Logo

Windows 10 Power Toys detailed guide

Hello and welcome everyone, today we will be talking about power toys, a great, completely free, open-source, Microsoft-supported Windows project which aims to provide Windows itself with powerful features not found natively in it.

We will explore power toys completely here and explain each module and its features.

The first thing is of course to download power toys themselves. You can find them here. After you download them, double click on the downloaded file and install. Start power toys, you will find them at the bottom of the taskbar, note that power toys need to be active in order to use their features.

power toysWhen opened you will be greeted with general settings window. These are settings for power toys themselves, Here you can check for updates, change the looks of power toys, run it on system startup and run them as administrator. Set them up so they best suit your needs.

Color Picker

Moving down next tab we have is Color picker.

power toys colorpicker hex editorThe color picker will let you as the name suggests pick colors, it will sample colors from running applications and windows, snap their values, and place them in the clipboard. A useful application if you are working as a graphic designer, want to create some cool word document, or just want to compare the difference between colors.

After the Color Picker is activated, hover your mouse cursor over the color you would like to copy and left-click the mouse button to select a color. If you want to see the area around your cursor in more detail, scroll up to zoom in. The copied color will be stored in your clipboard in the format that is configured in the settings (HEX by default). The editor lets you see the history of picked colors (up to 20) and copy their representation in any predefined string format. You can configure what color formats are visible in the editor, along with the order that they appear. This configuration can be found in PowerToys settings. The editor also allows you to fine-tune any picked color or get a new similar color. Editor previews different shades of currently selected color - 2 lighter and 2 darker ones. Clicking on any of those alternative color shades will add the selection to the history of picked colors (appears on the top of the colors history list). Color in the middle represents your currently selected color from the history of the colors. By clicking on it, the fine-tuning configuration control will appear, which will let you change the HUE or RGB values of the current color. Pressing OK will add newly configured color into the history of the colors.

Fancy Zones

Moving down, we have fancy zones.

power toys fancy zonesFancyZones is a window manager utility for arranging and snapping windows into efficient layouts to improve the speed of your workflow and restore layouts quickly. FancyZones allows the user to define a set of window locations for a desktop that are drag targets for windows. When the user drags a window into a zone, the window is resized and repositioned to fill that zone. When first launched, the zones editor presents a list of layouts that can be adjusted by how many windows are on the monitor. Choosing a layout shows a preview of that layout on the monitor. The selected layout is applied automatically.

File Explorer

Next, File Explorer.

power toys settings file explorerOnly 3 options here but maybe some are important to you. This extension lets you enable SVG file preview in File Explorer, enable Markdown preview, and enable SVG thumbnails. Turn on each one you might need.

Image Resize

Next down the line, we have Image resize.

power toys image resizeImage Resizer is a Windows shell extension for bulk image-resizing. After installing PowerToys, right-click on one or more selected image files in File Explorer, and then select Resize pictures from the menu. You can specify your own sizes if you want, you can resize when dragging files, you can overwrite files or make new copies of new sizes, and many more options. A very useful tool I am sure plenty of users can use since this eliminates the need for pictures or any other image application for common resizing tasks.

Keyboard Manager

The keyboard manager is the next tab in power toys.

power toys keyboard shortcutsThe PowerToys Keyboard Manager enables you to redefine keys on your keyboard. For example, you can exchange the letter A for the letter D on your keyboard. When you select the A key, a D will display. You can also exchange shortcut key combinations. For example, the shortcut key, Ctrl+C, will copy the text in Microsoft Word. With the PowerToys Keyboard Manager utility, you can exchange that shortcut for ⊞ Win+C). Now, ⊞ Win+C) will copy text. If you do not specify a targeted application in PowerToys Keyboard Manager, the shortcut exchange will be applied globally across Windows. PowerToys Keyboard Manager must be enabled (with PowerToys running in the background) for remapped keys and shortcuts to be applied. If PowerToys is not running, key remapping will no longer be applied.

Power Rename

Nex we have a very cool and powerful Power Rename

power toys power renamePowerRename is a bulk renaming tool that enables you to:

  • Modify the file names of a large number of files (without renaming all of the files with the same name).
  • Perform a search and replace on a targeted section of file names.
  • Perform a regular expression rename on multiple files.
  • Check expected rename results in a preview window before finalizing a bulk rename.
  • Undo a rename operation after it is completed.

Run Utility

Power Toys Run utility follows next.

power toys run warningPowerToys Run is a quick launcher for power users that contains some additional features without sacrificing performance.

PowerToys Run features include:

  • Search for applications, folders, or files
  • Search for running processes (previously known as WindowWalker)
  • Clickable buttons with keyboard shortcuts (such as Open as the administrator or Open containing folder)
  • Invoke Shell Plugin using > (for example, > Shell:startup will open the Windows startup folder)
  • Do a simple calculation using the calculator

Shortcut Guide

Last but not least we have a Shortcut guide.

power toys shortcut guide largeThis guide uses PowerToys to display common keyboard shortcuts that use the Windows ⊞ key. Windows key keyboard shortcuts can be used while the guide is being shown and the result of those shortcuts (active window moved, arrow shortcut behavior changes, etc) will be displayed in the guide. Releasing the Windows ⊞ key will make the overlay disappear. Tapping the Windows ⊞ key will display the Windows Start menu.

Hey, you made it till the end, thank you for reading and I hope to see you soon.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Tutorial for Removing RegCleanPro From Windows

RegClean Pro is a program developed by Systweak Inc. RegClean Pro cleans such invalid registry errors using its advanced scan engine. It not only fixes invalid registry entries, it also defragments the registry, keeping it streamlined for smoother system performance.

RegClean Pro defines auto-start registry entities that allow the program to run each time the system is restarted, it also adds various Scheduled tasks in Windows Task Manager in order to launch the application at various times. This application has been found bundled up with various other potentially unwanted applications, also several anti-virus programs have detected this application for optional removal.

About Potentially Unwanted Applications

What is a Potentially Unwanted Program (PUP)?

Have you ever detected an unwanted program on your computer system and pondered how it got there since you’re confident that you didn’t consciously download or never gave authorization to be installed? Potentially Unwanted Programs (PUP), also known as Potentially Unwanted Applications (PUA), are programs that you never wanted in the first place and sometimes come bundled with freeware software. Once installed, the majority of these applications can be hard to eliminate and become much more of a nuisance rather than a benefit. The term PUP was coined to outline this crapware as something other than malicious software. Similar to malicious software, PUPs cause problems when downloaded and placed on your PC, but what makes a PUP different is you grant consent to download it – the fact is very different – the software installation bundle actually tricks you into accepting the installation. No matter whether it is viewed as malware or otherwise, PUPs are nearly always harmful to a computer owner as they will bring on spyware, adware, keystroke logging, along with other nasty “crapware” features on the PC.

What do PUPs do on your PC, precisely?

