Logo

Setting up USB tethering in Windows

In this post, you will be guided on how you can set up the USB tethering feature on your Windows 10 computer and share your mobile device’s mobile data so other devices can also access the internet. Tethering is usually known as Wi-Fi tethering which allows users to share mobile data to any device with Wi-Fi, laptops included. This is really useful especially when you have no other way to access the internet. For instance, if you are using a desktop computer and there is no way for you to connect to the Ethernet, and you have no Wi-Fi adapter that you can use to connect to a router as well, you can use USB tethering instead to access the internet. It is almost similar to Wi-Fi tethering except that it works over a USB connection instead of a Wi-Fi adapter.

USB tethering is almost quite the same as an Ethernet connection except that it’s faster compared to Wi-Fi tethering as well as Bluetooth tethering. Just like Wi-Fi tethering, USB tethering is free unless your network carrier has blocked it. Thus, it’s better if you make that clear with your operator. Once you have that covered,

Follow the instructions provided below to set up USB tethering on your Windows 10 computer.

Step 1: First, connect your mobile device to your Windows 10 computer using a USB cable.

Step 2: If it asks you to enable the file transfer feature, just cancel it. A prompt that says, “Tethering or Hotspot active—Tap to setup” should be available as soon as you get connected – tap on it.

Note: If there is no prompt, just go to Settings > Network and Internet > Hotspot and Tethering and from there, toggle on the USB tethering option.

Step 3: Afterwards, the setup will create a new network adapter in Windows 10 automatically and your computer should now be connected to the internet using USB tethering.

Note: You have to make sure that the Wi-Fi connection in your mobile device is turned off and if it is connected to an existing network, the USB tethering will be disabled but if you see its status as enabled, then the USB tethering setup is successfully done. In addition, keep in mind that the location of tethering can be different for every phone, especially on a customized operating system such as RealMe, Redmi, Samsung, and any other mobile device although they are clubbed in the section of Mobile and Data Network.

In case you encounter some problems when using USB tethering in your Windows 10 computer, there are troubleshooting tips you should follow. The NDIS-based Internet Sharing Device network adapter is what Windows 10 uses to make USB tethering possible so if it stops working, follow the options provided below.

Option 1 – Perform basic check

The first thing you can do if you encounter problems in USB tethering is to do a basic check like checking if Wi-Fi is enabled automatically as well as check if the USB cable is disconnected or if you’ve turned off USB tethering accidentally.

Option 2 – Try installing or updating the USB RNDIS adapter

RNDIS or Remote Network Driver Interface Specification can also help you resolve any USB tethering problem. If the pre-installed driver does not help you in connecting to the internet, then you can try installing the USB RNDIS driver that is, if it’s not installed yet. If it is already installed, you can try to update it instead.

  • Tap the Win + R keys to open Run and type “devmgmt.msc” in the field and hit Enter to open the Device Manager.
  • Next, expand the Network adapters section and look for the Remote NDIS based Internet Sharing Device. But if you are using a Samsung smartphone, you might see “Samsung” instead of under Network adapters.
  • Right-click on it and then select the “Update driver” option.
  • Then select the “Browse my computer for driver software” option.
  • After that, select the “Let me pick from a list of available drivers on my computer” option.
  • Now uncheck the checkbox for “Show compatible hardware”.
  • From the given list on your left-hand side, look for Microsoft and then select the Remote NDIS based Internet Sharing Device on your right-hand side.
  • Click on Next. A new popup will appear where you have to click on Yes. This will install the driver.
  • Now click on the Close button and restart your computer.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Override default Regional settings in Windows
As you probably know, Windows 10 does not offer lots of choices for its Regional settings depending on where you are and what locale you work with or belong to. The standard region settings for Windows 10 allow users to select one set of formats for the calendar and more. However, this has somewhat changed in the Windows 10 v1809. If you don’t want such a change, you can just override the default regional format settings in the Windows 10 Improved local experience. So in this post, you will be guided on how you can do such a thing. Follow the given instructions below to override the default Regional Format settings in Windows 10. Step 1: Go to Settings > Time and Language > Region. Step 2: From there, the default region is what Windows and apps might use to provide you with local content. However, this won’t be much of use if you work for a different locale and need to have different format settings like Calendar, Dates, Times, Currency, and First day of the week, all of which you can modify under the Regional format. Step 3: You need not reboot your Windows 10 computer after changing. On the other hand, some of the apps will have to close and launch again in order to apply the new format. Thus, if you need to use apps that are of different locales, you will only see the changes after you re-launch the app. Note: You can also select a different language that makes more sense to you. In other words, if you prefer more common words to standard words for your Windows 10 computer, then this is definitely the way to do it. This local format will be used for messages, menus, navigation, settings, and other topics. Step 4: Look for a link that says “Add a Windows display language with local experience packs” under Languages. In case you don’t know, Local Experience Packs are Microsoft Store apps that deliver Windows display language quality improvements. So once you click the link, it will download the packs from the Microsoft Store. In addition, Windows has already begun using AI or Artificial Intelligence as well as neural network-based Machine Learning for Windows localization. And as the number increase, the Machine language improvements and feedback from users will help in making the translations a lot better and make them available to even more languages. All in all, it’s pretty much an interesting and a good move for Microsoft as the demands for topics and machines to be available in local languages have been increasing for the past couple of years.
Read More
Guide for Removing SMSFromBrowser Malware

