Logo

OOOOPS it seems that this page does not exist :(

Instead of feeling bad why don't you try our automated software ...
... or check some of our articles and tutorials.
How to Fix Error Code 0x8007232B

Error Code 0x8007232B (Code 0x8007232B) – What is it?

Error code 0x8007232B (Code 0x8007232B) is an error that occurs when you attempt to activate Windows Server 2008 or Windows Vista.

Common symptoms include:

  • Attempting to activate Windows 7, Windows 8, or Windows Server 2012 and you receive an error message.
  • The error message says: “Windows could not be activated. Key management services host could not be located in domain name system, please have your system administrator verify that a KMS is published correctly in DNS”
  • The error message says “The directory name, file name, or volume label syntax is incorrect”.

Error Causes

  • Error Code 0x8007232B occurs when you attempt to use media that is volume licensed to install: Windows 8, Windows 7, Windows Vista Enterprise, Windows Vista Business, Windows Server 2012, Windows Server 2008, Windows Server 2008 R2.
  • This error code also occurs when the activation wizard is unable to connect to a Key Management Service host computer.

Further Information and Manual Repair

Error code 0x8007232B can be seen when you are trying to activate windows, on several different operating systems. This problem can usually be easily corrected, but in the event that it can't, please contact a computer repair technician. When you try to install any of the previously mentioned Windows products, they use a generic product key to install the volume-based license software. If you do have a KMS host computer configuration and see these error codes, that means the correct DNS entries are not being seen on the computer. If there is not a KMS host computer setup, you need to do this setup, otherwise switch to a MAK product key method, and activate the volume license installation that way.

Method One:

Using a Multiple Activation Key as opposed to KMS activation

  1. Click the Start icon, click on All Programs, click on Accessories, right-click on Command prompt.
  2. Click on “Run as administrator”. Type in the password or provide confirmation if prompted for administrator password or confirmation.
  3. When asked for the command prompt, enter in the following and then hit the Enter buuton: slmgr -ipk xxxxx-xxxxx-xxxxx-xxxxx-xxxxx  Note: this placeholder represents the MAK product key.

Method Two:

Configure a KMS host server for the clients to activate against.

A KMS host server needs to be configured for the clients to activate against. When there are no KMS host servers configured near you, install and activate a KMS server key. After this, configure a computer on the network to host this KMS software and publish the Domain Name System (DNS) settings.

Method Three:

When the client cannot locate a KMS host on the network for activation:

1. Verify that your computer has the KMS host installed and activated by using a KMS key that is registered in DNS. You will follow these steps to do that:

  1. Click the Start button, click on All Programs, click Accessories, and then right-click on Command Prompt.
  2. Click on Run as Administrator. Type the password or provide confirmation if you are asked for an administrator password or for confirmation.
  3. In the command prompt box, type the following command and press ENTER: nslookup -type=all _vlmcs.tcp>kms.txt
  4. Then open the KMS.txt file generated by this command. The file will contain at least one entry that relays the SRV service location.

2.  A KMS host server registers a DNS SRV record once every 24 hours by default. You should check the registry to see if the KMS host server is registering with the DNS. Follow these steps to do so:

  1. Click on Start, type in regedit, and then press Enter.
  2. Locate HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsNTCurrentVersionSL and then click on it.
  3. The KMS server does not register in DNS if the DisableDnsPublishing subkey is existing and has a value of 1. If this subkey is missing altogether, create a DWORD value called the DisableDnsPublishing. If the dynamic registration is suitable, the subkey value should be changed to 0. Right-click DisableDnsPublishing, click on Modify, enter 0 into the Value data box, and click OK.
Read More
Coller Master HAF 700 evo

The New and upcoming HAF 700 Evo from Coller master is a beast of a case, but so is its price. The case itself is still not released but as sources say it will be soon, well at least we hope so. The price will be around $500 which is a little on the expensive side of things but the features it is bringing are very impressive.

cooler mster haf 700 evo

HAF 700 EVO Size and its advantages

HAF stands for High Airflow and with this case, you are going to get it but first let us talk about other characteristics of the case. Firstly case is ATX full tower, pretty big going 24.64 x 11.45. x 26.22 inches in size but like all full tower cases it can hold all motherboard types including Mini-ITX, Micro-ATX, ATX, E-ATX. The large case size also lets you place a pretty big GPU, going to 19.29 inches (490 mm) in its length covering currently all available Graphic cards on market.