PUPs come in many forms. Commonly, they will be seen in adware bundlers which are known to use aggressive and misleading advertising. Most bundlers install multiple adware applications from various vendors, each of which has its own EULA policy. Safebytes Anti-Malware totally eliminates this threat and safeguards the computer against unwanted programs or adware infection. They will also come in the form of web browser extension add-ons and toolbars. They may keep track of your online movements, redirect your search results to risky sites where spyware and adware can be downloaded, hijack your search page, and slow your web-browser down to a crawl. PUPs lie in the gray part of the software spectrum. Also in the large majority of the cases, people won’t be aware that they are installing an unwanted program. Even if the PUPs really aren’t inherently malicious, these software programs still do practically nothing good on your computer system – they will take valuable resources, slow your PC, weaken your computer security, making your PC more vulnerable to viruses.

How you can stop PUPs

• Read carefully before accepting the license agreement as it might have a clause about PUPs. • Do not accept standard, express, default, or any other installation settings which are recommended. Always select “custom” installation. • Install an advert blocker/pop-up blocker; Deploy anti-malware products like Safebytes Anti-Malware. These types of software programs could establish a wall between the computer and online criminals. • Be alert if you download and install freeware, open-source software, or shareware. Never install applications that seem suspicious or malicious. • Use official product websites for downloading software. Stay away from download portals altogether as most websites compel users to download the software using their own download manager, which is often bundled with some sort of unwanted programs.

Can't Install Safebytes Anti-malware due to the presence of Malware? Do This!

Practically all malware is bad, but certain types of malicious software do more damage to your computer or laptop than others. Some malware sits in between the computer and the internet connection and blocks a few or all websites which you want to check out. It might also prevent you from the installation of anything on your PC, particularly anti-virus programs. If you’re reading this article right now, you’ve perhaps recognized that virus infection is a reason for your blocked internet traffic. So what to do when you want to install an anti-malware application like Safebytes? There are a few actions you can take to circumvent this issue.

Download the software in Safe Mode with Networking

In Safe Mode, you are able to change Windows settings, uninstall or install some software, and remove hard-to-delete viruses and malware. If the virus is set to load immediately when the computer boots, switching to this mode may prevent it from doing so. To get into Safe Mode or Safe Mode with Networking, press the F8 key while the computer is booting up or run MSConfig and look for the “Safe Boot” options under the “Boot” tab. After you restart into Safe Mode with Networking, you can download, install, as well as update anti-malware software from there. Following installation, run the malware scanner to eliminate most standard infections.

Switch to an alternate web browser

Certain viruses might target vulnerabilities of a particular web browser that block the downloading process. If you seem to have a trojan attached to Internet Explorer, then switch to an alternate web browser with built-in security features, such as Chrome or Firefox, to download your preferred anti-malware program – Safebytes.

Install and run anti-malware from a USB drive

Another method is to download and transfer an anti-malware application from a clean PC to run a virus scan on the infected system. Follow these steps to run the antivirus on the infected computer. 1) On a clean PC, download and install Safebytes Anti-Malware. 2) Plug in the USB drive into the uninfected PC. 3) Double click on the downloaded file to open the installation wizard. 4) Choose a USB flash drive as the place when the wizard asks you where you wish to install the application. Follow activation instructions. 5) Remove the USB drive. You may now use this portable antivirus on the infected computer. 6) Double-click the antivirus software EXE file on the pen drive. 7) Run Full System Scan to identify and clean-up up all types of malware.

A Look at the Best Anti-Malware Program

These days, anti-malware software can protect your PC from different types of internet threats. But exactly how to decide on the right one among various malware protection application that is available out there? As you might be aware, there are numerous anti-malware companies and products for you to consider. Some are worth your money, but most aren’t. You have to purchase a product that has obtained a good reputation and detects not only viruses but other sorts of malware too. Amongst few good programs, SafeBytes Anti-Malware is the highly recommended program for the security-conscious end user. Safebytes is among the well-established computer solutions firms, which provide this all-inclusive anti-malware software program. With its cutting-edge technology, this application will let you eliminate several types of malware like computer viruses, trojans, PUPs, worms, adware, ransomware, and browser hijackers. SafeBytes has great features when compared to other anti-malware programs. The following are some of the features you will like in SafeBytes. Real-time Protection: Malware programs trying to enter the computer are identified and stopped as and when detected by the SafeBytes active protection shields. They are very efficient in screening and getting rid of various threats because they’re constantly revised with new updates and alerts. World-class AntiMalware Protection: This deep-cleaning anti-malware software goes much deeper than most anti-virus tools to clean out your computer. Its critically acclaimed virus engine locates and disables hard-to-remove malware that conceals deep within your personal computer. Internet Security: SafeBytes checks and gives a unique safety ranking to each and every site you visit and block access to web pages known to be phishing sites, thus protecting you against identity theft, or known to contain malware. Fast Scan: Safebytes Anti-Malware, with its advanced scanning engine, offers ultra-fast scanning which can immediately target any active on-line threat. Lightweight: This program is not “heavy” on your computer’s resources, so you will not notice any performance problems when SafeBytes is operating in the background. Premium Support: For any technical issues or product support, you can get 24/7 professional assistance via chat and email.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove RegCleanPro without the use of an automated tool, it may be possible to do so by removing the program from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. You will likely also want to reset your browser. To ensure the complete removal, manually check your hard drive and registry for all of the following and remove or reset the values accordingly. Please note that this is for advanced users only and may be difficult, with incorrect file removal causing additional PC errors. In addition, some malware is capable of replicating or preventing deletion. Doing this in Safe Mode is advised.

The following files, folders, and registry entries are created or modified by RegCleanPro

Files: File %APPDATASystweakRegClean ProVersion 6.1ExcludeList.rcp. File %APPDATASystweakRegClean ProVersion 6.1German_rcp.dat. File %APPDATASystweakRegClean ProVersion 6.1log_06-13-2013.log. File %APPDATASystweakRegClean ProVersion 6.1results.rcp. File %APPDATASystweakRegClean ProVersion 6.1TempHLList.rcp. File %COMMONDESKTOPRegClean Pro.lnk. File %COMMONPROGRAMSRegClean ProRegClean Pro entfernen.lnk. File %COMMONPROGRAMSRegClean ProRegClean Pro.lnk. File %COMMONPROGRAMSRegClean ProRegister RegClean Pro.lnk. File %PROGRAMFILESRegClean ProChinese_rcp.ini. File %PROGRAMFILESRegClean ProCleanSchedule.exe. File %PROGRAMFILESRegClean ProCloud_Backup_Setup.exe. File %PROGRAMFILESRegClean ProCloud_Backup_Setup_Intl.exe. File %PROGRAMFILESRegClean Proisxdl.dll. File %PROGRAMFILESRegClean ProRCPUninstall.exe. File %PROGRAMFILESRegClean ProRegCleanPro.dll. File %PROGRAMFILESRegClean ProRegCleanPro.exe. File %PROGRAMFILESRegClean Prosystweakasp.exe. File %PROGRAMFILESRegClean Proxmllite.dll. File %WINDIRTasksRegClean Pro_DEFAULT.job. File %WINDIRTasksRegClean Pro_UPDATES.job. Directory %APPDATASystweakRegClean ProVersion 6.1. Directory %APPDATASystweakRegClean Pro. Directory %COMMONPROGRAMSRegClean Pro. Directory %PROGRAMFILESRegClean Pro. Registry: Key Distromatic at HKEY_CURRENT_USERSoftware. Key Systweak at HKEY_CURRENT_USERSoftware. Key Systweak at HKEY_LOCAL_MACHINESOFTWARE.
Read More
How to Fix Windows Activation Error Code 0xc004f050

Error Code 0xc004f050 – What is it?

