Logo

"Stop Running This Script" Error - How to Fix It

Stop Running This Script Error - What is it?

"Stop Running This Script" Error is a Windows Internet Explorer error message that is displayed in the following format with a yes and a no button:

Stop running this script?

A Script on this page is causing your web browser to run slowly.  If it continues to run, your computer might become unresponsive.

This occurs when some scripts take an excessive amount of time to run. To be precise, there are some websites that use JavaScript, JQuery, and Active X scripts to run.

These scripts are notorious for taking too much time to run. So, if you use the Internet Explorer as your web browser, then by default if the website takes a long time to load, the ‘Stop running this script error will be triggered.

Other than this, if you are scripting an Active X control on the web page to transfer a very heavy file or run a huge database query, this may cause delays and lead to the error display.

However, if you use Firefox, then the ‘Stop running this script error code will be promoted as ‘Unresponsive Script’ error.

Solution

Restoro box imageError Causes

The ‘Stop running this script error code’ is triggered due to multiple reasons. These include:

  • Webpage programming errors
  • Running a pop-up killer
  • Spyware and viral infection
  • Active X control errors

Further Information and Manual Repair

Here are some of the best methods that you can try to resolve Internet Explorer’s ‘stop running this script error’ on your PC:

1. Change the Internet Explorer Settings

This can be done by opening Internet Explorer and in the top menu, click on Tools, and then go to Internet Options. Now click on the Advanced Tab option. Locate where it says ‘Disable Script Debugging’.

Once you find it uncheck the box beside it. Now close the browser and restart your PC. Access the same website on your IE web browser and see if the website opens. If it does, then the error is resolved.

However, if it doesn’t, then you the underlying causes for the stop running this script error message could either be spyware or ActiveX control error.

2. Download Restoro

Whether the error occurs due to spyware invasion of Active X control error, it is advisable to download Restoro on your PC.

This is a next-generation, innovative, and multi-functional PC repair tool that has several powerful utilities deployed together in one program.

Plus you don’t have to get into the technicalities of resolving Active X control issues.

Restoro is safe, bug-free, and efficient. It has a user-friendly interface and simple navigation which makes it quite easy for all levels of users to operate. It is compatible with all Windows versions including Windows 7, 8, XP, Vista, 8.1, and 10.

This PC repair tool is a one-stop solution for all your script error repair needs. It includes the following utilities: a registry cleaner, a system stability detector, and an ActiveX control error scanner.

It simultaneously scans for ActiveX control errors too. So, if the IE script error is triggered by ActiveX control issues, it resolves them too.

To fix the ‘stop running this script’ error code on your PC, click here to download Restoro

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

An Easy Guide to Resolving Error 1032

Error 1032 - What is it?

If you are an iPhone or an iPad user and you sometimes open your email Yahoo Mail account on your phone, then you will most likely experience the MF Message Error Domain: Error 1032. This error may occur when you access your mail account. The MF Message Error Domain: Error 1032 may prevent you from composing new emails and even stop the inbox from loading.

Solution

Restoro box imageError Causes

The error 1032 can be triggered due to multiple reasons such as:
  • Overloaded History
  • Problems with the account log-in credentials
  • Outdated Yahoo Mail app
  • Authentication issues

Further Information and Manual Repair

To fix this issue on your iPhone or iPad, here are some methods you can try:

Method 1 - Delink and Re-setup Yahoo Email Account

If the error code 1032 occurs due to problems with the account log-in credentials, then try re-setting up your Yahoo email account. To do this, go to tap settings mail, contacts, and calendar, then remove your email account. Now repeat the process and provide valid log-in credentials to re-setup your Yahoo email account.

Method 2 - Update Yahoo Mail App

Another reason can be the outdated Yahoo Mail App. If this is the cause, then simply update it to the latest version. To do this, simply download the latest version from the iTunes store and run it. This will hopefully resolve the issue.