What is SMSFromBrowser

SMSFromBrowser is a Browser Extension developed by MindSpark. This extension usually comes bundled up with other software or via online advertising. Allegedly this extension allows you to send SMS messages from your computer, however, all it does is point you to other websites that offer this service. While active this extension monitors your browsing behavior, it records your website visits, clicks, links, and sometimes even private information, in order to use this data to better serve additional ads. During your browsing sessions, you may encounter additional unwanted ads, sponsored links, and sometimes even pop-up ads. Several anti-virus scanners have detected this extension as a potentially unwanted extension / Browser Hijacker, and due to its privacy mining behavior, it is not recommended to keep it on your computer.

Browser hijackers (sometimes referred to as hijackware) are a kind of malicious software that modifies web browser settings without the computer owner’s knowledge or permission. These hijacks appear to be increasing at an astonishing rate around the world, and they could be actually nefarious and sometimes harmful too. Browser hijackers are capable of doing more than just modifying homepages. These are typically used to force hits to a specific site, manipulating web traffic to generate ad revenue. Though it might seem naive, these tools are made by vicious people who always try to take advantage of you, so that they can easily make money from your naive and distraction. As soon as the program attacks your laptop or computer, it starts to mess things up a whole lot that slows your system down to a crawl. In the worst-case scenario, you will be forced to deal with serious malware threats as well.

Indications of browser hijack

There are many signs of web browser hijacking: 1. home page is changed 2. your browser is constantly being redirected to porn sites 3. the default online search engine and the default browser settings are altered 4. discover new toolbars that you simply didn’t add 5. you notice numerous ads pop up on the browsers or computer screen 6. your browser gets sluggish, buggy crashes very often 7. you can’t go to specific sites such as homepages of anti-malware software.

How it infects your personal computer

A browser hijacker can be installed on your computer or laptop when you visit an infected site, click on an e-mail attachment, or download something from a file-sharing website. They can be included with toolbars, BHO, add-ons, plug-ins, or browser extensions. Some internet browser hijackers spread in user’s PC by using a deceptive software distribution technique known as “bundling” (often through freeware and shareware). A good example of a notorious browser hijacker is the most recent Chinese malware known as “Fireball”, which has attacked 250 million PCs worldwide. It acts as a hijacker but could be turned into a fully functioning malware downloader afterward. Browser hijackers could interrupt the user’s web surfing experience greatly, keep track of the websites visited by users and steal financial information, cause difficulty in connecting to the web, and eventually create stability problems, making applications and computers freeze.

Removal

Some types of browser hijackers can be effortlessly removed from your PC by deleting malicious applications or any other recently added freeware. Many times, it could be a tough job to discover and get rid of the malicious program because the associated file will be running as part of the operating system process. And there’s no denying the very fact that manual repairs and removal methods can be a difficult job for an amateur computer user. Also, there are several risks associated with fiddling around with the pc registry files. Browser hijackers could be effectively removed by installing and running an anti-malware application on the affected computer. To remove any browser hijacker from your PC, you can download the following professional malware removal program – Safebytes Anti-Malware. And utilize a system optimizer, such as Safebytes Anti-Malware, to erase all associated files in the registry and repair browser problems. All malware is detrimental and the degree of the damage may vary greatly according to the type of infection. Certain malware types alter web browser settings by adding a proxy server or modify the computer’s DNS configuration settings. In such cases, you will be unable to visit some or all internet sites, and thus unable to download or install the required security software to eliminate the infection. If you’re reading this article, odds are you’re stuck with a virus infection that is preventing you to download or install the Safebytes Anti-Malware program on your system. Follow the instructions below to get rid of the malware by alternative methods.