Error code 0xc004f050 refers to a problem with activating the Windows key. The problem appears when you try to activate a copy of Windows by using Windows Activation wizard. This happens when the system becomes unstable and critical system files start missing. Though Windows 10 is a free upgrade for Windows 7/Windows 8/Windows 8.1 users, the activation error is still an issue. If you already had Windows 7/Windows 8/Windows 8.1 activated and did an upgrade successfully, then there should be no problem. This Problem Occurs only when you do a clean install.

Symptoms

When you try to activate a copy of Windows Vista or Windows 7 by using the Windows Activation wizard, you receive an error similar to the one below:
An error has occurred Code: 0xC004F050 Description: The Software Licensing Service reported that the product key is invalid

Solution

Restoro box imageError Causes

  • This causes due to an invalid product key.
  • This problem may occur if the license validity interval has expired, or if the license is not signed correctly.
  • Error Code 0xc004f050 occurs when the system becomes unstable and critical system files start missing.
  • Improper way of installing, deletion of some very important system files, misconfigured system files, etc. may also cause this error.
  • When you do a clean install, it wipes everything from the Primary Drive and after the install, windows can't find the Hardware ID which is used to verify your license.
  • For Windows 7, Windows Server 2008, and Windows Vista-based computers, this error may occur if you have entered the key for a beta version of the operating system while using the released version of the operating system.

Further Information and Manual Repair

This error is not something that can be fixed in seconds but will require some time and technical knowledge.

Method 1:

Re-insert the product key by using the Change Product Key tool:
  1. Click Start, click Computer, and then click System properties on the toolbar.
  2. In the Windows activation section, click Change product key.
  3. If you are prompted for an administrator password, type the password or click Continue.
  4. In the Product key box, type the product key, and then click Next.
  5. Follow the steps in the Windows Activation Wizard to complete the activation process.

Method 2:

Activate Windows by using the automated telephone system:
  1. Click Start, and then click Computer.
  2. Click System properties on the toolbar, and then click Click here to activate Windows now in the Windows activation
  3. If you are prompted for an administrative password, type it and click Continue.
  4. Click Show me other ways to Activate.
  5. Click Use the automated phone system and follow the instructions.

Method 3:

  1. Clean install Windows 7/Windows 8/Windows 8.1 using the installation disk and activate your copy.
  2. Now, download all the updates to see the Windows 10 Upgrade notification or download Windows Media Creation Tool and use the option Upgrade this PC to get Windows 10 right away.
  3. Once the upgrade is done, check the Activation Status. It will be fully activated as it should be. The Error code 0xc004f050 should not appear anymore.
If you want to get rid of the old Windows installation folder, then use the Windows Media Creation Tool to create a Flash Drive. Clean Install Windows 10. Now, every time when it asks for a product key, skip it. After installation is complete, Windows will automatically identify and activate your Copy. NOTE: Clean Install will make Sure you cannot roll back to your previous Windows 7 or Windows 8. So do it only if you are confident of using Windows 10 from here on. To verify the Windows activation status, follow these steps:
  • Click the Start button, and then click Computer.
  • Click System properties on the toolbar, and then view the activation status in the Windows activation section.
Read More
How to Fix Windows 10 Error 0x80248014

Error Code 0x80248014 - What is it?

Error Code 0x80248014 is an error that is particularly associated with the Windows 10 operating system. It generally appears during the Windows Update process and can interrupt the update installation, causing it to fail.

Common symptoms include:

  • Inability to download, install, or run updates on the Windows 10 operating system
  • The vague message that appears when the error occurs
  • Inability to finalize purchases made from the Windows Store
  • Inability to run a check to see if updates need to be installed

The resolutions available for Error Code 0x80248014 include the use of the command prompt and delving into the settings for Windows. While most users should be able to navigate the resolution methods on their own if you do not feel comfortable undertaking these steps on your own or if you aren’t able to resolve the error fully using these methods, get in touch with a qualified Windows repair technician who is familiar with issues in Windows updates.

Solution

Restoro box imageError Causes

There are several common culprits that can make Error Code 0x80248014 appear on your Windows device. The most common ones include problems with your connections, interference on the server, or problems in the settings for the Windows Store itself from which the updates are downloaded.

If you believe that your error relates most specifically to the Windows Store, you may want to jump directly to method two in order to attempt to resolve the issue.

Further Information and Manual Repair

There are a number of ways that you can try to resolve Error Code 0x80248014 on your Windows 10 operating system. The first will attempt to reset the issue using the command prompt, while the second attempts to address the issues that are associated directly with the Windows Store.

If you do not feel comfortable taking the steps below, be sure to get in touch with a qualified Windows repair technician to assist you.

Here are the top two methods to resolve Error Code 0x80248014 on the Windows 10 operating system:

Method One:  Attempt to Resolve the Error Using the Command Prompt

To use this method, employ the following steps in order:

  • Step One: To begin, open up the Start menu and select the option for the Command Prompt, choosing to run it in Admin mode.
  • Step Two: Put in the commands below, hitting the Enter key after each one:
    • net stop WuAuServ
    • %windir%
  • Step Three: Open up the Windows folder on your local hard drive. Look for the folder labeled “SoftwareDistribution” and change the name to “SDold”.
  • Step Four: Go back into the Command Prompt as an administrator and enter this command:  “net start WuAuServ”.
  • Step Five: Attempt to run your check for Updates again.

You may want to reboot your computer after running the steps above to ensure that the changes that you’ve made are fully applied to your device.

Method Two:  Reset Your Windows Store Settings

In some cases, Error Code 0x80248014 can appear on a device when the settings for the Windows Store have been altered or cannot be successfully read by the machine in question. If you believe that this is the case on your machine, you can run a simple command to renew your Windows Store settings.

To attempt to reset your Windows Store settings, open up your search bar and type in the following phrase “wsreset.exe,” then hitting Enter. Running this command will reset your Windows Store settings to their defaults.

After you reset your Windows Store settings, it may be a good idea to reboot your computer to ensure that all changes have fully taken effect on your device. Once this has been done, you can open the Windows Store back up and try to download or install the programs that you were attempting to purchase when the error code occurred.

If you are still experiencing the effects on your Windows 10 operating system or if you have not been able to follow the steps above to completion, it may be time to get in touch with a qualified Windows repair technician to assist you with the error resolution process.

Method Three: Use An Automated Tool

If you wish to always have at your disposal a utility tool to fix these Windows 10 and other related issues when they do arise, download and install a powerful automated tool.

Read More
How to Obliterate PyLocky Ransomware

What is PyLocky ransomware? And how does it execute its attack?