Method 3 - Manage App Connections to Resolve Authentication issues

If the error 1032 occurs due to authentication issues then there are possibilities of conflicts between account security settings. The best way to resolve the error in such a situation is to learn how to manage app connections. Here’s how it’s done: Use your desktop computer to sign in to your Yahoo account. Now click the menu icon and select account info. Enter your account password and sign in again. Now click manage apps and website connections under Sign-in and security section. A list of all authorized mobile devices and applications will be displayed to you. Remove any existing entries appearing for mobile devices. After this, try logging into your Yahoo account from your iPhone or iPad. You will not receive the error.

Method 4 - Clear History

When the cause of the issue is overloaded history, then the best way to go about it is clearing the clutter in the history. Also clear cache and cookies. The cache is the location where temporary files are saved for speeding up the file retrieval process. But sometimes it can get corrupt and the iOS may fail to retrieve data from corrupt cache contents. To clear history and cache, simply tap Settings, Safari, and then clear history, cookies, and data. The process may take some time depending on the cache file size.
Read More
Your computer is running low on resources
Signing in to a computer that runs a Windows 10 version OS is usually fast and straightforward. However, there are instances when signing in takes too long especially if there are a lot of programs in the Startup. So if many things are loading as soon as you log into your computer, it will slow down the sign-in process. Aside from programs in Startup, it is also possible that there are too many users that are logged in to the account. In such a case, you will most likely encounter an error that says, “Your computer is running low on resources, so no new users can sign in. Please use an account that has already been signed in”. If you’ve encountered such an error when you try to log into your computer, read on as this post will be guiding you on how you can fix it. Each time a user signs in to Windows 10, it will allocate resources in order to work smoothly. But, in many cases, the system is running low on resources which is why this error pops up and blocks a sign-in of a new user. To fix it, you can try to log out the existing users, or perform a Cold Boot, as well as run both the DISM tool and System File Checker scan.

Option 1 - Try to logout existing users

The first thing you can do is to log out the existing users. If you have a shared Windows 10 computer, you have to check if someone hasn’t logged out. It could be that some background task or there is an existing program that is still running under that account. So you have to make sure to ask the same user to log out in case there is some unsaved work. On the other hand, if that user is not around, then you reboot the computer right away.

Option 2 - Try Performing a Cold Boot

You could also try to perform a Cold Boot to fix the problem. A Cold Boot is a process that makes sure that the Windows 10 Kernel shuts down properly and releases all the resources held by any account. To perform a Cold Boot, just press and hold the physical power button on your CPU until it goes off. After that, boot your computer regularly and see if you can now log into your account without any error.

Option 3 - Try to run a System File Checker scan

System File Checker is a built-in command utility in Windows that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files to good system files that might be the cause why you’re getting the error when you log into your computer. To run the SFC command, follow the steps given below.
  • Boot your computer into the Advanced Recovery mode and from there open Command Prompt.
  • After opening Command Prompt, type in sfc /scannow
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
  1. Windows Resource Protection did not find any integrity violations.
  2. Windows Resource Protection found corrupt files and successfully repaired them.
  3. Windows Resource Protection found corrupt files but was unable to fix some of them.
 Now restart your computer and see if the problem is fixed or not.

Option 4 - run the dism tool

You might also want to run the DISM tool. This tool is known to repair potentially corrupted files in your system as having them could also system issues like the “Your computer is running low on resources, so no new users can sign in” error. To repair these corrupted system files, you can run the DISM commands:
  • Go to the Advanced Recovery mode and select Command Prompt.
  • After that, input each one of the commands listed below sequentially to execute them:
    • Dism /Online /Cleanup-Image /CheckHealth
    • Dism /Online /Cleanup-Image /ScanHealth
    • Dism /Online /Cleanup-Image /RestoreHealth
  • Once you’ve executed the commands given above, restart your computer and check if the problem is now fixed.
Read More
How to Fix Remote Computer requires network level authentication Error in Windows 10
A couple of Windows 10 users have reported an error on domain-connected systems when they tried accessing their computer systems remotely. This occurs when the network level authentication or NLA is enabled on the computer. If you are one of these users, you better keep reading as this post will guide you on how you can fix this error. To resolve this issue, there are several workarounds you can try. You can either disable this option directly via properties or you can also modify some registry entries or sub-keys and restart the system. When you encounter this problem, an error message pops up that states:
“The remote computer that you are trying to connect to requires network level authentication (NLA), but your windows domain controller cannot be contacted to perform NLA. If you are an administrator on the remote computer, you can disable NLA by using the options on the Remote tab of the System Properties dialog box.”
Or you could also see this error message instead:
“The remote computer requires Network Level Authentication, which your computer does not support. For assistance, contact your system administrator or technical support.”
Before you proceed in troubleshooting the problem using the options provided below, you need to create a backup for your data or system restore point as well as make a copy of any registry entries you are going to modify.