Being a very big computer case is not just placing motherboard and big GPU, there are other great advantages of it, firstly that you can go wild with your CPU cooler, going all the way to 6.5 inches in cooler height will satisfy all users and having 12x 2.5 or 3.5-inch internal bays will. And if even that is not enough you have 8 expansion slots available.

Inside HAF 700 EVO

haf 700 evo inside

Inside the casing you will also find 2 front fans with 200mm diameter, 2 rear fans sized 120mm, and 1 bottom fan of 120mm. You can also manually mount standard 120mm fans on top of the case for maximum airflow.

Front panel and outsides

The front side is filled with 4x USB 3.2 Gen 1 Type-A (5 Gbps), 1X USB Type-C (up to 10Gbps), 3.5mm both headphone and audio jack along with a reset switch. Also, the circle in the very front is a hi-resolution LCD customizable display, you know, just to add more flavor and personal touch to the case. Fron is also filled with glass panels emitting RGB light.

Of course, you must also have a Tempered Glass Side Panel and well weight of 53.57 pounds (24.3 kg), yup you read that correctly, beside its hefty price tag this cooler master beast also is pretty heavy. Granted all of the weight comes from the glass front panel it is still a little hard on moving and taking out of the box.

This is also the case where you will not need a single screwdriver, everything is made to be assembled with your hands alone pushing easy assembly into the front row.

Conclusion

So in the end what are my thoughts about this expensive and heavy PC case? Would I recommend it? The answer to that question could depend really on your budget, let us be really honest here if you can afford it, YES, wholeheartedly I would recommend the case, it is great, it feels great, it looks great and the airflow is amazing. However, if you are tight on a budget, there are other great cases with excellent airflow and you might want to skip this one.

Read More
How to Stop online tracking in Browsers
It is no longer a secret that websites, social media, and other various places on WEB are tracking you and your messages and emails for keywords that they will later use to promote and serve your specific ads linked to those keywords. Altho the process is fully automated it does feel a little forced and uneasy. That is why we are bringing you this article in which we will show you how to stop website tracking in the most popular and used browsers.

SAFARI

Apple’s Safari browser gives you the option to block cross-site tracking. It also has a Privacy Report that displays all the sites and agencies that are gathering information about you. Before blocking these trackers, you may want to review exactly which sites are tracking you online and gathering information about you. Armed with this information, you may decide that cross-site tracking isn’t a huge issue for your particular browsing habits, or you may decide to avoid certain websites entirely. To access Safari’s Privacy Report:
  1. Launch the Safari web browser.
  2. In the toolbar, select Safari > Privacy Report.
  3. Select the Websites tab. This will display information about all the websites that are profiling you.
  4. Select the Trackers tab. This displays a list of all the trackers that are gathering information about you. This includes the companies that created these trackers and the number of times Safari detected these trackers during your browsing sessions.
You can also check how intrusive a particular website is by navigating to the website in question and then selecting the shield icon that appears alongside Safari’s address bar. You can then select Trackers on This Web Page, and Safari will display a list of all the trackers that are active on this particular webpage. Once you’ve seen all the websites and agencies who are tracking you, if you want to block these trackers:
  1. In the Safari toolbar, select Safari > Preferences …
  2. Select the Privacy tab.
  3. Select the following checkbox: Prevent Cross-Site Tracking.
Safari will now prevent these trackers from following you across the World Wide Web.

CHROME

As you’re browsing the web, Chrome can send a request for websites not to collect or track your browsing data. It’s important to note that this is a request, so there’s no guarantee that every website will honor the request. Frustratingly, Chrome doesn’t provide information about the websites that are tracking you online. However, we still recommend enabling this feature, as it can help minimize the number of websites that are tracking your online movements:
  1. In Chrome’s upper-right corner, select the three-dot menu icon, then Settings.
  2. In the menu on the left, select Privacy and security.
  3. Click Cookies and other site data.
  4. Find the Do not track slider and push it into the On position.
Now Chrome will send a Do Not Track request to every website you visit. Since this is only a request, you may want to take additional steps to protect your online privacy. Ghostery is a Chrome extension that enables you to view and block online trackers. After installing Ghostery, you can view all the trackers that are active on a particular website:
  1. Head to the site in question.
  2. Click the Extensions icon in the Chrome toolbar.
  3. Select Ghostery to see a list of all the trackers this extension has detected.
  4. You can block all of these trackers by selecting the Detailed tab and then clicking Restrict site.
Repeat this process for every site you visit.