PyLocky ransomware is a file-locking malware created in order to lock important files and demand ransom from victims in exchange for data recovery. This new ransomware uses the .lockymap extension in marking the files it encrypts. It starts to execute its attack by dropping the following malicious payload in the system:
Name: facture_4739149_08.26.2018.exe SHA256:8655f8599b0892d55efc13fea404b520858d01812251b1d25dcf0afb4684dce9 Size: 5.3 MB
After dropping its malicious payload, this crypto-malware connects the infected computer to a remote server where it downloads more malicious files and places them on system folders. It then applies a data gathering module used to gather data about the user and the computer. The malicious files that were downloaded earlier along with the data obtained are used for another module called stealth protection. This allows PyLocky ransomware to execute its attack without detection from any security or antivirus programs installed in the system. It also modifies some registry keys and entries in the Windows Registry such as:
  • HKEY_CURRENT_USERControl PanelDesktop
  • HKEY_USERS.DEFAULTControl PanelDesktop
  • HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun
  • HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunOnce
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce
Once all the modifications are carried out, PyLocky ransomware will begin encrypting its targeted files using a sophisticated encryption cipher. Following the encryption, it adds the .lockymap extension to each one of the encrypted files and releases a ransom note named “LOCKY-README.txt” which contains the following content:
“Please be advised: All your files, pictures document and data has been encrypted with Military Grade Encryption RSA ABS-256. Your information is not lost. But Encrypted. In order for you to restore your files, you have to purchase a Decrypter. Follow these steps to restore your files. 1* Download the Tor Browser. ( Just type in google “Download Tor“ 2‘ Browse to URL: http://4wcgqlckaazungm.onion/index.php 3* Purchase the Decryptor to restore your files. It is very simple. If you don’t believe that we can restore your files, then you can restore 1 file of image format for free. Be aware the time is ticking. Price will be doubled every 96 hours so use it wisely. Your unique ID : CAUTION: Please do not try to modify or delete any encrypted file as it will be hard to restore it. SUPPORT: You can contact support to help decrypt your files for you. Click on support at http://4wcgqlckaazungm.onion/index.php”

How does PyLocky ransomware spread over the web?

PyLocky ransomware spreads using malicious spam email campaigns. Creators of this threat embed an infected attachment to spam emails and send them using a spambot. Crooks may even use deceptive tactics to trick you into opening the malware-laden immediately which is something you must not do. Thus, before opening any emails, make sure that you’ve thoroughly checked them. To successfully obliterate PyLocky ransomware from your computer, refer to the removal guide laid out below.
  • Step 1: Launch the Task Manager by simply tapping Ctrl + Shift + Esc keys on your keyboard.
  • Step 2: Under the Task Manager, go to the Processes tab and look for the process named facture_4739149_08.26.2018.exe and any suspicious-looking process which takes up most of your CPU’s resources and is most likely related to PyLocky ransomware.
  • Step 3: After that, close the Task Manager.
  • Step 4: Tap Win + R, type in appwiz.cpl and click OK or tap Enter to open Control Panel’s list of installed programs.
  • Step 5: Under the list of installed programs, look for PyLocky ransomware or anything similar, and then uninstall it.
  • Step 6: Next, close the Control Panel and tap Win + E keys to launch File Explorer.
  • Step 7: Navigate to the following locations below and look for PyLocky ransomware’s malicious components such as facture_4739149_08.26.2018.exe and LOCKY-README.txt as well as other suspicious files, then delete all of them.
%TEMP% %WINDIR%System32Tasks %APPDATA%MicrosoftWindowsTemplates %USERPROFILE%Downloads %USERPROFILE%Desktop
  • Step 8: Close the File Explorer.
  • Step 9: Tap Win + R to open Run and then type in Regedit in the field and tap enter to pull up Windows Registry.
  • Step 10: Navigate to the following path:
HKEY_CURRENT_USERControl PanelDesktop HKEY_USERS.DEFAULTControl PanelDesktop HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunOnce HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce
  • Step 11: Delete the registry keys and sub-keys created by PyLocky ransomware.
  • Step 12: Close the Registry Editor and empty the Recycle Bin.
Try to recover your encrypted files using the Shadow Volume copies Restoring your encrypted files using Windows Previous Versions feature will only be effective if PyLocky ransomware hasn’t deleted the shadow copies of your files. But still, this is one of the best and free methods there is, so it’s definitely worth a shot. To restore the encrypted file, right-click on it and select Properties, a new window will pop up, then proceed to Previous Versions. It will load the file’s previous version before it was modified. After it loads, select any of the previous versions displayed on the list like the one in the illustration below. And then click the Restore button.
Read More
Ways to lose your Facebook account to hackers
Facebook graphicsToday most people have Facebook accounts where they keep in touch with friends and family. But large Facebook network of users is also very interesting to another party as well, hackers. There are many ways hackers can steal your data via direct hacks, trickery, and social engineering in order to get your credentials, emails, and many other things using them to wreak further havoc. Once a hacker has needed information it is very difficult to minimize impact and all of your information could be compromised from a list of friends to credit card numbers. Keep on reading to learn how can you protect yourself against these attacks and learn about common practices that hackers use in order to steal your data.

Stealing Facebook data via email

A couple of years ago there was a lot of talk about not opening suspicious emails. Well, it still holds today. The difference is that today’s fake emails have become very difficult to differentiate from official ones since hackers put the effort into creating them copying fonts and layout, making them identical to original ones. So if emails look and feel like original ones how do you know if it is fake? Very simple, you do not click anything in it. If Facebook or for that matter any company wants to contact you they will do via their platform. Clicking inside a hacker's email will lead you probably to a fake Facebook website replica where you will have to type in your username and password providing an attacker with your login credentials, etc. If you receive this kind of mail where there are threats about terminating an account, missing payments, etc. it is always the best thing to go directly to Facebook and see if you have any kind of notifications there. Do not trust any emails that ask for account information, request money, or threaten to suspend your account.

Phishing attacks

As stated previously if you click on the link inside fake mail it will probably lead you to a website replica of the original. Although hackers can pretty much copy all things from an original website like layout, fonts, colors, etc. There is one thing that he cannot, web address. Take a good look into your browser address bar to see if there is a typo or anything strange in the address of a website. Also, make sure to check for the secure icon in the web address before signing in.

Fake Facebook buttons

If by any chance and for whatever reason, you end up on a fake Facebook site be vary careful about like and other buttons since buttons themselves behave and act like links inside your browser. IF when you click on like you get a prompt to sign in, it is almost 100% that you ended up on a phishing fake website.

Password brute force attack

Having complex and long passwords is a must. If your Facebook password is 12345 there is a very high chance that if a hacker wants he can easily guess it via trying out the most used and simple passwords via simple guessing. To avoid being hacked just for having poor passwords try to think of something longer, combine letters and numerical characters, place special characters inside it or just simply as the best solution use a password manager and create passwords with it.

Password grab outside Facebook

If you use the same password for multiple accounts which is a big no-no and you should not do it then hackers can use passwords from other services and login into your Facebook in order to steal data. Avoid these situations by having different passwords for different accounts or use a password manager to keep everything in order.