Option 1 – Disable Network Level Authentication via Properties

The NLA is a useful tool that provides your computer with extra security and helps network administrators in controlling who can log into the system with just a click of a single box. However, there are times when it can become a disadvantage and could prevent you from accessing your system remotely. Thus, you need to disable it using Properties.
  • Tap the Win + R keys to open the Run dialog box.
  • After that, type in “sysdm.cpl” and tap Enter to open System Properties.
  • Next, go to the remote tab and uncheck the checkbox for the “Allow connections only from computers running Remote Desktop with Network Level Authentication (recommended)” option.
  • Now click the Apply button to save the changes made and exit System Properties and then try logging into the remote computer again and see if the problem is fixed or not.

Option 2 – Disable NLA via Registry Editor

Note that you can only use this option if the first one didn’t work for you. Take note that this option will require you to restart your PC completely which could mean some downtime if your computer is running a production server. So make sure to save all your work.
  • Tap the Win + R keys to open the Run dialog box and then type in “Regedit” in the field and tap Enter to open the Registry Editor.
  • From there, click on File > Connect Network Registry and input the details of the remote computer and then try to connect.
  • Navigate to the path below after you’re connected:
HKLM >SYSTEM > CurrentControlSet > Control >Terminal Server > WinStations > RDP-Tcp
  • After that, change the values given below to “0”
    • SecurityLayer
    • UserAuthentication
  • The navigate to PowerShell and execute this command – restart-computer

Option 3 – Disable NLA via PowerShell

PowerShell allows you to tap into the remote computer and once you’ve targeted the machine, you can execute the commands given below to disable NLA.
  • Tap the Win + S to open Search and then type in “PowerShell” in the field. Right-click on the related result and select the “Run as administrator” option.
  • After opening PowerShell, execute the command below:
  1. Once in the PowerShell, execute the following command:
$TargetMachine = “Target-Machine-Name” (Get-WmiObject -class “Win32_TSGeneralSetting” -Namespace rootcimv2terminalservices -ComputerName $TargetMachine -Filter “TerminalName=’RDP-tcp'”).SetUserAuthenticationRequired(0) Note: In the command given, the “Target-Machine-Name” is the name of the machine you are targeting.

Option 4 – Use the Group Policy Editor to disable NLA

Another option you can use to disable NLA is via the Group Policy Editor. This is ideal for you if you are blanket disabling. Just take note that the Group Policy Editor is a powerful tool and that if you make some mistakes by changing values you have no clue about, you can render your computer useless so make sure that you create a backup for all the values before you proceed.
  • Tap the Win + R keys to open the Run dialog box.
  • Then type in “gpedit.msc” and tap Enter to open the Group Policy Editor.
  • From there, go to this path – Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security
  • After that, search for “Require user authentication for remote connections by using Network Level Authentication” and set it to disabled.
  • Now check if the error is fixed or not.
Read More
PDF text disappears when editing or saving
If you are trying to save a file in a PDF format on your Windows 10 computer but then the PDF text content in an Adobe file suddenly disappears, then read on. This post will give you more insight into this issue. This kind of issue is rare and mostly occurs in forms that you can fill upon. In such a case, the text you enter in the form vanishes right after you click the Save button. One of the benefits of working with PDF files is that it has the ability to compress high-quality files to relatively small file sizes. This is really useful especially when you are saving hard drive space and you’re working with limited storage resources. However, these files can contain layered content if they are created from layered documents using applications like Adobe InDesign. Consequently, a single page of the PDF file can contain different layers with different content. So if you try to save or print a PDF file that contains layered content, the elements will disappear from the PDF. To resolve this issue, you can try to merge or flatten the file since it will help keep the changes in the PDF file. On the other hand, you can no longer make any alterations or form data once you flatten the file. Another thing to keep in mind is that merging or flattening the file can’t be undone so you might want to save another copy of the file before you proceed.

