Logo

Recent Items aren't visible under Taskbar

In this post, you will be guided on what to do if the Recent Items are no longer visible in the Taskbar icons in Windows 10. This can be quite inconvenient especially if you work simultaneously on many files and documents together and would require you to visit them regularly to incorporate changes. Thus, if you find that the Recent items are not visible in the Windows Taskbar, read on.

In order for the Recent Items to appear on the taskbar icons in Windows 10 again, there are four potential fixes you can check out. You can try to show the recently opened items via Settings or clear the cache of the recent items. You could also make some changes in the Windows Registry or use the Group Policy Editor.

But before you proceed with these potential fixes, it’s best if you create a System Restore Point first just in case something goes wrong after you made changes in the system. The System Restore Point allows you to undo these changes and bring back the previous state of your computer. Thus, you need to create one and then carefully follow the given options below.

Option 1 – Show the recently opened items via Settings

The first thing you can do to fix the problem is to show the recently opened items through the Settings app.

  • Open the Settings app and select Personalization.
  • From there, select the Start option and scroll down until you see the “Show recently opened items in Jump Lists on Start or the taskbar” option.
  • Make sure that its toggle button is turned on.

Option 2 – Try to clear the Recent Items cache

  • Tap the Win + E keys to open File Explorer.
  • Next, copy and paste this link on the address bar: %AppData%Microsoftwindowsrecentautomaticdestinations
  • Once you’re in the given location, you should see multiple files. Now select all these files and completely delete them.

Note: These files are automatically recreated when you interact with the system like performing tasks such as opening apps or accessing files.

  • After that, go to this next location: %AppData%Microsoftwindowsrecentcustomdestinations
  • Once there, delete all of its files and restart your computer. This should resolve the problem.

Option 3 – Try making changes via Registry Editor

The next thing you can do to fix the problem is to apply some tweaks in the Registry by following these steps:

  • Tap the Win + R keys to open the Run dialog box and type “Regedit” in the field and hit Enter to open the Registry Editor.
  • Next, navigate to this registry sub-path: HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersion
  • From there, select the Policies Explorer folder located in the left pane.
  • Then move to the right pane and look for the “NoRecentDocsHistory” entry and right-click on it.
  • Now delete this entry.

Note: This entry is the one that stores the Group Policy setting for “Do not keep the history of recently opened documents. The Group Policy adds this entry to the registry with a value of 1 if you enable the “Do not keep the history of recently opened documents” policy. On the other hand, if you disable the policy by setting it to “Not configured” or deleting it, the Group Policy will delete the entry from the registry, and the system will act as though the value is 0 – for instance, it keeps the history of the recently opened files in your computer.

Option 4 – Try to use the Group Policy Editor

  • Tap the Win + R keys to open the Run utility and type “gpedit.msc” in the field and tap Enter to launch the Group Policy Editor.
  • Next, navigate to User Configuration > Administrative Templates > Start Menu and Taskbar.
  • Afterward, double click on the “Do not keep a history of recently opened documents” policy located on the right panel. This is the policy that lets you enable or disable recent items and frequent places.
  • Now to enable the recent items, as well as the frequent places, feature, click on the “Disabled” or the “Not Configured” option.
  • Once you’re done, close the Group Policy Editor and restart your PC.

Note: If you choose to enable this setting, the system and Windows programs will not create shortcuts to documents opened while the setting is in effect. Aside from that, they also stay but won’t display the existing document shortcuts and the system will empty the Recent Items menu on the Start menu and the Windows programs won’t also display shortcuts in the Start Menu. In addition, the Taskbar won’t also show the recently opened or frequently used folders, files, or websites.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

How to Fix the AVFoundationCF.dll Error on Your PC
AVFoundationCF.dll is a type of Dynamic Link Library file. This DLL file is associated with AVFoundationCF and is developed by Apple Computer Inc. for Windows PC. This file functions similarly to any other DLL files. It comprises of small programs. This DLL file is typically needed to load and start the Apple iTunes utility. The inability to call this file or the files to load triggers the AVFoundationCF.dll error message on your system. The error message can be displayed in either of the formats on your PC:
“The program can’t start because AVFoundationCF.dll is missing from your computer. Try reinstalling the program to fix this problem.” "This application failed to start because avfoundationcf.dll was not found.” "Cannot find %COMMONFILES%AppleApple Application Supportavfoundationcf.dll." "Cannot start AVFoundationCF. A required component is missing: avfoundationcf.dll.” “Avfoundationcf.dll Access Violation." "Cannot register avfoundationcf.dll."