Hacking via key logger

Some time ago we have made an article which explained in detail everything you need to know about key loggers here: https://errortools.com/windows/how-to-know-if-you-have-keylogger-in-windows/ Anyway, this is a more advanced hacking technique in order for hackers to steal your data and it includes placing malicious applications into your system that records your keystrokes and sends them directly to hackers. Since this is an application best protection against this type of attack is to have a security suite installed and active on your PC or device you use to go to Facebook.

Connecting and surfing on an unsecured network

Using no password and unsecured WI FI or any other type of network is risky at least. You can have all protection installed on your device and have a strong password but hackers also logged in to the same network can track all outgoing stuff going through mentioned network leaving you again exposed to attacks. It is better to connect to your mobile operator network than on free WI FI, at least there is some level of security in your operator network while free WI FI is completely unsecured. Getting a virtual private network or VPN is also one thing you could think about for protection since almost all VPN services will encrypt your data thus providing you with a security layer even on unsecured Wi-FI.

Conclusion

Hacking and stealing have come a long way from their infant stages and in today’s world when we use a lot of gadgets and have plenty of online presence taking some steps for security is a must. I hope that you have found anything here informational and helpful so you can avoid getting your data compromised.
Read More
How to remove CrazyForCrafts From Your PC

CrazyForCrafts is a Browser Extension from Mindspark Interactive. This Toolbar Extension allegedly offers users tons of DIY crafting guides and tricks, however all that it does is point you in the right direction. It links you back to some of the most popular DIY Crafting websites on the internet that you can find at any time by a simple search.

While this may look useful and faster than looking around the internet for good DIY projects, remember that this extension injects itself into your browser, changing your new tab page to Search.MyWay.com and records your browsing habits, can view your internet history, and know whatever you are looking for or viewing online.

While using this extension you will see additional pop-up ads, sponsored content, and injected ads throughout your browsing sessions.

Due to its behavior this extension has been marked for removal by several anti-virus scanners, and it is recommended to remove it from your computer to prevent data leaks.

About Browser Hijackers

Browser hijackers (sometimes called hijackware) are a type of malicious software that alters web browser configuration settings without the computer owner’s knowledge or permission. These hijacks appear to be increasing at an worrying rate around the world, and it can be really nefarious and sometimes dangerous too. They’re designed to disrupt browser functions for many different reasons. These are typically used to force visitors to a specific website, manipulating web-traffic to earn ad revenue. Although it might appear naive, all browser hijackers are damaging and therefore always classified as security threats. In a much worst case, your internet browser could be hijacked to download malware that will do a great deal of damage to your computer or laptop.

How one can know whether the browser is hijacked?

Symptoms that a web browser is hi-jacked include: the browser’s homepage is changed; new bookmarks pointing to pornographic sites have been added to your favorite pages; the essential web browser settings are modified and unwanted or insecure sites are added to the trusted websites listing; you are finding new toolbars you have never found before; you might see numerous pop-up ads on your computer screen; your browser has become unstable or starts running sluggishly; Inability to navigate to certain sites, especially antivirus as well as other computer security software websites.

How browser hijacker infects computers

Browser hijackers may use drive-by downloads or file-sharing websites or perhaps an e-mail attachment to reach a targeted PC. They also come from add-on software, also called browser helper objects (BHO), browser extensions, or toolbars. Also, certain freeware and shareware can put the hijacker in your PC through “bundling”. Examples of well-known browser hijackers are Fireball, CoolWebSearch. GoSave, Ask Toolbar, RocketTab, and Babylon Toolbar. The presence of any browser hijacker on your system might substantially diminish the web browsing experience, track your online activities that result in serious privacy concerns, develop system stability problems and eventually cause your computer to slow down or to an almost unusable condition.

How to remove a browser hijacker

Some hijackers can be easily removed by uninstalling the free software they were included with or by removing any extension you’ve recently added to your browser. But, most hijacking codes are certainly not very easy to get rid of manually, as they go much deeper into your operating system. You should consider performing manual repairs only if you’re a tech-savvy person, as potential risks are associated to tinkering with the system registry and HOSTS file. Browser hijackers could be effectively removed by installing anti-malware software on the affected system. SafeBytes Anti-Malware can counter relentless browser hijackers and provide you with proactive PC protection against all kinds of malware. In addition to anti-virus software, a system optimizer software, like Total System Care, will help you correct Windows registry errors, remove unwanted toolbars, secure online privacy, and stabilize software programs installed on your PC.

Virus Blocking Access To Safebytes Website And Anti-Malware Downloads - What You Should Do?

Malware can cause all kinds of damage once they invade your PC, ranging from stealing your private details to deleting files on your PC. Some malware is meant to interfere with or prevent things that you wish to do on your PC. It may well not allow you to download anything from the net or it will stop you from accessing a few or all internet sites, especially the anti-malware sites. If you’re reading this, odds are you’re stuck with a malware infection which is preventing you to download or install Safebytes Anti-Malware program on your system. Although this type of issue will be difficult to get around, there are a few steps you can take.

Get rid of malware in Safe Mode

The Windows-based PC has a special mode referred to as “Safe Mode” in which only the minimum required applications and services are loaded. In the event the malware is blocking access to the internet and affecting your computer, starting it in Safe Mode enables you to download antivirus and run a scan while limiting potential damage. To enter into Safe Mode or Safe Mode with Networking, press the F8 key while the computer is booting up or run MSCONFIG and locate the “Safe Boot” options under the “Boot” tab. As soon as you restart the PC into Safe Mode with Networking, you may download, install, as well as update anti-malware software from there. Following installation, run the malware scanner to eliminate standard infections.

Obtain the antivirus software using an alternate web browser

Malicious code could exploit vulnerabilities on a particular browser and block access to all anti-virus software websites. If you appear to have a virus attached to Internet Explorer, then switch over to a different browser with built-in safety features, such as Firefox or Chrome, to download your favorite anti-malware program – Safebytes.

Make a bootable USB anti-virus drive

Here’s yet another solution which is using a portable USB anti-malware software package that can check your computer for malicious software without needing installation. To run anti-malware using a USB drive, follow these simple steps: 1) Download the anti-malware on a virus-free PC. 2) Plug the Flash drive into the uninfected computer. 3) Double click on the exe file to run the installation wizard. 4) Choose the drive letter of the pen drive as the place when the wizard asks you where you would like to install the antivirus. Follow activation instructions. 5) Remove the pen drive. You can now utilize this portable anti-malware on the affected computer system. 6) Run the Safebytes Anti-malware directly from the pen drive by double-clicking the icon. 7) Click “Scan Now” to run a complete scan on the infected computer for malware.

Features of SafeBytes Anti-Malware

If you are planning to buy anti-malware for your computer system, there are lots of brands and packages for you to consider. A few of them are great, some are ok types, and some will destroy your computer themselves! You have to be careful not to select the wrong application, especially if you buy a paid software. Amongst few good applications, SafeBytes Anti-Malware is the highly recommended tool for security-conscious people. SafeBytes antimalware is a very effective and easy to use protection tool which is designed for end-users of all levels of computer literacy. With its cutting edge technology, this software will help you get rid of multiples types of malware which includes viruses, worms, PUPs, trojans, adware, ransomware and browser hijackers.