Install the anti-virus in Safe Mode

If the malware is set to run automatically when Microsoft Windows starts, entering Safe Mode could very well block the attempt. Just bare minimum required programs and services are loaded whenever you boot your PC into Safe Mode. To start your Windows XP, Vista, or 7 PCs in Safe Mode with Networking, follow the instructions below. 1) Tap the F8 key continuously as soon as your PC boots, however, before the large Windows logo shows up. This would invoke the “Advanced Boot Options” menu. 2) Use the arrow keys to choose Safe Mode with Networking and press ENTER. 3) Once this mode loads, you should have an internet connection. Now, get the malware removal application you need by using the web browser. To install the program, follow the guidelines in the installation wizard. 4) Right after the software is installed, let the diagnostic scan run to eliminate trojans and other malware automatically. Use an alternate internet browser to download an antivirus application Some malware only targets specific web browsers. If this sounds like your situation, employ another browser as it might circumvent the virus. The best way to avoid this problem is to opt for an internet browser that is known for its security measures. Firefox has built-in Phishing and Malware Protection to help keep you secure online.

Create a bootable USB anti-virus drive

Another option is to store and run an antivirus software program completely from a Flash drive. To run anti-malware from a flash drive, follow these simple steps: 1) On a virus-free PC, download and install Safebytes Anti-Malware. 2) Insert the pen drive on the same PC. 3) Run the setup program by double-clicking the executable file of the downloaded software, which has a .exe file extension. 4) Choose the USB flash drive as the destination for saving the software file. Follow the directions to complete the installation process. 5) Now, transfer the thumb drive to the infected computer system. 6) Double click the Safebytes Anti-malware icon on the pen drive to run the application. 7) Press the “Scan” button to run a full computer scan and remove malware automatically.

Benefits and Features of SafeBytes Anti-Malware

These days, an anti-malware tool can protect your computer or laptop from various types of internet threats. But wait, how to select the best one amongst plenty of malware protection applications that are available on the market? You may be aware, there are several anti-malware companies and products for you to consider. Some of them are good, some are ok types, and some will ruin your PC themselves! You need to be very careful not to select the wrong application, particularly if you purchase a premium application. When it comes to commercial antimalware tool options, many people opt for well-known brands, like SafeBytes, and they are quite happy with it. SafeBytes can be described as a powerful, real-time anti-malware application that is created to assist the average computer end user in safeguarding their computer from malicious internet threats. Through its cutting-edge technology, this software will help you protect your PC against infections caused by various kinds of malware and other threats, including spyware, adware, computer viruses, worms, trojan horses, keyloggers, ransomware, and potentially unwanted program (PUPs).

SafeBytes has excellent features when compared to various other anti-malware programs. A few of them are given as below:

Real-time Active Protection: SafeBytes gives you round-the-clock protection for your personal computer limiting malware attacks instantly. They are extremely effective in screening and removing various threats because they’re continuously revised with new updates and alerts. Robust, Anti-malware Protection: Safebytes is made on the best virus engine within the industry. These engines will detect and get rid of threats even during the early stages of a malware outbreak. Internet Security: SafeBytes inspects the hyperlinks present on a webpage for possible threats and informs you if the website is safe to visit or not, through its unique safety rating system. Low CPU Usage: SafeBytes is a lightweight and user-friendly anti-virus and anti-malware solution. Since it uses minimum computer resources, this application leaves the computer power exactly where it belongs to: with you actually. 24/7 Online Tech Support: You may get absolutely free 24/7 technical support from their computer experts on any product queries or computer security concerns. SafeBytes will keep your personal computer safe from the latest malware threats automatically with almost no input needed from you again. Once you have downloaded and installed this software, you will no longer have to bother about malware or any other security concerns. You will get the best all-around protection for the money you pay on SafeBytes anti-malware subscription, there isn’t any doubt about it.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove SMSFromBrowser without the use of an automated tool, it may be possible to do so by removing the program from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. You will likely also want to reset your browser. To ensure the complete removal, manually check your hard drive and registry for all of the following and remove or reset the values accordingly. Please note that this is for advanced users only and may be difficult, with incorrect file removal causing additional PC errors. In addition, some malware is capable of replicating or preventing deletion. Doing this in Safe Mode is advised. The following files, folders, and registry entries are created or modified by SMSFromBrowser
Files: %ALLUSERSPROFILE%MicrosoftWindowsStart MenuProgramsSMSfromBrowser %ALLUSERSPROFILE%Start MenuProgramsSMSfromBrowser %LOCALAPPDATA%SMSfromBrowserTooltab %UserProfile%Local SettingsApplication DataSMSfromBrowserTooltab Registry: HKEY_CURRENT_USERSoftwareWow6432NodeMicrosoftWindowsCurrentVersionexplorerBrowser Helper ObjectsFFE35078-94B2-4FC0-990D-BF8289BC25E4 HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionexplorerBrowser Helper ObjectsFFE35078-94B2-4FC0-990D-BF8289BC25E4 HKEY_CURRENT_USERSoftwareWow6432NodeMicrosoftWindowsCurrentVersionexplorerBrowser Helper Objects3188EEFD-9259-445D-8CCD-B99D6296AD1A HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExtStats3188EEFD-9259-445D-8CCD-B99D6296AD1A HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExtSettingsFFE35078-94B2-4FC0-990D-BF8289BC25E4 HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExtSettingsB1D7EA4A-79CA-454E-897F-F5A052E467F6 HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExtSettings3188EEFD-9259-445D-8CCD-B99D6296AD1A HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerApproved Extensions, value: 3188EEFD-9259-445D-8CCD-B99D6296AD1A HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerApproved Extensions, value: B1D7EA4A-79CA-454E-897F-F5A052E467F6 HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerApproved Extensions, value: FFE35078-94B2-4FC0-990D-BF8289BC25E4 HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerToolbar, value: B1D7EA4A-79CA-454E-897F-F5A052E467F6 HKEY_CURRENT_USERSoftwareWow6432NodeMicrosoftTracingSMSfromBrowser_RASMANCS HKEY_CURRENT_USERSoftwareMicrosoftTracingSMSfromBrowser_RASMANCS HKEY_CURRENT_USERSoftwareWow6432NodeMicrosoftTracingSMSfromBrowser_RASAPI32 HKEY_CURRENT_USERSoftwareMicrosoftTracingSMSfromBrowser_RASAPI32 HKEY_CURRENT_USERSoftwareAppDataLowHKEY_CURRENT_USERSoftwareSMSfromBrowser_f7 HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerDOMStoragesmsfrombrowser.dl.myway.com HKEY_CURRENT_USERSoftwareSMSfromBrowser HKEY_LOCAL_MACHINEHKEY_CURRENT_USERSoftware[APPLICATION]MicrosoftWindowsCurrentVersionUninstall..Uninstaller
Read More
Fix Your system requires SMB2 or higher Error
SMB which stands for “Server Message Block”, is a protocol used for file sharing. It provides the Read and Writes operating on network devices. Thus, it is why it is widely used when accessing a server-based in Linux. Its latest version is the SMB2 which follows after SMB1. The SMB2 contains more fixes to vulnerabilities that were found in SMB1. The predecessor was vulnerable since it served as a gateway to various modern ransomware which is why Microsoft disabled it by default starting with Windows 10 v1709. When you try to share a file, you will get the following error message:
“Microsoft Windows Network: You can’t connect to the file share because it is not secure. This share requires the obsolete SMB1 protocol, which is unsafe and could expose your system to attack. Your system requires SMB2 or higher.”
In this post, you will be guided on how to check if the SMB2.0 version can be installed on your Windows 10 computer. To get started, follow the steps below. Step 1: Tap the Win + X keys to open the Device Manager. Step 2: After that, click on the Windows PowerShell (Admin) option. Step 3: In the Windows PowerShell window, type the following command and hit Enter:
Get-SmbServerConfiguration | Select EnableSMB2Protocol
Note: After entering the command, you will see the following content on your screen which means that your Windows 10 computer is now capable of running the SMB2 protocol Now all that’s left for you to do is to enable the SMB 2 protocol on your Windows computer by enabling the SMB 1 protocol first and then upgrading it to SMB 2 afterward. Refer to the steps below for more details. Step 1: Tap the Win + I keys to open the Settings app. Step 2: Then type in “control panel” in the search area and click on Control Panel from the search results. Step 3: After opening Control Panel, click on Programs. From there, select the “Turn Windows features on or off” option under the larger menu of Programs and Features. Step 4: After that, Windows Features will appear on your screen. And from there, make sure that you select SMB 1.0/CIFS File Sharing Support and then click on OK. Step 5: Now let it install all the required files and then restart your computer to apply the changes made successfully. After your computer has restarted, the SMB 2 protocol should now be supported on your Windows 10 computer. Note: On the other hand, you can also enter the following command in the Windows PowerShell window. Just make sure you have admin rights to enable it.
Set-SmbServerConfiguration –EnableSMB2Protocol $true
Read More
Where can you get computer viruses & malware
From their infant stages to modern days, computer viruses were always kind of here. From simple ones that were annoying with playing speaker sounds and throwing messages on screen to more malicious ones capable of deleting and encrypting files. In today's modern world it is very important to protect yourself, modern viruses are not a joke anymore and they are aimed to create serious damage to computer systems. Where can you get computer viruses & malwareThey can encrypt files in order to make you pay for a decrypter, they can straight up delete files or even cause some hardware damage. Like mentioned before protecting yourself is important, but protecting does not mean only having antivirus software installed, information, where are common places in which they lurk and could be picked up, is also very important. That is why we are exploring in this article the most common place where you can pick viruses or other malware.