Solution

Restoro box imageError Causes

AVFoundationCF.dll error can occur due to numerous reasons. However, the most common reasons for this error code include:
  • Viral infection
  • Corrupt or invalid registry entries
  • Apple Computer Inc. hardware failure such as bad hard drive
  • Missing or deleted Avfoundationcf.dll file
It is recommended to resolve the error as soon as you experience it virtually because if the error code is related to viral infection on your system, it can expose your PC to privacy errors and data security risk. And if the error is triggered by registry issues, it can lead to serious threats like system crash, failure, and data loss. Therefore, the AVFoundationCF.dll error not only hampers your ability to access and start Apple iTunes program but it also puts your PC at serious risk.

Further Information and Manual Repair

To fix the error AVFoundationCF.dll on your PC, here are some of the best and easy to do solutions that you can try:

Check your Recycle Bin

Since dll files are shared files, there is a possibility that this file accidentally got deleted when you were uninstalling some other program on your system. If you experience missing AVFoundationCF dll file error message after performing any program on your PC, then chances are that it got deleted and maybe in your recycle bin. So, first, check your recycle bin and search for the dll file. If you find it, restore it to fix the error.

Update Device Driver

To resolve the issue, try performing a driver update. This can be done by downloading the latest drivers from the hardware manufacturer’s website. Now open Device Manager from the Control Panel and locate the hardware device that you want to update the driver for. Once you find the hardware you are updating the driver for, right-click on the hardware icon and choose properties. In the properties windows, click the driver tab. Now click the update driver button. To activate changes, restart your PC. To automatically update your computer's drivers when necessary, download and install DriverFIX.

Try Re-installing Apple iTunes Program

To do this, simply go to the control panel, select programs and then uninstall a program and then select iTunes.  Uninstall it and then repeat the same program and install the Apple iTunes program again on your PC by downloading the program from Apple’s official website.

Scan for Viruses

If the error still persists, then it is advisable to scan your PC for viruses. This can be easily done by running a powerful antivirus on your PC. However, please note anti-viruses are notorious for slowing down PC performance. So, may have to compromise on the speed of your system.

Clean and Repair the Registry

If the error is caused by invalid and corrupt registry entries and damaged Avfoundationcf dll file, then the best way to resolve is to download a powerful registry cleaner. We advise you to install Restoro on your PC. This is an advanced and a multi-functional PC Fixer integrated with multiple powerful utilities including a high functional registry cleaner, an antivirus and a system optimizer. The registry cleaning utility scans all the registry issues and removes all errors triggered by the registry immediately. It cleans the registry by wiping out all the unnecessary, obsolete and redundant files including invalid entries and bad registry keys. Furthermore, it also fixes the damaged and corrupt dll files including Avfoundationcf dll file. Thereby resolving the error right away. Furthermore, the antivirus deployed in this software scans for all types of malicious codes like viruses, Trojans, spyware, and malware and removes them. To ensure you don’t compromise on your PC performance, it is deployed with a system optimizer utility that boosts the speed of your computer dramatically. This tool is bug free, has a user-friendly interface and compatible with all Windows versions. Click here to download Restoro and resolve Avfoundationcf.dll error on your PC today!
Read More
Software review series: Tor Browser
Back in the mid-'90s, when the US Navy was looking into ways to securely communicate sensitive intelligence information, a mathematician and two computer scientists emerged from the Naval Research Lab with something called "onion routing." It was a new kind of technology that would protect your internet traffic with layers of privacy. By 2003, The Onion Routing project, acronym Tor, was in the hands of the public, where its vast network of users the engine enabling Tor has since continued to grow. Today, thousands of volunteers all over the world are connecting their computers to the internet to create the Tor network by becoming "nodes" or "relays" for your internet traffic.

What is Tor?