MOZILLA FIREFOX

Firefox has an Enhanced Tracking Protection feature that can block all the cross-site trackers identified by Disconnect. This feature can also preserve your online privacy by blocking social media trackers, fingerprints, and crypto miners, making this a great all-arounder for the security-conscious Internet user. Enhanced Tracking Protection should be enabled by default. However, you can verify whether it’s active for your particular Firefox installation by navigating to any website. Next, click the little shield icon that appears alongside Firefox’s address bar and you should see a message confirming that Enhanced Tracking Protection is enabled.
If Enhanced Tracking Protection isn’t enabled, we recommend activating it:
  1. In Firefox’s upper-right corner, select the three-line icon, then Preferences.
  2. In the menu on the left, select Privacy & Security.
  3. You can now select either Standard or Strict. Note that Strict may affect the functionality of certain websites, so it’s recommended you opt for Standard unless you specifically require a greater level of protection.
Similar to Chrome, Firefox can send a Do Not Track request. While you’re in the Privacy & Security menu, you may want to consider activating Mozilla’s Do Not Track feature.

OPERA

When you first installed Opera, it gave you the option to block trackers. If you didn’t take Opera up on the offer then, you can start blocking trackers now:
  1. Along the left side of the Opera browser, click the cog icon. This opens Opera’s settings.
  2. In the menu on the left, select Basic.
  3. Find the Block Trackers slider and push it into the On position.
  4. Blocking trackers can impact the functionality of certain websites. If you start noticing strange behavior on a particular website, you may want to add that site to your Exceptions list. By allowing this site to use trackers, you should be able to resolve any issues you’re experiencing.
To make an exception for one or more websites:
  1. Launch Opera’s settings by clicking the little cog icon.
  2. Navigate to Basic > Manage Exceptions.
  3. Click Add and then type the address of the site where you want to permit trackers.
Repeat for all the sites that you want to add to your exceptions list.
Read More
Fix Cannot load Management Console
TPM, also known as Trusted Platform Module, is a specialized chip used for security as well as encryption of users’ private data like Fingerprint, Facial data, and many more. TPM also comes with a Management Console and if you are not able to load the Management Console and you got the “Cannot load Management Console” error instead, read on as this post will guide you in fixing the problem. This type of issue usually happens when you clear or disable the TPM using the settings in the BIOS and so when you run the Trusted Platform Module Management console, you encounter the error. To fix the “Cannot load Management Console” error in your Windows 10 computer, here are some options you should check out.

Option 1 – If TPM is cleared in the BIOS:

If the Trusted Platform Module is cleared in the settings of the BIOS, you have to close and restart the TPM Management console or TPM.msc once again. It could be that the TPM Management has to reload the changes again after you’ve made them which is why you encounter the “Cannot load management console” error.

Option 2 – If TPM is disabled in the BIOS:

If you opted to disable TPM using the BIOS settings or you have turned it off by accident, then you have to enable it back and you have two options to do that – you can either enable TPM from the BIOS or using the Windows PowerShell. For more details, refer to the instructions below.

Enabling TPM from the BIOS:

  • You need to first reboot your PC and then go to the BIOS.
  • From there, look for TPM under the security options and in case the TPM management option has been disabled or greyed out, refer to the sub-steps given below to make it active again
    • Enable the Admin password in the BIOS.
    • Then go back to the TPM settings and check if the TPM management is already available.
  • After that, you should now be able to enable TPM. Remember that it’s always a good idea to have an ADMIN password for your BIOS as it makes sure that no one can change the settings in your computer BIOS and Security level options.

Enable TPM via Windows PowerShell:

  • This second option is a lot easier compared to the first one if you have admin privileges. So once you’ve opened the Windows PowerShell with admin privileges, you need to run the following command:
    • $tpm = gwmi -n rootcimv2securitymicrosofttpm win32_tpm
    • $tpm.SetPhysicalPresenceRequest(6)
  • After you execute the commands given above, you need to restart your computer.
  • Now, once your computer has restarted, you need to accept any BIOS prompts and then check if the “Cannot load management console” error is now fixed.
Read More
Everything You Need to Know About Disk Partitioning

Disk partitioning is a concept that’s been around for so long, but is still only familiar to few. If done right, it can help get your computer in perfect order. 