Downloading Programs

Programs that contain the downloadable files are the commonest source of malware such as freeware, worms, and other executable files. Whether you download an image editing software, a music file, or an e-book, it is important to ensure the reliability of the source of the media. Unknown, new, or less popular sources should be avoided.

Pirated or Cracked Software

Are you aware of software cracking? Well, every time you open cracked software, your antivirus software might flag it as malware as the cracks consist of malicious scripts. Always say “No” to cracks as they can inject malicious script into your PC.

Email Attachments

Anyone can send you an email attachment whether you know them or not. Clicking on unknown links or attachments can harm your device. Think twice before clicking anything and make sure that file type is not ‘.exe’.

Internet

One of the easiest ways to get a virus on your device is through the Internet. Make sure to check the URL before accessing any website. For a secured URL always look for ‘HTTPS in it. For example, when you click videos published on social media websites, they may require you to install a particular type of plug-in to watch that video. But in reality, these plug-ins might be malicious software that can steal your sensitive information.

Booting Data from Unknown CDs

Malicious software can get into your device through an unknown CD. A good practice to be safe from malicious infection is to remove CD when your device is not working at all. Your system could reboot the CD if it is not removed before switching off the computer.

Bluetooth

Bluetooth transfers can also infect your system, so it is crucial to know what type of media file is being sent to your computer whenever a transfer takes place. An effective armor would be to allow Bluetooth connectivity with only known devices and activate it only when required.

Unpatched Software

Often overlooked, unpatched software is also a leading source of virus infection. Security holes in software are exploited by attackers and are unknown to software makers until the attackers release them in the form of zero-day attacks. It is therefore recommended to install software updates as soon as they are available on your PC.
Read More
A Quick Guide to Fixing Error 0x80010108

What is Error 0x80010108?

Error 0x80010108 is a Windows Live Photo Gallery error. This error prevents the Windows PC user from viewing photos. The error code is often displayed in the following format:
‘An error is preventing the photo or video from being displayed’ Error code 0x80010108

Solution

Restoro box imageError Causes

The error 0x80010108 occurs due to multiple reasons including:
  • The issue in Windows Live Essential Settings
This error occurs while using Windows Photo Gallery but it is actually related to the Windows Live Photo Viewer within the Windows Live Essentials software.
  • Viral Infection
  • Registry Issues
To view the photos on your Windows PC, it is advisable to fix the problem right away. Furthermore, you should also not delay in fixing this problem especially if the underlying causes are related to the registry or viral infection. These can pose serious system and security threats including system failure, crash and data breaches.

Further Information and Manual Repair

To resolve this error on your system, you don’t always have to hire a technical expert or be a technical whiz yourself. Here are some easy and effective methods to resolve error 0x80010108 on your PC immediately:

Method #1

To repair Windows Live Essential Software Settings, go to the start menu and then click the control panel. Now in the control panel go the option Programs. In the programs click the tab programs and features and then select Windows Live Essentials and click repair tab. Once the settings are repaired, restart your PC to activate changes.

Method #2

Go to the start menu and type regedit.exe and then press enter. Type the following key: HKEY_CLASSES_ROOT WindowsLive.PhotoGallery.bmp.15.4 shell open DropTarget then right-click DropTarget and then Rename. Prefix a hyphen so that it becomes “-DropTarget”. Now type the following for each GIF/ICO/JPG/PNG/TIF file types: HKEY_CLASSES_ROOTWindowsLive.PhotoGallery.gif.15.4 shellopen DropTarget HKEY_CLASSES_ROOT WindowsLive.PhotoGallery.ico.15.4 shell open DropTarget HKEY_CLASSES_ROOT WindowsLive.PhotoGallery.jpg.15.4 shell open DropTarget HKEY_CLASSES_ROOT WindowsLive.PhotoGallery.png.15.4 shell open DropTarget HKEY_CLASSES_ROOT WindowsLive.PhotoGallery.tif.15.4 shell open DropTarget