At a basic level, Tor is a type of internet-connected network with its own internet browser. Once you connect to the internet with the Tor browser, your internet traffic is stripped of its first layer of identifying information as it enters the Tor network and is then sent bouncing through those relay nodes, which serve to encrypt and privatize your data, layer by layer like an onion. Finally, your traffic hits an exit node and leaves the Tor network for the open web. Once you're in the Tor network, it's nearly impossible for others to track your traffic's manic pinballing path across the globe. And once you leave the Tor network via an exit node, the website you view (assuming it has HTTPS in front of its address) isn't sure which part of the world you're hailing from, offering you more privacy and protection. Because Tor is a volunteer-run network, speed can often be an issue. As your traffic moves from node to node, you're likely to notice more speed loss than you would, for instance, with most commercial virtual private networks. This becomes particularly noticeable if you try to watch streaming Netflix content over Tor or make voice-over-IP phone calls or video calls with an app like Zoom. Tor technology isn't necessarily built to provide seamless audio-video experiences.

Tor and plugins

Speaking of videos, there are also limits to the amount of privacy Tor can offer you if you enable certain browser media plugins like Flash. Likewise, your browser's JavaScript plug-in which enables you to view a lot of websites' embedded media can still leak your IP address information. Torrenting files with Tor also exposes you to privacy risks. Because of these risks, Tor's privacy settings have these kinds of plug-ins disabled by default. If you're just looking to do general, daily internet perusal using a browser that will better hide your traffic from spying eyes, Tor probably isn't the best choice due to its slow speeds and incompatibility with most embedded media. But if you're concerned enough about privacy around a particular topic of internet research (and you don't have a VPN), Tor is probably the best choice for you.
If you would like to read more helpful articles and tips about various software and hardware visit errortools.com daily.
Read More
Quick Fix Guide To Runtime Error r6034

What Is Runtime Error R6034?

Runtime Error r6034 is one of the most commonly occurring errors.  This error usually arises in Windows Vista and Windows 7. The message that appears to the user states ‘An application has made an attempt to load C runtime library incorrectly, please contact the support team for more information’. As the message suggests, this problematic error occurs simply because an application attempts to load the C runtime library without a manifest.

Solution

Restoro box imageError Causes

Runtime Error r6034 occurs when the system compiler fails to compile the working application. While this is the primary reason, there are some other conditions that trigger Runtime Error r6034 which are outlined below.
  • Existence of viruses and malware in the system.
  • Corrupt or missing system files.
  • Power outages.
  • Hardware problems.
  • Hardware driver problems.
There are several other reasons that may trigger Runtime Error r6034 that are beyond the scope of this article. Regardless of what triggers this error, it is crucial to ensure that it is fixed as soon as possible.

Further Information and Manual Repair

There are several ways to deal with Runtime Error r6034. However, one of the most effective ways is listed below as follows.
  • When this error occurs, restart your computer. Make sure you press F8 before the windows logo is displayed.
  • Choose safe mode and press enter.
  • Go to the ‘Start’ button and type ‘msconfig’ in the search box. Press enter.
  • The MSConfig program will now open.
  • Choose ‘Start up’ in the general tab and then click on the ‘Load Start Up’ item.
  • Click on the ‘Services’ tab. Now click ‘Hide all Microsoft Services’ and then choose ‘Disable All’.
  • Close the system configuration window.
  • Restart the computer.
After restarting your computer, you will notice that the Runtime Error r6034 has been removed. If this approach fails to deliver the desired results, it is advised to follow the steps listed below.
  • Go to the start button. In the search box, type ‘System Restore’.
  • When System Restore appears, click on it.
  • The system restore window will open. Make sure any process or application that’s open is now closed.
  • In the System Restore window, if a calendar list appears, it means the restore point is open. Now choose the point from where the error appeared and click Next.
  • This process may take some time. Your system will restart automatically and the Runtime Error r6034 will disappear.
Read More
Windows Update Keeps Turning Off in Windows
Keeping your system updated is a must and Windows updates are definitely a great way to do that. These updates are essential since they provide important security and various fixes for bugs in your Windows 10 computer. However, there are plenty of instances when you encounter issues with Windows Updates and one of them is when the Windows Updates turn off automatically at random times. Some users reported that they saw a notification about Windows Updates being turned off. Note that the issue is not with the update itself since many users turned on the Windows Update and the system was properly updated. The issue is that the Windows Updates turned off all by itself. There could be several reasons why the Windows Updates turned off by themselves. It could be due to the antivirus program installed on your computer. Antivirus programs are known to cause issues with other programs, Windows updates components included. This can occur due to false positives as well as odd compatibility issues. Aside from antivirus programs, the Windows Update service itself could also be the root cause of the problem. There could be a corrupted file in the Windows Update folder or it could be that the Windows Update service wasn’t started properly. Any of these issues can be resolved by following the troubleshooting options given below. Make sure to follow each one of them carefully for better results.