Option 1 – Print to PDF

  • First, you have to open the desired PDF file and tap the Ctrl + P keys to open the Print dialog box.
  • After that, select the “Microsoft Print to PDF” option as the printer.
  • Once the action is confirmed, it will regenerate another version of the PDF file with the default settings and merge all the existing layers into a single layer.
  • On the other hand, you can also click on the “File” menu of the PDF file and select Print.
  • From there, click on the Print button and select “PostScript (*.ps)” as the “Save as” type to save a PostScript copy of the original PDF file.
  • Once you’re done, double click on the .ps file to open the file in the Adobe Distiller which will flatten the file automatically and convert it to a PDF file with only one visible layer.

Option 2 – Save the PDF file as an Optimized PDF file

If you are using the Acrobat Reader Pro version such as the Acrobat Pro, Foxit, and so on, you can try to flatten the layers by saving the PDF file as an Optimized PDF file. Refer to these steps to do so:
  • Select File > Save as > Optimized PDF.
  • Next, select the Transparency checkbox from the Settings window that opens.
  • Then click on the Save button to apply and save the changes made. After that, the PDF text content should not disappear when you try to save a file on your Windows 10 computer.
Read More
What to do if Windows is stuck in Tablet Mode
To make the Windows 10 operating system a lot more user-friendly, Microsoft introduced the Tablet Mode for Windows 10 devices, especially the 2-in-1 devices like Surface Pro and Surface Book. Despite the Tablet Mode’s efficiency, it also encounters some errors from time to time. One of the issues users reported about tablet mode is that they can’t turn off or exit tablet mode. If you are one of these users, read on as this post will guide you in what you can do to fix the issue. To fix the problem with Tablet Mode, there are several suggestions you can check out. You can try to check the full-screen setting, or perform a full shutdown or perform two buttons to restart the Surface devices. You could also disable Tablet Mode via Registry Editor or perform System Restore or change the settings in the System tab or the Action Center.

Option 1 – Try to check the full-screen setting

  • Tap the Win + I keys to open the Windows Settings app.
  • Then navigate to this path, Personalization > Start.
  • Next, scroll down to toggle off the “Use Start Full Screen” option.
  • After that, restart your computer and see if the problem is fixed.

Option 2 – Perform a full shutdown

  • Open Command Prompt with admin privileges first.
  • Next, execute this command to perform a full shutdown: shutdown /s /f /t 0
  • The command you entered will shut down your computer and once it’s turned off, wait for a couple of minutes and then turn it back on.

Option 3 – Try to perform a two-button restart on your Surface device

  • Tap and hold the power button for about 30 seconds.
  • Then release them after 30 seconds.
  • After that, tap and hold the volume up + the power button for 20 seconds. This will cause the display to flash a few times but you have to keep those buttons pressed until your Surface device is turned off.
  • Wait for a couple of minutes and your Surface will turn back on. This should resolve the problem.

Option 4 – Try to disable the Tablet Mode via Registry Editor

  • In the Start Search, type “registry editor” and right-click on the Registry Editor from the results, and then select the Run as administrator option. This will open the Registry Editor with admin privileges.
  • Next, navigate to this registry key: ComputerHKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionImmersiveShell
  • From there, look for the DWORD named “SignInMode” and double click on it.
  • Set its value to “1” and its base as hexadecimal.
  • After that, click on OK to save the changes made. This will make sure that you are signed in to the desktop mode when you log into your account.
  • Now look for the DWORD named “TabletMode” and double click on it and set its value data to “0” and it's base as hexadecimal.
  • Click on OK to save the changes made and then restart your computer.