Method #3

Download Restoro on your PC to scan for both registry issues and malware. Restoro is a multi-functional PC Fixer embedded with utilities like a powerful registry cleaner, an antivirus, and a system optimizer to name a few. The registry cleaner scans and detects all registry-related issues. It removes all unnecessary files damaging the registry and corrupting the registry settings. Simultaneously, the antivirus removes all kinds of malicious software affecting your PC including spyware, viruses, and Trojans. The system optimizer feature ensures that your PC works at the optimal level and does not slow down during and after the cleaning process. Restoro is efficient and safe. It has a user-friendly interface and simple navigations which makes it quite easy to operate. It can be downloaded on all Windows versions including. Click here to download Restoro to resolve error 0x80010108.
Read More
How to always run the app in admin mode in W11
Each time you open an application inside your Windows 11 operating system, it is opened with standard privileges. Now, please note that your account privileges and application privileges are two different things, you might be the administrator of the system but when you open the app, it still opens with standard privilege. admin privilegesMost of the time running applications with typical settings is fine but from time to time we might have some applications that will require running with administrator privilege in order to work properly. In this case, it is very easy to do it, you just right-click and choose run as administrator. Although a very easy solution, it can be quite annoying if running the app is on a daily basis or even more times per day. If this is the case then right-clicking and choosing to run as administrator can be a daunting task, sometimes you can even forget to run it like this in heat of work and some unforeseen consequences might occur. Luckily there is an easy hack so you can open the chosen application each time as an administrator with a simple double click each time.

Setting application to run as administrator always

  1. Locate application executable file
  2. Right-click on in and choose properties
  3. Click on the Compatibility tab
  4. Check the box next to Run this Program as an Administrator
  5. Click on Apply
  6. Click on OK
From now on each time you open an application normally with a double click, it will be opened as administrator privileges.
Read More
Change Legacy to UEFI without reinstalling
There are some new generation motherboards for laptops and PCs that bring in support for both the Unified Extensible Firmware Interface or UEFI as well as the Basic Input Output System or BIOS. The main advantage of UEFI over the traditional BIOS is the fact that UEFI supports a hard drive that has a capacity of more than 2 terabytes. However, the disadvantage of UEFI is that it only supports the x64 Windows operating system versions and that the hard drive is supposed to use the GPT structure. So if your PC is compatible with and supports UEFI and you want to change from Legacy to UEFI, then you’ve come to the right place as this post will guide you on how you can exactly do that without having to reinstall it. There are two ways to change Legacy to UEFI. You can convert MBR to GPT using either the built-in utilities in Windows or using the Recovery Environment. Before you proceed, make sure that your computer fulfills the following prerequisites:
  • Your PC’s motherboard should support both Legacy and UEFI.
  • Your PC should be running at least the 1703 Windows 10 version or newer on an MBR partition.
Once you’ve made sure that your computer covers the aforementioned prerequisites, refer to the given options below.

Option 1 – Convert MBR to GPT via Windows built-in utilities

  • In the Windows Search box, type “command prompt” and from the search results that appear, right-click on Command Prompt and select the “Run as administrator” option.
  • After that, execute this command: exe /convert /allowfullOS
  • Now, wait until the process is completed since you can track its process on your screen.
  • Once it’s done, go to Settings > Update & Security > Advanced Startup options and from there, click on Restart Now. This will restart your computer and give you advanced options.
  • Next, select Troubleshoot > Advanced Options where you will see further options including System Restore, Startup Repair, Go back to the previous version, Command Prompt, System Image Recovery, and UEFI Firmware Settings.
  • Now select the UEFI Firmware Settings. This will take you to the BIOS. Boot Mode is typically available under Boot > Boot Configuration. Once you’re there, set it to UEFI and then save the changes you’ve made. After that, your computer will restart.

Option 2 – Convert MBR to GPT via the Recovery Environment

  • When the message appears on your screen while running Windows Setup, you need to tap the Shift + F10 keys to open Command Prompt.
  • Make sure to run Command Prompt as admin and then execute this command: exe /convert
  • After that, wait until the process is completed. When it’s done, you have to go to the BIOS just like in the first given option above.
  • As mentioned, you can usually find the Boot Mode under Boot > Boot Configuration. Once you’re there, set it to UEFI.
  • Now save the changes made and exit as your computer will restart.
Read More
How to Fix Explorer.exe System call failed
One of the most critical processes in the Windows 10 operating system is the Explorer.exe. And there are times when you might encounter an error that says, “System call failed”. You can encounter this error when you try to launch File Explorer, and in such case when the File Explorer does not work, it could cause issues in accessing folders and files on your computer. This kind of error pops up when the explorer.exe system file has become corrupted or if there is some process that interferes with its smooth functioning. To fix this error, you can try to restart the explorer.exe process, run both the System File Checker scan and DISM tool. You could also put your computer in a Clean Boot State or uninstall any programs you’ve installed recently. For more details, follow each one of the given suggestions below.