Option 1 – Try to disable your antivirus program

Disabling the antivirus program or any security software installed in your computer is always a good idea you can try when the Windows Update process does not go smoothly. So before you try updating your computer again, make sure to disable the antivirus or security program and once the Windows Update is done, don’t forget to enable the antivirus program back again.

Option 2 – Try to make some changes in the Registry

  • Tap the Wins key once and type in “command prompt” in the field.
  • From the search results, right-click on Command Prompt and select the “Run as administrator” option to run it with admin privileges.
  • Next, type the following command and tap Enter:
reg add "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionWindowsUpdateAuto Update" /v AUOptions /t REG_DWORD /d 0 /f
  • After that, type the following command and hit Enter again:
sc config wuauserv start= auto
 The command you entered will set the Windows Update to auto so you should be good to go.

Option 3 – Try to reset the Windows Update components

If by any chance that the second option didn’t work, resetting the Windows Update components could also help you resolve the problem. How? Refer to the following steps:
  • Open Command Prompt with admin privileges.
  • After that, type each one of the following commands and hit Enter after you key in one after the other.
    • net stop wuauserv
    • net stop cryptsvc
    • net stop bits
    • net stop msiserver
Note: The commands you entered will stop the Windows Update components such as Windows Update service, Cryptographic services, BITS, and MSI Installer.
  • After disabling WU components, you need to rename both the SoftwareDistribution and Catroot2 folders. To do that, type each one of the following commands below, and don’t forget to hit Enter after you type one command after the other.
    • ren C:WindowsSoftwareDistribution SoftwareDistribution.old
    • ren C:WindowsSystem32catroot2 Catroot2.old
  • Next, restart the services you’ve stopped by entering another series of commands. Don’t forget to hit Enter after you key in one command after the other.
    • net start wuauserv
    • net start cryptsvc
    • net start bits
    • net start msiserver
  • Close Command Prompt and reboot your PC.

Option 4 – Run the Windows Update Troubleshooter

Running the built-in Windows Update troubleshooter is one of the things you can first check out as it is known to automatically resolve any Windows Update errors. To run it, go to Settings and then select Troubleshoot from the options. From there, click on Windows Update and then click the “Run the troubleshooter” button. After that, follow the next on-screen instructions and you should be good to go.
Read More
How to know if you have keylogger in Windows
Hello and welcome everyone, today we will be talking about dreaded keyloggers, why they are dangerous, and how to know if you might have one in your system. Keylogger is a malicious application placed in your system and hidden with only one goal in mind, to get information about what are you typing and by that means for a person who infected you to get information about your credit card information or other sensitive data. They can be introduced into your systems in various ways and often can not be detected easily. Modern antivirus applications have ways of detecting them and removing but this tutorial aims to teach you how to spot them all by yourself since new keyloggers are produced daily and sometimes relying on antivirus alone is not enough. Unlike viruses and trojans, keyloggers are not heavy on system resources and you will not feel slow down on your computer if you have one which makes them harder to sport with regular work. Some of them can be even tracking you on the website and not even be physically present on your computer. Generally, we could categorize keylogger into 4 categories:
  1. Web browser-based keylogger. Some websites would have CSS scripts, input web forms, or so-called man in the middle keylogger. Lucky for us even Windows defenders with the latest update can detect this type of keylogger and successfully deal with it and how keylogger itself is not present on our system we are safe.
  2. General spyware keylogger. This keylogger is present in your system, usually, it infected it via email attachment, social media download, torrent download, some malicious so-called fixer application, etc. Most antivirus applications and windows defenders can detect these types as well and remove them successfully.
  3. Kernel-level keylogger. This keylogger is a more dangerous type they tend to operate underneath Windows as a rootkit and can go undetected by antivirus and windows defenders.
  4. Hypervisor-based keylogger. This is the most dangerous keylogger, they use virtualization techniques to hide and mask themselves as a replica of the operating system and they scan all keystrokes by the user. These are very rare keyloggers but they do exist.
If you suspect that you have a keylogger or just want to check your system for precaution reasons follow these tips and guides and luckily you will solve your issue in no time and your data will be safe.
  1. Use Task Manager to find suspicious entries.