SafeBytes anti-malware takes PC protection to a whole new level with its enhanced features. A few of them are given as below:

Real-time Threat Response: SafeBytes offers complete and real-time security for your personal machine. This utility will constantly keep track of your PC for any suspicious activity and updates itself regularly to keep abreast of the latest threats. World-class AntiMalware Protection: Using its advanced and sophisticated algorithm, this malware elimination tool can identify and get rid of the malware threats hiding in your computer effectively. Web protection: SafeBytes checks the hyperlinks present on a web page for possible threats and alerts you if the website is safe to view or not, through its unique safety rating system. Lightweight: SafeBytes is lightweight software. It use up a very small amount of processing power as it works in the background so you’re free to use your Windows-based PC the way you would like. 24/7 Support: You can get totally free 24/7 technical assistance from their computer experts on any product queries or computer security issues. Overall, SafeBytes Anti-Malware is a solid program since it has plenty of features and could detect and remove any potential threats. Now you may realize that this tool does more than just scan and delete threats from your PC. For the best protection and the best value for money, you can’t get better than SafeBytes Anti-Malware.

Technical Details and Manual Removal (Advanced Users)

To get rid of CrazyForCrafts manually, navigate to the Add/Remove programs list in the Control Panel and choose the offending program you want to get rid of. For web browser plug-ins, go to your web browser’s Addon/Extension manager and select the plug-in you want to remove or disable. It is also suggested to reset your browser to its default condition to fix corrupt settings. If you choose to manually delete the system files and registry entries, use the following checklist to make sure you know exactly what files to remove before undertaking any actions. Please keep in mind that this is for skilled users only and might be challenging, with incorrect file removal leading to additional system errors. Additionally, certain malicious programs have the capability to defend against its deletion. Completing this task in Safe Mode is advised.
Registry: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWpm HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain Default_Page_URL HKEY_LOCAL_Machine\Software\Classes\[adware name] HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run .exe HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\random HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\run\random HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings CertificateRevocation = 0
Read More
Network License NotAvailable15.570.0 Autodesk
If when trying to start Autodesk applications you receive a Network license not available error then please keep on reading, this guide is for you:

Causes of the error:

  • The license on the License Server is invalid.
  • The port for Autodesk Network License Manager is blocked.
  • The client computer is configured with incorrect license server information.
  • The license request is timing out on the client's computer before the license is obtained.

Solutions for the error:


Verify that the Autodesk License Server is setup with the correct license file.

To set up a license server for Windows, perform the following:

  1. Download and install the Network License Manager for Windows:
  2. Open LMTools and access the System Settings tab. Make a note of the "hostname" and "ethernet address" of the license server.
  3. Generate a Network License File in Autodesk Account.
  4. On the Service/License tab, select Configuration Using Services and LMTOOLS ignores license file path environment variables.
  5. On the Config Services tab, enter a name for the new service in the Service Name field.
  6. Fill the following fields, using the Browse buttons:
    • Path to the lmgrd.exe - Navigate to this file: C:\Autodesk\Network License Manager.
    • Path to the License file - Navigate to the new Autodesk.lic file, typically placed in: C:\Autodesk\Network License Manager\Licenses.
    • Path to the Debug Log file: C:\Autodesk\Network License Manager.
    • If no file is present, create a TXT file in Notepad and rename it “Debug.log.”
  7. Make sure the "Start Server at Power Up" and the "Use Services" boxes are checked. Then click Save Services.
  8. On the Start/Stop/Reread tab, click Start Server.
  9. On the Server Status tab, click Perform Status Enquiry.
  10. Licenses should display as active.

How to set up the Autodesk Network License Manager on a Mac.

Note: The Autodesk License Server Manager (version 11.16.2.0) is supported only on the following Mac operating systems:
  • Apple macOS High Sierra 10.13
  • Apple macOS Sierra 10.12
  • Apple Mac OS X El Capitan 10.11
  1. Download Autodesk Network License Manager version 11.16.2.0 for Mac
    • ​​Download the nlm11.16.2.0_ipv4_ipv6_mac_universal.tar.gz file to the Desktop.
  2. To install the Autodesk Network License Manager:
    • Double click on nlm11.16.2.0_ipv4_ipv6_mac_universal.tar.gz to unpack the installer package.
    • After unpacking nlm11.16.2.0_ipv4_ipv6_mac_universal.pkg, will be /Downloads/adlm/FLEXnet folder.
    • Double click on nlm11.16.2.0_ipv4_ipv6_mac_universal.pkg to start installation and follow the installation wizard.
    • The license server will be installed in /usr/local/flexnetserver/ directory.
  3. Change permissions for /usr/local/flexnetserver/ directory to 777
  • Open Terminal (located in /Applications/Utilities/Terminal) and enter the following command:
sudo chmod -R 777 /usr/local/flexnetserver
  • Note: Administrator password may be asked. While typing no characters are shown, just type out the password and hit return key.
  • Note: To start the license server only with elevated permissions (using sudo command), change permissions to 755 instead of 777.
  1. Create /usr/local/flexnetserver/licenses directory for network license file location
sudo mkdir /usr/local/flexnetserver/licenses
  1. Find the license server Host Name and Host ID.
  2. Generate the Network License File in the Autodesk Account
    • Once the license file is generated, make sure it has a .lic extension (e.g. adsk_license.lic) and is in a plain text format and place it in /usr/local/flexnetserver/licenses directory
Note: In this article we will refer to  adsk_license.lic as network license file name. Feel free to change the actual name of the license file, but make sure to reflect the new name when using the commands below.
  1. Create a debug.log file in the /usr/local/flexnetserver/ directory using the following command:
touch debug.log
  1. To start the Network License Server use the following command:
/usr/local/flexnetserver/lmgrd -c /usr/local/flexnetserver/licenses/adsk_license.lic -l /usr/local/flexnetserver/debug.log
Note: If folder permissions for  /usr/local/flexnetserver/ are set to  775, then use sudo command to start the server. For example:
sudo /usr/local/flexnetserver/lmgrd -c /usr/local/flexnetserver/licenses/adsk_license.lic -l /usr/local/flexnetserver/debug.log
  1. To obtain license server status enquiry:
/usr/local/flexnetserver/lmutil lmstat -a -c /usr/local/flexnetserver/licenses/adsk_license.lic
  1. To stop the license server:
/usr/local/flexnetserver/lmutil lmdown -q -force
  • A​​lternatively, run ps command to obtain process ids for lmgrd and adskflex and then kill those processes:
ps -ax | grep lmgrd
ps -ax | grep adskflex
kill -9
  • (provide process ids obtained by previous commands individually)

How to set up the Autodesk Network License Manager on Linux.