Option 5 – Run System Restore

  • Tap the Win + R keys to open the Run dialog box.
  • After that, type in “sysdm.cpl” in the field and tap Enter.
  • Next, go to the System Protection tab then click the System Restore button. This will open a new window where you have to select your preferred System Restore point.
  • After that, follow the on-screen instructions to finish the process and then restart your computer and check if the problem is fixed or not.

Option 6 – Try changing the settings in the System tab or the Action Center

  • Go to Settings and navigate to System > Tablet Mode.
  • After that, scroll down to set the “Use desktop mode” from the drop-down menu under the “When I sign in” section.
  • Now restart your computer and see if the issue is fixed.
Read More
What is Windows Terminal and should you use it
Windows TerminalWindows Terminal is a new free Microsoft terminal sort of application. When you open either Power Shell or Command Prompt in Windows they will be opened in different windows, and if you want several of each you will have several windows of each on your screen. Windows Terminal fixes this by opening each of the Instances of Command Prompt and Power Shell as separate tabs inside itself making it much easier to manage multiple instances of named applications. You can also run both Power Shell and Command prompt tabs in the same Windows Terminal. Luckily running command prompt and power shell in different tabs is not the only thing you can do. Windows Terminal lets you choose your own theme, it has emoji support, GPU rendering, split panes, and many more customizable options. Windows 11 will have Terminal as the default command-line environment for opening Power Shell or Command prompt, even Windows Subsystem for Linux (WSL)

Setting Windows Terminal as the default application

If I was successful I have managed to show you that Windows Terminal is something that you should use even if you do not or cannot upgrade to Windows 11. You can use it inside Windows 10 also. First thing is to download and install it. You can get Windows Terminal from the official Microsoft website here: Windows Terminal page After download and installation are completed, open the Terminal app and select the down arrow menu, click Settings. Alternatively, you can use CTRL + + shortcut. Inside Settings by default Default Terminal application would be set to Windows Console Host Click on the Default Terminal application to bring a drop-down menu and choose Windows Terminal from the list. Now by default once opened Windows Terminal will use Power Shell as the default profile, however, you can change this by clicking on the drop-down for the default profile where you can choose between Command Prompt, Power Shell, Windows Power Shell, or Azure Cloud Shell. Pick one that you prefer, click on Save and it will be opened as default on the next run.
Read More
iPhone Connects/Disconnects When Plugged In
If you own an iPhone, iPad, or iPod you might be aware of the phenomenon of connecting and disconnecting your device. In one moment device is connected and then it somehow loses connection and you have to plug in back again to be recognized. In this troubleshooting guide, we will address ways to eliminate this issue and to connect and have your devices working properly. We will go from the most common ones to the most uncommon so it is advisable to try solutions in order to how they are presented.
  1. Check cable

    The most common issue with this kind of behavior comes from a broken cable if you have the opportunity try another working cable to see if the device will behave differently. If everything is working fine with another cable, the issue is in the previous cable.
  2. Check USB ports and Cable Jack

    Usually, it is a cable issue, but it can also be a USB jack on cable or even a USB port on a PC, try putting the jack into another port to see if this will solve the issue.
  3. Check device settings

    From updates on your device comes a change of setting about privacy which can reflect on connection with the computer. In order to eliminate this, you will need to reset your device. Go to device settings and go to general Scroll down until you find the reset section and go into it In the reset, section click on reset location and privacy You will have to authenticate using your pin/passcode in order to complete the reset function Enter your passcode (or use any other authentication method you have chosen) and you can now reset the Location and Privacy settings. Click on reset Connect the device to PC and choose trust this device
  4. Update iTunes

    Outdated iTunes can also be a problem with this particular issue. Go to the apple website and download the latest version of iTunes or updating it via apple updater.
Read More
How to Resolve HP Printer Spooler Not Running Error

HP Printer Spooler Not Running - What is it?