    Task manager is a great application implemented in Windows that is constantly monitoring and showing all services, applications, and processes currently running on your system and thus a great tool to monitor your system if you know how to use it. First, open task manager by pressing CTRL + SHIFT + ESC Then take a good look into it, try to find suspicious names, probably duplicate of running application, something like Windows logon application, or keylog or anything similar which seems out of ordinary. If you manage to find a suspicious running application right-click on it and close it. Also while you are in task manager jump into the startup tab and check to see are there some unusual applications starting with your Windows, if you find anything, disable it right away. This is the most simple and quickest way to get some information right away if you suspect to have some simpler keylogger in your system.
  2. Use the command prompt to monitor your network.

    In order to check connections to your computer and find potential suspicious ones start the command prompt in administrator mode, press ⊞ Win + X, and choose command prompt (administrator). type in netstat -b and press ENTER. All website and application connections to your computer are now visible. ignore svchost, edge browser, windows store, etc ad check the IP of the remaining ones using the internet.
  3. Use keystroke encryption.

    Install encrypting software and even if you have a keylogger, the application will encrypt each stroke and all that attacker will get is gibberish
Please remember to always download files from trusted sources, do not open unknown emails, and do not share your information publicly. Take common protection steps in order to protect yourself in the digital world.
Read More
How to Fix Windows Store Error Code 0x80240017

Error Code 0x80240017 – What is it?

Error code 0x80240017 is associated with installing or updating a Windows Store app. This error is more common in Windows 8 and Windows 8.1. It appears due to missing certain system files and also corrupt registry.

Common symptoms

  • When you try to install a Windows Store app on a PC running Windows RT 8.1, Windows 8.1, or Windows Server 2012 R2, the installation fails and you receive an error message: 0x80240017
  • Certain apps may become unresponsive.
  • You may not be able to download apps or Windows update
  • You may have difficulty updating or installing and uninstalling other built-in programs inside Windows 8 and Windows 8.1.
  • When you have multiple applications running, you may experience crashes and freezes.

Solution

Restoro box imageError Causes

The error code 0x80240017 in Windows 8.1 or Windows 8 usually appears due to the fact that your system has changed after you installed a third-party application. It might also appear if registry entry has changed after a reboot of the operating system and you do not have the required permissions. Other causes may be due to:
  • Corrupted, broken, or missing system files.
  • Malware/spyware infection or virus attack
  • Hardware/RAM decline
  • Fragmented file
  • Unnecessary or redundant program installations

Further Information and Manual Repair

Repairing Error Code 0x80240017 in Windows 8/Windows 8.1

Method 1:

Resetting Windows Store app:
  1. Press and hold the Windows key and press R. This will open up the Run command
  2. Now, type exe and hit Enter
  3. Just wait for it to finish and it will re-launch Windows Store. Now, try and install the app you were trying to install which was previously showing an error.
This basic solution will delete the cache and reset Windows Store.

Method 2:

Using Windows troubleshooter:
  1. Click on Search on the Charm bar and type Troubleshooting. Click on the very first option.
  2. A new window will open. Click View all from the left pane.
  3. Scroll down to the bottom and click on Windows update.
  4. Troubleshooter window for Windows update will pop up. Click on NEXT. It may ask you for administrative permission.
  5. The troubleshooter will automatically detect problems and fix them.
  6. Now, close this window and try download/install the app which was previously showing an error.

Method 3:

Disable Proxy Settings: Disable proxy server on Internet Explorer
  1. Press the Windows + R Run window will appear.
  2. Type cpl and hit Enter
  3. Click the Connections tab and click LAN settings
  4. Under proxy server uncheck “Use a proxy server for your LAN”
  5. Click OK
Now try to install apps from Windows Store.

Method 4:

Boot in Safe Mode:
  1. Open Run command as previously described
  2. Type MSConfig
  3. Click on the Boot tab
  4. Tick Safe boot in Boot option
  5. Select Network
  6. Click Apply and OK
  7. Reboot your system
Your system will boot in Safe mode with Networking. You may now try and open Windows Store and should not see any errors.