Today we bring you a simple definition of disk partitioning, its pros and cons, and a quick tip on how to do it properly to reap its full benefit!

Definition and purpose

The simplest way to define disk partitioning would be: it’s exactly what it sounds like. It means taking a hard disk drive and separating it into different segments. These segments are called partitions. You can visualize it as cutting a cake into smaller pieces - not necessarily of the same size, though. 

So what is the purpose of these pieces?

Well, when you first get a hard drive, it’s basically just a bunch of unallocated storage space. Until there’s at least one partition, this space is unusable to your operating system. Once you create a partition, your OS will recognize it as usable storage space. 

You can choose to create a single partition and use it for all your files, from program files to personal data. A lot of off-the-shelf computers come with one primary partition like this and a small secondary one reserved for recovery purposes. 

Whether or not you want to split your disk into more than one segment is up to you. We would generally recommend it, though. The whole point of partitioning is for each segment to have its own purpose.

So treating all your storage space as a single unit containing different file types would be like constructing an office building with only one massive room for everything - day-to-day work, conferences, interviews, etc. And all of this for different departments of the company. You can see how this might get a little messy.

Creating multiple partitions eliminates the task of running several different types of files from the same place. This takes a heavy load off the entire process of accessing data.

Disk partitioning also brings a ton of other benefits to the table. An important disclaimer, though: there are disadvantages too. We will walk you through both sides to help you get an objective idea and make an informed decision.

Several 4TB hard disks in a unit.
Source: Kina on Unsplash

What are the benefits of disk partitioning?

1. Better file organization

This is the most obvious and perhaps the biggest advantage of partitioning your hard drive. 

As we already mentioned, partitioning allows you to create separate segments for different file and data types. You wouldn’t want to use the same partition for your system files and for games, would you? 

If organization and time management are important to you, then multiple partitions are the right solution. Searching for specific files will be much easier overall. Say you have one hard drive, but three partitions: C for the system files alone, D for multimedia files and documents, and E for games and apps. Your computer loads the system from C without interference from the other two, and you know exactly where to look when searching for a file.

2. Easy reinstallation

File management isn’t the only thing made faster and simpler thanks to partitioning. If you opt for creating multiple segments on your drive, reinstalling Windows will be easy peasy. 

That’s because all you need to do is format the partition your system is on. Then you reinstall the OS on it, and there you go. Now you have a clean installation, with all your files saved on other partitions intact. You can even make a copy of your system partition, so you can revisit the exact same installation in the future if you want. And the whole time your pictures, music, documents stay exactly where you left them. 

A laptop with list of apps on a desk.
Source: Andrew M on Unsplash

3. Possibility of using multiple file systems

By now you’ve understood that partitions function completely separately. This means that, if for some reason you need multiple file system capabilities, partitioning will allow that.

One segment could be used for, say, an NTFS file system, while another could run ext or APFS.

4. Running different OSes

You’re an avid Windows user but need to use Linux on the side? No problem. You don’t need to buy a separate computer or anything. The possibility of running different file systems also means you can use partitioning to run multiple operating systems.

Doesn’t that sound enticing? One machine for multiple totally different uses!

5. Backup and recovery made simple

Data loss can happen on any disk, partitioned or not. However, it’s much easier to get it back on a partitioned one. You know where you stored what, and each partition can be backed up exactly as it is. It’s also a lot faster to back up single partitions than entire hard drives.

Ultimately this also means a faster path to recovery. If you lose or accidentally delete important files and data, you might want to use a recovery tool like Recuva to scan for them and get them back. Recuva is even powerful enough to recover data from damaged hard drives. But no matter how powerful, scanning a whole drive is strenuous for any recovery tool. Scanning independent partitions is a lot more convenient than that, and will get you to your goal more efficiently.

6. Optimized performance

Now, let’s keep in mind that computer performance is influenced by a number of factors. Partitioning alone isn’t what makes it better or worse. However, it can contribute to optimization. It’s easier for your computer to scan, say, a 40 GB partition to fetch the system file it needs than scanning the entire capacity of your drive.