If you have the HP printer, then you may come across this error. HP Printer Spooler not running errors does not mean there is anything wrong with your printer. It indicates printer driver issues.

Solution

Restoro box imageError Causes

There can be multiple causes behind the HP printer Spooler not running error code such as:
  • The poor or unsuccessful printer driver installation
  • Invalid registry entries
Though this is not a critical error code as it does not pose serious damage threats to your PC, however, it is advisable to resolve it as it can cause you a great deal of inconvenience especially if you want to take out printouts every now and then.

Further Information and Manual Repair

Here are some ways you can try to resolve HP Printer Spooler Not Running Error on your system: 1. Reinstall the HP Printer driver on Your System
  • Simply go to the control panel and then click on the Device Manager option
  • Once you click it you will see details pane with a list of devices. Now simply click on the printer, to reinstall the driver software.
  • Double click on it to open the properties dialog box
  • After that click on the driver tab and then click update driver
Once you update the driver, try using the Printer to see if it works. Sometimes you may come across a pop-up displaying the following message: ‘Driver installed correctly, Device is ready to use however, you may not see the printer under the printer’s pane. This triggers registry issues. 2. To resolve registry issues, install Restoro on your system. This is a highly functional registry cleaner integrated with a powerful antivirus. It helps resolve registry issues, malware, and guarantees system optimization. This feature-filled tool is the answer to all your PC-related issues. Restoro is a next-generation PC repair software that extends outstanding usability and helps PC users resolve errors efficiently. Its simple navigation and user-friendly interface make it so easy to use that even novice users can also work around it and repair issues without any hassle or difficulty. It’s a smart and intuitive in-built registry cleaner that wipes out all the unnecessary and obsolete files on your hard disk. This includes junk files, internet history, invalid registry keys, and files from the uninstalled old program versions. Sometimes the files from the uninstalled programs hamper your ability to update new program versions thus leading to unsuccessful driver installation. Nonetheless, all such files are removed in seconds with this helper and you are then ready to reinstall the driver. This registry cleaner cleans the clutter from your hard disk and optimizes your system's speed, lowering your PC boot time significantly. Total System Care can be used on all Windows versions To fix the HP printer spooler not running error on your computer, simply click here to install Restoro. Run it to scan for the error and fix it in seconds. Once the issue is resolved, update the printer driver. You’ll see the driver will be updated successfully and the HP printer will also appear in the printer’s panel. By installing Restoro on your system, you can also resolve several other issues like privacy errors triggered by malware and virus infections. With this tool, you will not have to download and run a separate anti-virus on your system.
Read More
10 Worst Computer Viruses in history
Computers viruses, worms, ransomware, etc. are kinds of malicious software that no user should take lightly. On several occasions, we have touched upon security steps that each user should take in order to protect its identity and data. Sadly sometimes even when all precautions are taken some malware can still slip through and wreak havoc. Today we are looking at some of the worst or the best, depending on your view that has indeed wreaked plenty of havoc.

viruses10 worst computer viruses in history

In the list of the 10 most famous computer viruses below, we show the costs, dates, reach, and other key facts. First a note about terms: we use the words “virus” and “worm” interchangeably because most readers search for them that way. But there’s a subtle difference that we explain after the list.

1. Mydoom – $38 billion

The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent. Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server. Mydoom is still around today, generating 1% of all phishing emails. That’s no small feat considering the 3.4 billion phishing emails sent each day. By that figure, Mydoom has taken on a life of its own, infecting enough poorly-protected machines to send 1.2 billion copies of itself per year, 16 years after its creation. Though a $250,000 reward was offered, the developer of this dangerous computer worm was never caught. Wondering what makes the world’s most secure computers so safe? See the Tech@Work guide: Upgrade to the World's Most Secure and Manageable PC

2. Sobig – $30 billion

The 2003 Sobig computer virus is actually another worm. It is second only to the Mydoom virus in its scope. The $30 billion figure is a worldwide total, including Canada, the U.K., the U.S., mainland Europe, and Asia. Several versions of the worm were released in quick succession, named Sobig.A through Sobig.F, with Sobig.F being the most damaging. This cybercriminal program masqueraded as legitimate computer software attached to emails. It disrupted ticketing at Air Canada and interfered with countless other businesses. Despite its widespread damage, the creator of the successful bug was never caught.