Method 5:

Note: It is recommended that you back up your files and folders before attempting this step:
  1. Move the mouse cursor over to the upper right side of the screen.
  2. A menu will pop up on the left. Click on the “Settings” feature on the menu.
  3. On the Settings window, click on the “Change PC settings.”
  4. Now, left-click on the “Update and recovery” feature.
  5. For the next step, left-click on the “Recovery” feature.
  6. There is an option here saying “Refresh your PC without affecting your files.” There, left-click on the “Get started” button.
  7. Now, follow the instructions on the screen to finish the Refresh process.
  8. After the Refresh process has finished restart your Windows 8.1 or Windows 8 device.
  9. Check again to see if the error 0x80240017 has been fixed.
If you do not possess the technical expertise required to accomplish this yourself or do not feel comfortable doing so, download and install a powerful automated tool to get the job done.
Read More
How to personalize STEAM with custom skin
steam skinSkinning of applications is not new to PC users, but did you knew you could skin Steam? With skin, you can customize the UI and style of the client to what you want making it more personal and to your liking. First thing is to find the skin that you would like to install. There are a lot of sites where you could find custom made Steam skins but we would recommend steamskins.org The site itself is organized in tabs with different sections, once you click on the tab you will get a list of skins available for chosen section. If you click on the skin you will be taken to skin page detail where you can find what skin is aiming for, its legibility, a record of how the skin has been altered over time, or some mix of these aspects. Note that some skins might have issues like some buttons might be missing from big picture mode but so far none of the skins has any kind of client breaking feature, only functionality one.

Downloading skin

Once you have chosen desired skin and while on the skin details page, scroll to the middle of the page just above the Related Skins sections with two options: Direct Download and External Download. Now usually I would recommend Direct download but in this case, I would advise going with External Download for the simple reason that the External link will send you to the developer's website where there is a higher chance to get the latest updated skin.

Installing it in Steam

Once the skin is downloaded you will first need to create a skin folder inside your Steam installation location. Navigate to your Steam installation folder (default: C:\Program Files (x86)\Steam) and create a new folder inside it. Give new folder name Skins and confirm. Extract the skin zip file in the newly made folder. Once the file is extracted you can delete the ZIP file if you wish. Go to your Steam client and go to Steam>Settings. In settings select Interface on the left bar and on the right part then click the Select the skin you wish Steam to use the drop-down menu and select the skin that you wish to use. Confirm and restart your Steam client

Reverting to old skin

If you found skin unappealing or, unfortunately, has some functions missing you can always choose another skin or revert back to default Steam skin. Default Steam skin is named in the drop-down menu as < default skin >.
Read More
KFConsole enters the console competition
Yes, you read that right, KFC is making a console partnered with Cooler Master. Bizzare at it sounds, it is even more bizarre that the console is designed to keep your food warm!!! You can pull out the drawer from the console out on its top and place some food there in order to keep it warm. kfconsole drawerThe console itself is coming in cylindrical shape powered by Intel CPU and ASUS GPU of the unknown chipset. It has Seagate Baraccuda 1TB SSD and it is VR-ready. The console will have raytracing and will be 4K ready.