Note: The Autodesk License Manager (11.16.2.0) is supported only on the following Linux distros:
  • Red Hat® Enterprise Linux® 7
  • Red Hat Enterprise Linux 6
  • SUSE Linux Enterprise 12
  • SUSE Linux Enterprise 11
To configure the license manager use the following steps:
  1. Download Autodesk Network License Manager v. 11.16.2 for Linux from this link
    • ​​Download the nlm11.16.2.0_ipv4_ipv6_linux64.tar.gz file to your desktop.
  2. To install the Autodesk Network License Manager run following command as root.
    • tar –zxvf nlm11.16.2.0_ipv4_ipv6_linux64.tar.gz
    • rpm -vhi nlm11.16.2.0_ipv4_ipv6_linux64.rpm
    • The license server will be installed in /opt/flexnetserver/ directory.
  3. Find the license server Host Name and Host ID
  • To obtain the license server system hostid run the following command
/opt/flexnetserver/lmutil lmhostid From the command output note the hostid in quotes, if the system has two active NIC cards, select the first MAC address. lmutil - Copyright (c) 1989-2018 Flexera. All Rights Reserved. The FlexNet host ID of this machine is "000c297949e0"
  • To obtain the license server system hostname run the following command
/opt/flexnetserver/lmutil lmhostid hostname From the command output note the hostname of the license server. mutil - Copyright (c) 1989-2018 Flexera. All Rights Reserved. The FlexNet host ID of this machine is "HOSTNAME=Centos7.localdomain"
  1. Generate your Network License File in Autodesk Account
    • Once the license file is generated, make sure it has .lic extension (e.g. adsk_license.lic) and place it in /opt/flexnetserver/licenses directory.  If the directory doesn't exits, create it with this command: sudo mkdir /opt/flexnetserver/licenses
Note: in this article we will refer by adsk_license.lic your network license file name.
  1. To start the Network License Server
    • /opt/flexnetserver/lmgrd -c /opt/flexnetserver/licenses/adsk_license.lic -l /opt/flexnetserver/server_log.log
  2. To obtain license server status enquiry
    • /opt/flexnetserver/lmutil lmstat -a -c /opt/flexnetserver/licenses/adsk_license.lic
  3. To stop your license server service
    • /opt/flexnetserver/lmutil lmdown -q -force
    • alternatively you can also run ps command to obtain process ids for lmgrd and adskflex and then kill those processes
      • ps -aw | grep lmgrd
      • ps -aw | grep adskflex
      • kill -9 (provide process ids obtained by previous commands individually)
  4. To start the license server automatically after the system reboot
    • Open /etc/rc.d/rc.local script as root and enter license server start up command in it.
touch /var/lock/subsys/local /opt/flexnetserver/lmgrd -c /opt/flexnetserver/licenses/adsk_license.lic -l /opt/flexnetserver/server_log.logNote: To ensure that the script will be executed during boot, run following command as root. chmod +x /etc/rc.d/rc.local
  1. Make sure that all necessary ports are open:
  • lmgrd.exe needs ports 27000 to 27009.
  • adskflex.exe needs port 2080.
Note: Errors may occur if the network license file is corrupt or in the case of a combined network license it has incorrectly combined licenses. To learn more about combining licenses, see Combining License Files for Multiple Autodesk Products. Use the License File Parser to verify that the license contains the appropriate products and FLEXnet feature codes and does not display an error

Verify that TCP ports (2080, 27000-27009) used by Autodesk Network License Manager are not blocked by Firewall.

The FLEXlm® based version uses the following incoming ports:
  • TCP ports 2080 (for the adskflex vendor daemon)
  • TCP ports 27000 to 27009 (for the lmgrd master daemon, which uses the first open port in the range)
Note: If these port addresses are restricted by a router or firewall software, users on the remote side of the router will not have access to licenses controlled by the Network License Manager.

Verify that the client computer is configured with the correct license server name or IP.

Windows:

Clear license server information from the system registry.

  1. Type regedit in the Windows Search box and hit Enter key.
  2. Select the following registry key
  • [HKEY_CURRENT_USER\SOFTWARE\FLEXlm License Manager]
  1. As the key is selected, in right panel ADSKFLEX_LICENSE_FILE will be visible.
  2. Right click on the key and delete it.

Specify the license server in ADSKFLEX_LICENSE_FILE system variable 

  1. Go to Start > Control Panel > System and Security > System.
  2. Select Advanced system settings.
  3. On the System Properties dialog, click Environment Variables.
  4. Under System Variables, click New.
  5. Enter ADSKFLEX_LICENSE_FILE for the variable name and 2080@SERVER_NAME _OR _IP for the variable value.
Note: the license server information most often is recorded in LICPATH.lic file and can be verified there too.  ADSKFLEX_LICENSE_FILE system variable supersedes LICPATH.lic.  Thus, setting the system variable is preferable when this error is seen.

If the license server is on a VPN or a remote network set the FLEXLM_TIMEOUT environment variable:

  1. Go to Start > Control Panel > System and Security > System.
  2. Select Advanced system settings.
  3. On the System Properties dialog, click Environment Variables.
  4. Under System Variables, click New.
  5. Enter FLEXLM_TIMEOUT for the variable name and 5000000 for the variable value.
  6. Click OK to save the setting.
Note: if needed the variable value can be increased to 10000000.

Mac/Linux:

Specify the Autodesk Network License server information in $HOME/.flexlmrc file.

Use a text editor to create a flexlmrc.txt file and save it in Plain text format (In TextEdit on Mac: Format - Make Plain Text) on desktop. The file content should look like this, except with the name or IP address of the license server.
  • ADSKFLEX_LICENSE_FILE=@SERVER_NAME _OR _IP
If the license server is on the same machine as the Autodesk software, use localhost as the license server name.  Thus, the content of flexlmrc file could look like this:
  • ADSKFLEX_LICENSE_FILE=@localhost
Note: On firewall restricted network or when accessing the license server via VPN, need to include TCP port/s (usually 27000 or 2080) into Autodesk License Server service as follows: ADSKFLEX_LICENSE_FILE=2080@SERVER_NAME _OR _IP

Once flexlmrc file is created move it to user's $HOME folder as follows:

  1. Open a Terminal window
  2. Type open ~ (Mac) or nautilus ~ (Linux) to open $HOME folder
  3. Drag and drop flexlmrc.txt file from Desktop to the home folder.
  4. To make the file a configuration file, rename it to .flexlmrc (please note . [DOT] in front of the file name) by running the following command:
  • mv flexlmrc.txt .flexlmrc (Mac)
  • mv flexlmrc .flexlmrc (Linux)

Verify that the license server information registered with the product is correct (versions 2020 and later only)

In versions 2020 and later, the license server information is registered with the AdskLicensing service running locally on the workstation. When changing to a new license server, the old server information may still be registered with AdskLicensing and result in the error above, if this is not appropriately updated. See the below steps to solve this:
  1. Click the Start menu and type cmd.
  2. Right-click on the Command prompt and choose "Run As Administrator."
  3. In the Command prompt, run the following command, followed by ENTER:

"C:\Program Files (x86)\Common Files\Autodesk Shared\AdskLicensing\Current\helper\AdskLicensingInstHelper.exe" change -pk PRODKEY -pv VER.0.0.F -lm "" -ls "" -lt""

Note:

  • Replace PRODKEY with the product key correspondent to your product(s). See Look Up Product Keys for the full list.
  • Replace VER with the version you are using. E.g. 2020 for AutoCAD 2020.
  • Repeat this step for each software you need to reset.
  1. Open Registry Editor (Start > type regedit > ENTER).
  2. Navigate to HKEY_CURRENT_USER\Software\FLEXlm License Manager.
  3. On the right-side, verify of the ADSKFLEX_LICENSE_FILE key exists. If yes, remove it (right-click > Delete).
  4. Run the software again.
  5. Select Multi-user in the Let's Get Started screen.
  6. Follow the steps to connect to your license server.
Read More
Microsoft project Volterra

Microsoft will soon offer 4 CPU computer specifically aimed at developers and its name is Volterra. The machine as stated will come with 4 processors but the strange thing is that they will be ARM-based instead of x86.