3. Klez – $19.8 billion

Klez is a close third on the list of the worst computer viruses ever created. With nearly $20 billion in estimated damages, it infected about 7.2% of all computers in 2001, or 7 million PCs. The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses. As with other viruses and worms, Klez was released in several variants. It infected files, copied itself, and spread throughout each victim’s network. It hung around for years, with each version more destructive than the last. Windows has come a long way since most of the computer viruses on this list hit the web. Thankfully, built-in protection with Microsoft Defender is always on the watch.

4. ILOVEYOU – $15 billion

The year 2000’s ILOVEYOU virus worked by sending a bogus “love letter” that looked like a harmless text file. Like Mydoom, this attacker sent copies of itself to every email address in the infected machine’s contact list. Shortly after its May 4 release, it had spread to more than 10 million PCs. The virus was created by a college student in the Philippines named Onel de Guzman. Lacking funds, he wrote the virus to steal passwords so he could log into online services he wanted to use for free. He reportedly had no idea how far his creation would spread. This virus is also known as Loveletter. Need to up your remote work security game before there’s another entry on the list of most deadly computer viruses? See our guide: How to Work Remotely and Securely

5. WannaCry – $4 billion

The 2017 WannaCry computer virus is ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. The WannaCry ransomware ripped through computers in 150 countries, causing massive productivity losses as businesses, hospitals, and government organizations that didn’t pay were forced to rebuild systems from scratch. The malware raged like wildfire through 200,000 computers worldwide. It stopped when a 22-year-old security researcher in the U.K. found a way to turn it off. Computers with out-of-date operating systems were hit especially hard. That’s why security experts always recommend updating your systems frequently.

Ransomware strikes again

In September 2020, one of the potentially largest computer virus attacks in medical history hit Universal Health Services. The U.S. hospital chain, which has more than 400 locations, was reportedly struck by damaging ransomware. The attack forced the cancellation of surgeries and made healthcare workers switch to paper records.

6. Zeus – $3 billion

The Zeus computer virus is an online theft tool that hit the web in 2007. A whitepaper by Unisys three years later estimated that it was behind 44% of all banking malware attacks. By then, it had breached 88% of all Fortune 500 companies, 2,500 organizations total, and 76,000 computers in 196 countries. The Zeus botnet was a group of programs that worked together to take over machines for a remote “bot master.” It originated in Eastern Europe and was used to transfer money to secret bank accounts. More than 100 members of the crime ring behind the virus, mostly in the U.S., were arrested in 2010. It’s not as prominent today, but some of the virus’ source code lives on in newer botnet viruses and worms. Zeus caused documented damage of $100 million. But the real cost in terms of lost productivity, removal, and undocumented theft is undoubtedly much higher. A $3 billion estimate, adjusted for inflation, puts this virus at a cost of $3.7 billion in today’s dollars.

7. Code Red – $2.4 billion

First observed in 2001, the Code Red computer virus was yet another worm that penetrated 975,000 hosts. It displayed the words “Hacked by Chinese!” across infected web pages, and it ran entirely in each machine’s memory. In most cases it left no trace in hard drives or other storage. Financial costs are pegged at $2.4 billion. The virus attacked websites of infected computers and delivered a distributed denial of service (DDoS) attack on the U.S. White House’s website, www.whitehouse.gov. In fact, the White House had to change its IP address to defend against Cod Red. Can your printer get a virus? See our cool infographic: The State of Printer Security

8. Slammer – $1.2 billion

The SQL Slammer worm cost an estimated $750 million across 200,000 computer users in 2003. This computer virus randomly selected IP addresses, exploiting vulnerabilities and sending itself on to other machines. It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic. The Slammer worm hit banks in the U.S. and Canada especially hard, taking ATMs offline in many locations. Customers of Toronto’s Imperial Bank of Commerce found themselves unable to access funds. The attack reared its ugly head again in 2016, launching from IP addresses in Ukraine, China, and Mexico.