7. Improved security (possibly*)

Separate partitions can help make your system more secure. Firstly, they minimize file corruption. If one partition gets corrupted, the others should remain unaffected. And keeping in mind the previous point about backup and recovery, ‘fixing’ the damaged partition would be much easier than fixing the entire hard drive. 

Partitioning also improves security in terms of malware protection. A malicious attack on one partition is easier to deal with than malware on the whole drive. If your system partition gets infected, you can simply reinstall your OS and that should do the trick.

*Do keep in mind that partitioning can’t defend you against more advanced attacks. So make sure not to give in to a false sense of security.

What are the disadvantages of partitioning?

1. Data is still vulnerable

Yes, it’s easier to back up and recover data from independent partitions. And yes, partitioning may help protect separated files and data to a higher degree. But remember: everything is still on a single physical drive. So while digital errors and issues may be easier to deal with on partitioned drives, physical damage obviously won’t be.

If your hard drive is destroyed in some way, all data on it will be gone. That’s why, if you have crucial files on your PC, it’s important to give them the proper backup treatment before it’s too late.

2. Disbalance of space

Allocating storage space on separate partitions may be a little more tricky than you think. You may fill up one partition a lot faster than another. So on one side you’re struggling with space, and on another you have too much of it to spare. Imagine nearly filling up your system partition and then it turns out you need a lot more space for its updates than you thought.

That’s why you really have to be sure you actually have enough files of different types that you need help managing efficiently. Otherwise you’ll just create a struggle and disbalance in terms of storage.

3. Increased risk of error

If done incorrectly, partitioning can lead to more harm than good. Aside from space disbalance, there is an increased risk of incorrect partition sizes and formatting. Plus, human error is also a factor: in a moment of distraction, you may erase one partition when you meant another. Undoing such mistakes will definitely be tedious and time-consuming.

4. SSDs eliminate the need of partitioning

SSDs (solid-state drives) don’t function in the same way that HDDs do. They have faster read times and can organize files on their own. This quite literally eliminates the need for organization on your part.

Partitioning: yes or no?

The bottom line is that multiple partitions might not be necessary for the average user. But if you’re planning on storing many file types or different file and operating systems on the same PC, then you should give it a shot. It’s also an excellent solution for businesses, of course.

And if our pros and cons list isn’t enough to help you decide, you can always send us a message and we’ll help you make the right choice.

Decided to partition your hard drive?

If you’ve decided to give it a go, you definitely should make sure to do it right. 

The two most effective and reliable ways to partition are using the built-in options on Windows or investing in a dedicated partitioning tool, like the EaseUS Partition Master. Which one you'll opt for depends on your specific needs. 

Option 1 may be more suitable for users with at least some level of experience. In this case, you’d have to know exactly which steps to take without making errors. This is done in Disk Management on Windows 10/11. From there, you can select the partitions you’d like to split into different volumes of selected sizes.

If this is your first time partitioning, we highly suggest you either consult professionals for this or move on to option 2. The EaseUS partitioning software is specifically designed for beginners, with an intuitive interface helping you succeed in the process. All you need to do is pick the Partition Master package tailored to your needs and follow their guide

Each package offers technical support as well, and even free upgrades (to varying degrees based on your subscription). Plus, all of this is valid for not one, but two PCs.

It’s the perfect solution for a smooth and error-free partitioning process. If you want to organize your hard drives efficiently and make the most of all your space without doing irreparable damage, it’s definitely worth the investment.

Read More
Malware Guide: How to Remove Webguard

What is Webguard?

