $APPDATADesk 365desk_bkg_list.xml. File $APPDATADesk 365desk_list.xml. File $APPDATADesk 365desk_settings.ini. File $APPDATADesk 365firstrun. File $APPDATADesk 365process_mgr.xml. File $APPDATADesk 365promote.xml. File $APPDATAeDownloadfindhpnt_v2.exe. File $APPDATAMicrosoftInternet ExplorerQuick Launchfind.lnk. File $COMMONPROGRAMSDesk 365Desk 365.lnk. File $COMMONPROGRAMSDesk 365eUninstall.lnk. File $DESKTOPfind.lnk. File $LOCALAPPDATAGoogleChromeUser DataDefaultExtensionsnewtab.crx. File $LOCALSETTINGSTempV9Zip_003Desk365.exe. File $PROGRAMFILESDesk 365desk_bkg_list.xml. File $PROGRAMFILESDesk 365desk_list.xml. File $PROGRAMFILESDesk 365desk_settings.ini. File $PROGRAMFILESDesk 365desk365.exe. File $PROGRAMFILESDesk 365deskSvc.exe. File $PROGRAMFILESDesk 365ebase.dll. File $PROGRAMFILESDesk 365edeskcmn.dll. File $PROGRAMFILESDesk 365eDhelper.exe. File $PROGRAMFILESDesk 365eDhelper64.exe. File $PROGRAMFILESDesk 365edis.dll. File $PROGRAMFILESDesk 365edis64.dll. File $PROGRAMFILESDesk 365ElexDbg.dll. File $PROGRAMFILESDesk 365eUninstall.exe. File $PROGRAMFILESDesk 365libpng.dll. File $PROGRAMFILESDesk 365main. File $PROGRAMFILESDesk 365ouilibnl.dll. File $PROGRAMFILESDesk 365process_mgr.xml. File $PROGRAMFILESDesk 365promote.xml. File $PROGRAMFILESDesk 365recent.xml. File $PROGRAMFILESDesk 365sqlite3.dll. File $PROGRAMFILESDesk 365svc.conf. File $PROGRAMFILESDesk 365TrayDownloader.exe. File $PROGRAMFILESDesk 365zlib1.dll. File $PROGRAMFILESMozilla Firefoxsearchpluginsfind.xml. File $SENDTODesk 365.lnk. Directory $APPDATADesk 365. Directory $APPDATAeDownload. Directory $COMMONPROGRAMFILES7. Directory $COMMONPROGRAMSDesk 365. Directory $LOCALSETTINGSTempDesk365. Directory $LOCALSETTINGSTempV9Zip_003. Directory $PROGRAMFILESDesk 365. Registry: Key 33BB0A4E-99AF-4226-BDF6-49120163DE86 at HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerSearchScopes. Key deskSvc at HKEY_LOCAL_MACHINESOFTWARE. Key desksvc at HKEY_LOCAL_MACHINESYSTEMControlSet001Services. Key desksvc at HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesEventlogApplication. Key desksvc at HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices. Key desksvc at HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventlogApplication. Key findSoftware at HKEY_LOCAL_MACHINESOFTWARE. Key ijblflkdjdopkpdgllkmlbgcffjbnfda at HKEY_LOCAL_MACHINESOFTWAREGoogleChromeExtensions. Key lnkguard at HKEY_CURRENT_USERSoftware. Key V9 at HKEY_LOCAL_MACHINESOFTWARE.
Read More
Nostalgic gaming with Retroid pocket 2
We have talked about gaming on old computers and have covered new and upcoming Steam deck handheld console. Today we are combining old gaming with a handheld console and our target of talk is Retroid pocket 2. This product is packed with really high-quality plastic and with some great features in it. retroid pocket 2So let's dive into this cool handheld in more detail and find out why we like it so much.

Good manufacturing quality

Plastic and overall manufacturing quality are really, really good. The battery is great, packing 4000mAh that can hold over 3 hours of nonstop gaming, and all buttons and joysticks are great. The screen is a 640 x 480 60Hz 3.5″ IPS screen (4:3 aspect ratio) that performs really great for its purpose, retro gaming. There is a Digital D-Pad and dual analog joysticks. The right joystick is the lower profile to avoid being accidentally moved when pressing the four gaming buttons. There are three buttons at the bottom which are Home, Start, and Select. On either side are good-quality stereo speakers. On the bottom of the device are a Micro SD Card slot and a 3.5mm headphone port. On the top of the device are Left and Right shoulder and trigger buttons. There are the power button and volume adjustments. There are a USB Type-C OTG port and a Micro HDMI output for connection to a TV.

Good technical statistics

Good, not great but then again since this is retro handheld you cannot really expect some crazy stuff like alder lake inside. So the console is punching ARM Cortex A7 CPU with 2 cores and a clock of 1.5GHz paired with ARM Mali 400-MP2 500MHz GPU. The console has 1GB LPDDR3 RAM memory and 8GB eMMC Storage where 5GB is freely available, the rest is taken for OS. As mentioned before the display is 640x480 resolution with a size of 3.5″. The battery is Lithium-Ion with a power of 4000mAh and on the handheld, there is a USB Type-C connector, 3.5mm headphone jack, and Micro-HDMI. It also has Wifi/Bluetooth 4.0

Retroid Pocket 2 OS and support

Pocket 2 comes with Android 6 but you can update its firmware to the 8.1 version on the official site that I would highly recommend. New versions of the handheld will come with 8.1 on it from the box. Having Android as OS opens many possibilities like you can download Android apps such as Steam Link, allowing you to play actual PC games on your Retroid Pocket 2. Not just that, if it does get a newer version of Android it could even have the ability to use xCloud, Xbox’s cloud gaming service. Of course, hardware will not be able to handle modern games but the option is still there and for some old PC titles available on steam like Commander Keen, for example, this is a great option. The console can emulate basically everything up to Dreamcast, including N64, PSP, and Playstation 1. It can emulate Nintendo DS also, but it can only do so with one screen. The only problem with this console is you will need to install and update Apps. You’ll need to learn about RetroArch, an app that lets you download emulators or cores to play games.

Retroid price

The last thing on the list is the price of the console itself. Going just under the 100$ mark this really makes it an affordable option for plenty of people that would like to experience retro handheld gaming or for ones like me, nostalgic gamers wanting to relive some era of playing games on the road.

Conclusion

Among Chinese handheld devices for retro gaming, Retroid Pocket 2 is really on top of what the market can offer. If you are looking for a great handheld retro console and are not afraid of little dive-ins into the OS and various configurations, Pocket 2 will reward you with plenty and wide emulation support.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status