9. CryptoLocker – $665 million

Thankfully, ransomware attacks like the 2013 CryptoLocker virus have dipped since their 2017 peak. This malware attacked upwards of 250,000 machines by encrypting their files. It displayed a red ransom note informing users that “your important files encryption produced on this computer.” A payment window accompanied the note. The virus’ creators used a worm called the Gameover Zeus botnet to make and send copies of the CryptoLocker virus. According to a report by security firm Sophos, the average ransomware attack costs a business $133,000. If we estimate that CryptoLocker hit 5,000 companies, that would put its total cost at $665 million. Where will cybersecurity go next? See our guide: The Future of Cybersecurity

10. Sasser – $500 million

The Sasser worm was written by a 17-year-old German computer science student named Sven Jaschan. He was arrested at the age of 18 in 2004 after a $250,000 bounty was posted for the computer virus’ creator. A friend of Jaschan’s tipped authorities that the youth had penned not only the Sasser worm but also the damaging Netsky.AC attack. Jaschan was given a suspended sentence after it was found he was a minor when he wrote the malware. The Sasser worm crashed millions of PCs, and though some reports put damages at $18 billion, the relatively low infection rate suggests a more likely cost of $500 million. Other notable viruses The top 10 worst computer viruses above are just the ugly tip of a gargantuan digital iceberg. With a million new malware programs popping up every 3 years, we may miss the forest for a few outstanding trees. Here are just a few more viruses that have wreaked havoc over the years: Mimail: This worm tried to harvest data from infected machines to launch a string of DDoS attacks, but was relatively easy to remove. Yaha: Yet another worm with several variants, thought to be the result of a cyber-war between Pakistan and India. Swen: Written in C++, the Swen computer worm disguised itself to look like a 2003 OS update. Its financial cost has been pegged at $10.4 billion, but not reliably. Storm Worm: This worm showed up in 2007 and attacked millions of computers with an email about approaching bad weather. Tanatos/Bugbear: A 2002 keylogger virus that targeted financial institutions and spread to 150 countries. Sircam: A computer worm from 2001 that used counterfeit emails with the subject line, “I send you this file in order to have your advice.” Explorezip: This worm used fake emails to spread to every machine on thousands of local networks. Melissa: The most dangerous computer virus in 1999, Melissa sent copies of itself that looked like NSFW pics. The U.S. FBI estimated cleanup and repair costs at $80 million. Flashback: A Mac-only virus, Flashback infected over 600,000 Macs in 2012 and even infected Apple’s home base in Cupertino, Calif. In 2020, there’s now more malware on Macs than on PCs. Conficker: This 2009 virus still infects many legacy systems and could do significant damage if it ever activates. Stuxnet: This worm is reported to have destroyed Iranian nuclear centrifuges by sending damaging instructions.
Read More
Disable Telemetry & Data Collection in Windows
The Windows 10 Telemetry and Data Collection features are auto-enabled and they collect all sorts of user activity and sends it to Microsoft. Microsoft says that the data collected only enhances the overall user experience and Windows functionality better but the number of data breaches happening across the globe has forced users to be extra cautious about their data privacy. So naturally, from stronger passwords and other services management, it is only logical to turn off Windows data gathering. To do so:
  • Press ⊞ WINDOWS + R to open the run dialog.
  • In the Run dialog type: taskschd.msc
  • Press CTRL + SHIFT + ENTER key combo to open Task Scheduler in admin mode.
  • On the left pane, navigate to the: Task Scheduler Library > Microsoft > Windows > Customer Experience Improvement Program
  • At the location, on the middle pane, right-click on the task named Consolidator and select Disable from the context menu...
  • Repeat the process with all other tasks listed in the middle pane.
  • Exit Task Scheduler.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status