Option 1 – Try to restart the Explorer.exe process

The first thing you can do is try to restart the Explorer.exe process. To do so, refer to these steps:
  • First, right-click on the Taskbar and select the Task Manager.
  • Next, expand the Task Manager window to see all the active processes.
  • From there, look for the Windows Explorer process, right-click on it and select Restart.
  • After that, check if the error is now fixed.

Option 2 – Run System File Checker scan

If restarting the explorer.exe process didn’t work, you can also try running the System File Checker or SFC scan to fix the error. System File Checker is a command utility built into your computer that helps restore corrupted files and missing files. Refer to the following steps to run it:
  • Hit the Win + R keys to launch Run.
  • Type in cmd in the field and tap Enter.
  • After opening Command Prompt, type in this command: sfc /SCANFILE=c:windowsexplorer.exe
Note: If you are using a 64-bit Windows operating system, enter the “sfc /SCANFILE=C:WindowsSysWow64explorer.exe” command instead.
  • Wait until the process is completed and then restart your computer.

Option 3 – Run the DISM tool

You might also want to run the DISM tool. This tool is known to repair potentially corrupted files in your system as having them could also system issues like the “System call failed” error. To repair these corrupted system files, you can run the DISM commands:
  • Tap the Win + X keys and click on the “Command Prompt (Admin)” option.
  • After that, input each one of the commands listed below sequentially to execute them:
    • Dism /Online /Cleanup-Image /CheckHealth
    • Dism /Online /Cleanup-Image /ScanHealth
    • Dism /Online /Cleanup-Image /RestoreHealth
  • Once you’ve executed the commands given above, restart your computer and check if the problem is now fixed.

Option 4 – Try running the Check Disk utility

  • In the Windows Search box, type “command prompt” and from the search results, right-click on Command Prompt and select “Run as administrator”.
  • After opening Command Prompt, type this command and tap Enter: chkdsk c: /f /r
  • The command you entered will start to check for errors and fix them automatically. Else, it will throw an error message saying, “Chkdsk cannot run because the volume is in use by another process. Would you like the schedule this volume to be checked the next time the system restarts? (Y/N)”.
  • Tap the Y key to schedule Disk Check the next time your computer restarts.

Option 5 – Put your computer in a Clean Boot State

As pointed out, there are some instances that some conflicting programs installed in your computer might be the one that triggers the “System call failed” error to appear when you try to open File Explorer. To identify which program is causing the problem, you need to put your computer in a Clean Boot State. To do so, follow the steps below.
  • Log onto your PC as an administrator.
  • Type in MSConfig in the Start Search to open the System Configuration utility.
  • From there, go to the General tab and click “Selective startup”.
  • Clear the “Load Startup items” check box and make sure that the “Load System Services” and “Use Original boot configuration” options are checked.
  • Next, click the Services tab and select the “Hide All Microsoft Services” check box.
  • Click Disable all.
  • Click on Apply/OK and restart your PC. (This will put your PC into a Clean Boot State. And configure Windows to use the usual startup, just simply undo the changes.)
  • Once your computer has restarted in a Clean Boot State, perform your scan again and see if it now works, and then start to isolate the problem by checking which one of the programs you installed recently is the root cause of the problem.

Option 6 – Try to uninstall the programs you’ve installed recently

In case you don’t know, freeware software packages aren’t always free as some of them could contain malicious software that can cause serious damage to your computer. Thus, if you have installed a program recently prior to getting the “System call failed” error, then you have to uninstall that program.
  • Tap the Win + R keys to open the Run dialog box.
  • Then type “appwiz.cpl” in the field and tap Enter to open the Programs and Features in Control Panel.
  • Next, arrange the list of installed programs in the order of the installation date.
  • After that, look for the problematic program and right-click on it, and then select Uninstall.
  • Once the process is done, restart your computer and see if the error is fixed.
Read More
Transferring characters in diablo 2 remake
Diablo 2 resurrected has hit official release and servers seem to be finally taken care of and everything seems to be running smoothly now. The game also received great praise from gamers and attracted old players of the original Diablo 2 game. diablo 2 gameplaySpeaking of old players of old Diablo 2, they can transfer their old characters into remaster and continue playing them within this new great HD environment. There are some steps and requirements but we are here to help and transferred characters will bring full stash, inventory, and equipped items with them.