My thoughts

Well, my thoughts are somewhat strange, on one side I am not really sold on food heating gimmicks and without specific hardware specifications, it is difficult to say how much power the console will have. Price is also not leaked so that is also a stumbling stone for making an informed opinion. I am a little puzzled and concerned about this whole heating food thing because personally, I can see 2 issues: Console overheating and fat dripping on inside hardware, I am sure they have somehow eliminated this but I would be very interested to see how.
Read More
What happened to Facebook and why it is down?
Usually when online service is not working or when something goes wrong online it is DNS, well that is what most of the time is the case. And yes, DNS or Domain Name Server seems to be an issue with Facebook being completely down along with Instagram and wassap. facebook downThe true cause is that there is no working Border Gateway Protocol (BGP) routes into Facebook's sites. BGP is the standardized exterior gateway protocol used to exchange routing and reachability information between the internet top-level autonomous systems (AS). Most people, indeed most network administrators, never need to deal with BGP. Cloudflare VP Dane Knecht was the first to report the underlying BGP problem. This meant, as Kevin Beaumont, former Microsoft's Head of Security Operations Centre, tweeted, "By not having BGP announcements for your DNS name servers, DNS falls apart = nobody can find you on the internet. Same with WhatsApp btw. Facebook has basically de-platformed themselves from their own platform." Many people are very annoyed by this and with the fact that they cannot use their social media platforms but it seems that Facebook employees are in even bigger annoyance as it was reported that Facebook employees can't enter their buildings because their "smart" badges and doors were also disabled by this network failure. If true, Facebook's people literally can't enter the building to fix things. Reddit user u/ramenporn, who claimed to be a Facebook employee working on bringing the social network back from the dead, reported, before he deleted his account and his messages: "DNS for FB services has been affected and this is likely a symptom of the actual issue, and that's that BGP peering with Facebook peering routers has gone down, very likely due to a configuration change that went into effect shortly before the outages happened (started roughly 1540 UTC). There are people now trying to gain access to the peering routers to implement fixes, but the people with physical access is separate from the people with knowledge of how to actually authenticate to the systems and people who know what to actually do, so there is now a logistical challenge with getting all that knowledge unified. Part of this is also due to lower staffing in data centers due to pandemic measures." Ramenporn also stated that it wasn't an attack, but a mistaken configuration change made via a web interface. Both BGP and DNS are down, the "connection to the outside world is down, remote access to those tools don't exist anymore, so the emergency procedure is to gain physical access to the peering routers and do all the configuration locally." Technicians on site don't know how to do that and senior network administrators aren't on site. It seems that it will all be down for a couple of more hours before the issue is resolved.
Read More
Enable or Disable Automatic Encryption
You might be familiar with the Encryption File System or EFS algorithm if you rather keep your files and folders encrypted. Encryption File System is a built-in feature in Windows 10 which allows users to secure their important files. Although there is an alternative way for you to secure your data on your Windows 10 computer, you can’t ignore the fact that the main advantage of an Encryption File System over BitLocker is that the former can help you encrypt a particular folder rather than encrypting the whole hard drive partition. If you move a file inside a folder encrypted with the Encrypting File System it will automatically get encrypted. There are some users who like this feature but unsurprisingly, there are some that don’t. So if whether you want your files encrypted when you place them in an encrypted folder or if you want to keep it as it is, read on as to how you can do it either way. You can enable or disable automatic encryption of files moved to encrypted folders in Windows 10 using the Registry Editor or the Group Policy Editor. Before you proceed, make sure to create a System Restore Point first because the modifications you’re about to make in your computer might affect its overall functioning so if anything goes wrong, you can always undo the changes. Once you have that covered, refer to the options given below to enable or disable automatic encryption in Windows 10.

Option 1 – Enable or disable automatic encryption using Registry Editor

  • Press the Win key + R key at the same time to open the Run dialog box.
  • Then type “Regedit” in the field and press Enter to open the Registry Editor and if a User Account Control or UAC prompt appears, just click Yes to proceed.
  • After opening the Registry Editor, navigate to this key location: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorer
  • Next, right-click on Explorer and select New > DWORD (32-bit) Value and then name the newly create DWORD to “NoEncryptOnMove” and press Enter to save it.
  • After that, double click on the NoEncryptOnMove DWORD and set its value to the following preferences:
    • 1 – Disable Auto Encryption of files moved to encrypted folders.
    • 0 – Enable Auto Encryption of files moved to encrypted folders.
  • Now close the Registry Editor and restart your computer to successfully apply the changes made.

Option 2 – Enable or disable automatic encryption using the Group Policy Editor

  • Press the Win + R keys to open the Run box and type “gpedit.msc” in the field and press Enter to open the Group Policy Editor.
  • After that, navigate to this path: Computer ConfigurationAdministrative TemplatesSystem
  • Next, look for the “Do not automatically encrypt files moved to encrypted folders” option and double click on it to set the policy. From there, you will see the following description:
“This policy setting prevents File Explorer from encrypting files that are moved to an encrypted folder. If you enable this policy setting, File Explorer will not automatically encrypt files that are moved to an encrypted folder. If you disable or do not configure this policy setting, File Explorer automatically encrypts files that are moved to an encrypted folder. This setting applies only to files moved within a volume. When files are moved to other volumes, or if you create a new file in an encrypted folder, File Explorer encrypts those files automatically.”
  • Now select one of the radio buttons below depending on your preference:
    • Not Configured or Disabled: Enable Auto Encrypt of files moved to EFS Encrypted folders.
    • Enabled: Disable Auto Encrypt of files moved to EFS Encrypted folders.
  • Then click on the Apply and OK buttons to save the changes made.
  • Exit the Group Policy Editor and restart your computer.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status