CEO of Microsoft, mister Satya Nadella has introduced the product and Microsoft has released a youtube video promoting it.

https://youtu.be/yICVNta8jMU

The computer system will have Qualcomm's NPU or built-in neural processing unit to use AI's power to help developers write and produce better and faster code. The sad news is that besides processors used there is no other information on other components that will go into this system.

As seen in the video, the computer reminds me a lot of the apple MAC mini with its size and design, and as stated it is made from recycled plastic which in our opinion will bring the price under $1000.

Microsoft has not provided an official price tag for Volterra, but our hope is that it will be more affordable than building your own development PC. Also, there was nothing said about computer availability, we suspect that the selling model will be typical Microsoft one with first models available only in the USA and moving forward slowly opening it to other markets.

Volterra specifications

As previously said nothing except the number of CPUs and their type has been officially said but we managed to get some information about some other specific things not including its inside components.

microsoft volterra

The unit will have a fan inside of it for cooling purposes and better performance and that is what was officially stated by Microsoft. On the outside, it is known that the computer will have three USB-A ports, a mini DisplayPort, and an ethernet input. All of these will be positioned on the back of the device, on its left side there will be two USB-C ports.

The unit itself will be running on Windows 11 but it was not disclosed anything about the version, we presume since this is a model aimed for professional use that it will come with Windows 11 PRO version.

Currently available tools for ARM

Since this product is aimed at developers logically support for developing software is a must-have and at the time of this writing software that will come and that will run on Volterra is:

  • Visual Studio 2022
  • Visual Studio Code
  • Visual C++
  • Modern .NET 6 & JAVA
  • Classic .NET
  • Windows Terminal
  • Windows Subsystem for Android
  • Windows Subsystem for Linux

Conclusion

Once MAC studio has been released it showed that specific builds have their audience and can be sold for less of a price than full-fledged custom-made workstations. There is no doubt that Microsoft Volterra will find its audience but will that be enough to have more versions of this compact computer only time will tell.

Read More
A Quick Guide to Resolving Error 1512

Error 1512 - What is it?

Error 1512 is a type of runtime error code. This error may hamper your ability to run and load your desired programs on Windows PC. There are increased chances of runtime error 1512 occurring when system files go missing or get corrupt. Symptoms of this error code include:
  • Slow PC speed
  • Window System freeze

Solution

Restoro box imageError Causes

There are several for the occurrence of runtime error 1512. These include:
  • Faulty or outdated drivers
  • Poor Program installation
  • Damaged Windows Registry
  • Viruses tampering the system settings/memory
  • Broken or incorrect Registry entries
  • Damaged Windows registry

Further Information and Manual Repair

To resolve this issue you don’t have to hire a professional and spend hundreds of dollars to get it fixed. Here are some of the best and easy do-it-yourself methods to repair error 1512 on your system in a few minutes. These methods are very easy to work around and do not require any kind of technical expertise.

Method 1 - Uninstall and then reinstall the Same Program

Sometimes this runtime error may pop up due to poor program installation. In such an event, it is advisable to uninstall the program and then reinstall it again properly. To do so, go to the start menu, and click on control panel. Now select the program & features option. Here you will find the option Add/Remove Program. Remove the program causing error 1512. Once the program is removed, reinstall it again.

Method 2 - Run an Antivirus Program

Computer viruses are capable of tampering with system settings. Due to this reason you might experience runtime errors like 1512 on your PC. These malicious programs usually enter the system through phishing emails or website downloads. To resolve the issue, you need to run a powerful antivirus program. An antivirus removes all sorts of malicious programs hiding in your PC like malware, spyware, and malware that are responsible for generating runtime errors.

Method 3 - Update the Outdated Drivers on your PC

If the error still persists, then it is suggested to update outdated drivers. Faulty and outdated drivers can also trigger runtime error 1512. To do this, go to the Device Manager. Here use the Driver update wizard to make updates.

Method 4 - Remove the Invalid Registry Entries and Repair the Damaged Registry

The best way to perform both tasks is to download Restoro. It is embedded with a registry cleaner that is quite easy to use. The registry cleaner removes all invalid entries in seconds, cleans the cluttered registry by wiping out all the redundant and unnecessary files. The damaged registry is then repaired and resumes its normal function. Click here to download Restoro and resolve runtime error 1512.
Read More
How to Fix Windows 10 Error Code 0xc004c008

Error Code 0xc004c008 - What is it?

This specific Windows 8.1 or Windows 10 error code has to do with the number of times you can use your license number to install windows programs on computers. All windows activation codes are licensed to be used one time for a device, to control piracy, but what happens when your PC crashes, or you have to change a hard drive component and are forced to re-install Windows Operating System. Luckily, there is an easy fix for this issue.

Solution

Restoro box imageError Causes

Basically, when you need to re-install the Windows operating system that you have previously bought and installed on another computer an error code will be displayed with a message telling you that the activation server determined that the specific key could not be used for activation. This occurs because the key has already been used on that computer, or a different one, to install operating systems. There are a few easy fixes for this issue, and most of them should be easily completed on your own.

Further Information and Manual Repair

There aren’t many explanatory ways to repair Error Code 0xc004c008. Below are two methods to go about addressing this issue.

Methods 1:

  1. The first step is to open the “Run” Window. You can do this in two ways. First, press the “Window” key and press the “R” key simultaneously. This will open the “Run” menu. Or you can start the “run” window by going to the Start menu and selecting Run.
  2. In the Run window type “SLUI 4” and click enter.
  3. A Phone Activation window will open up, after which you'll need to select a few options.
  4. First chose the country in which you registered the product for the first time.
  5. Choose your country and a phone number will be displayed specific to your choice. You will now need to call the number provided.
  6. After you’ve dialed you will be prompted to write your “Installation ID”. Type your “Installation ID” on the phone.
  7. After that step, you will be asked how many copies of Windows have been installed using this license. Choose “1”, should anything else be chosen but “1”, this will not work.
  8. After the process is completed, you will be given a confirmation ID and should be able to proceed as normal with installation. You will have a workable product key again.
  9. Install whatever copy of the Windows Operating System you are attempting to with the new product key.

Method 2:

If the first method did not work, the only other option is to call Microsoft and walk through the process with a technician. To do this, dial “1-800-936-5700”. Explain the error that you received and the steps in the update process during which it was displayed. The technician will be able to walk through the steps from getting a new product key to finishing the installation.

If you're not a tech-savvy individual but would like to solve this problem without the aid of a technician, download a powerful automated tool to fix error code 0xc004c008.

Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status