Requirements

There are not many requirements for this transfer to occur but they must be respected in order to be successful. The first thing is a minor requirement and somewhat annoying but it needs to be done, firstly fire up Diablo 2 resurrected and create a character, any kind of character with any kind of name, any kind of class. This strange requirement is to actually create a character folder and register it inside D2 resurrected so we can copy old ones there. The second requirement will be that characters that you wish to be transferred must be offline characters. Old battle net online characters cannot be transferred at this moment and probably will not be in the future as well. So for all of you that wish to transfer online characters, bad luck, for the rest of us casuals playing offline single-player mode, we can enjoy our characters.

Process of diablo 2 character trasfer

The process itself of transferring characters when previously mentioned requirements are met is just a simple and copy operation. If you have somewhere backed your characters go into your backup folder and copy files in c:\users\*current user*\saved games\*diablo 2 resurrected folder* If you do not have characters backed up and just have old Diablo 2 installed and playing it, you can go to c:\users\*current user*\saved games\*diablo 2 folder* and just copy all characters files into c:\users\*current user*\saved games\*diablo 2 resurrected folder* Your old characters end with .d2s extension, grab all that you want to transfer, and copy them into D2R. Take note that copied characters cannot be brought back into Diablo 2, once they are copied into Diablo 2 resurrected all further progress on them will be tied to the new game.

Conclusion

That’s it about the transfer process and requirements for it. Fire up the new game version and enjoy.
Read More
Fix Chrome ERR_SOCKET_NOT_CONNECTED
Recently, a number of users reported an error in Google Chrome that says, “ERR_SOCKET_NOT_CONNECTED”. If you are one of these users, read on as this post will guide you in resolving this error. This kind of error in Chrome is kind of vague so it could be caused by a couple of factors like DNS server issues, Socket Pools, third-party plugins or extensions, and many more. Whatever the cause may be, there are several options you can check out to resolve the problem. You can try to flush the Socket Pool or change the DNS address or remove unwanted extensions or reset your Google Chrome browser.

Option 1 – Try to flush the Socket Pool

  • Open Google Chrome and in the address bar, type “chrome://net-internals/”.
  • After that, select Sockets on the left side panel.
  • Next, select Flush socket pools from the right-side panel.
  • And once it’s done, restart your Chrome browser and check if the “ERR_SOCKET_NOT_CONNECTED” is fixed or not.

Option 2 – Try to change the DNS Server

In this option, you can try changing your current DNS settings to the Google Public DNS as it could also help in fixing the “ERR_SOCKET_NOT_CONNECTED” error. To do so, follow the steps below.
  • The first thing you have to do is right-click on the network icon in the Taskbar and select Network and Sharing Center.
  • Next, click on the “Change Adapter Settings” option.
  • After that, search for the network connection that you are using to connect to the internet. Note that the option might be “Wireless Connection” or “Local Area Connection”.
  • Right-click on your network connection and click on Properties.
  • Then select the new window to choose the “Internet Protocol 4 (TCP/IPv4)” option.
  • After that, click on the Properties button and click the checkbox in the new window for the option “Use the following DNS server addresses”.
  • Type in “8.8.8.8” and “8.8.4.4” and click OK and exit.

Option 3 – Get rid of any conflicting browser extensions

  • Open Chrome and press Alt + F keys.
  • Go to More tools and click Extensions to look for any suspicious browser extensions or toolbars.
  • Click the Recycle bin and select Remove.
  • Restart Chrome and press Alt + F keys again.
  • Proceed to On Startup and mark Open a specific page or set of pages.
  • To check if the browser hijacker is still active, click Set pages, if it is active, overwrite the URL.

Option 4 – Try to reset Google Chrome

Before you proceed, make sure that the Chrome browser is not running anywhere in the background via Task Manager. Once you’ve made sure that it’s no longer running, refer to these steps:
  • Tap the Win + R keys to open the Run dialog box.
  • Then type “%USERPROFILE%AppDataLocalGoogleChromeUser Data” in the field and tap Enter to open this location.
  • From there, look for the Default folder and then tap the Shift + Delete button and if a confirmation prompt appears, click on Yes.
  • After deleting the Default folder, open Google Chrome and click on the three vertical dots icon located in the top-right corner to open the menu.
  • Next, click on Settings and scroll down and then click on Advanced to open the Advanced Settings.
  • Then scroll down until you see the “Reset and clean up” section and click the “Restore Settings to their original defaults” option.
  • After that, you will see a confirmation box and from there, click on the Reset settings button to reset your Google Chrome browser.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status