Developed by Interesting Solutions, Webguard is a tool supposedly used for tracking those online who’ve developed a habit of tracking you. The application would provide logical analysis into a user’s website history, providing insight on what websites you’ve visited and also how persons are able to track your every move while browsing. While Webguard is unable to dispose of who specifically is tracking your computer usage, they’re able to determine what computer installed tracking codes or cookies on your computer system. In this case, it’s then left up to the user’s discretion to determine who they want to allow or block from tracking their online use.  Overall, this application allows the user some measure of freedom and control over their online experience. Like any other application, however, which has landed themselves a spot on Virus Total, Web guard has hidden agendas. At a distance, Webguard installs a service for Windows but later distributes advertisements. Technical details about Webguard include:
Product Version: 1.0.0.0 Original File Name: crss.exe Entry Point:  0x000C5AAE

Assessment of Webguard Potentially Unwanted Program

While Webguard claims to track your computer usage, information reported by the application isn’t sufficient for the common computer user. This brings us back to the ulterior motive or principal objective of developing Webguard – to advertise and generate revenue from clicks made by users on Ads displayed on Internet Browsers – namely Chrome, Internet Explorer and Firefox. Why should a computer user remove Webguard? Simply, it compromises one's Internet privacy and security and it keeps abreast of your Internet history. If you’re online for an extended period, you’ll see what Webguard does. While the publishers behind the application did not alert users to the use of web beacons, cookies for tracking, and other related tracking technology, that’s not why Webguard is considered unwanted. The program is potentially unwanted because of the unpredictable advertisements it displays. Not all sites are trusted and so it’s difficult to determine, in some cases, what websites are legit for business.

Remove Webguard with Spyhunter

In most cases, at least from what I’ve seen, Webguard is installed as a single application. After it was installed for this assessment, it could be found in ‘All Programs”. This meant that one could manually delete the application from their computer system (see manual steps below). However, is that really sufficient to completely rid your PC of Webguard’s blueprints? While you might opt to remove Webguard manually – maybe because it’s more economical – an automated process is able to completely eradicate hidden threats from Webguard. In comparison to manually removing Webguard, Spyhunter penetrates your computer system for all infections. In most cases, nasty threats are unable to be removed manually. Additionally, Spyhunter not only removes installed threats, but it detects incoming ones – hence, acting as a preventative tool. Furthermore, Spyhunter detects cookies placed on your computer by Webguard. These are all undetectable threats and so an automated tool, as Spyhunter, should be used to remove Spyhunter effectively from your computer.

Manual Steps for Removal of Webguard

I found this removal pretty simple. Depending on your Operating System, there will be slight discrepancies in the manual removal steps. Using the Windows 8 (8.1) OS on your computer:
  • Step 1: Locate the CONTROL PANEL on your computer using the SEARCH option.
  • Step 2: Once the search box appears , input 'CONTROL PANEL'.
  • Step 3: The Control Panel option will then appear. From the menu, choose the "Programs" option.
  • Step 4: Another menu will appear. Select "All Programs and Features".
  • Step 5: From the 'Programs list', search for the Webguard application.
  • Step 6: Right-click on Webguard when it's found.
  • Step 7:  Choose the "Uninstall" option.
  • Step 8:  Follow the uninstall wizard instructions until the Webguard application is fully removed.
To completely remove Bandoo from your computer, click here to download and install Spyhunter
Read More
Fix DISM Error: The scratch directory size ...
One of the most useful and powerful built-in utility in Windows 10 is the DISM tool. This tool can be used with the Command Prompt command line as well as for other purposes. However, it is not without flaws and there are times when you may encounter some issues while using it. One of the problems you can get while using the DISM tool is the following error:
“The scratch directory size might be insufficient to perform this operation”
This kind of error in DISM occurs when the DISM command is executed from the Windows Recovery Environment due to the limited size permissions of a delivery where the operating is being performed. To fix this DISM error, you need to follow the instructions laid out below. Step 1: First, tap the Win + R keys to open the Run utility and then type “cmd” in the field and tap Enter to open Command Prompt. Step 2: Next, you have to specify a scratch directory that contains the Windows folder and to do that, you can either use the DIR command or the BCEDIT command. So in the elevated command prompt type and enter “dir” or “bcedit”. Step 3: After that, you will see a list of folders inside the C: partition. Now you have to create a folder named “scratch” inside the partition. To do so, execute the following command:
mkdir C:Scratch
Note: The command you just entered will create a directory inside the root of the C: partition named Scratch. Step 4: Now that you’ve created the Scratch folder, note that each time you run any of the DISM commands, you have to enter the following code snippet in them:
/ScratchDir:C:Scratch
 Note: For instance, if you are using the DISM tool to repair the offline Windows image, instead of executing the “Dism /Online /Cleanup-Image /RestoreHealth” command, you now have to execute the “DISM /Image:C: /ScratchDir:C: Scratch /Cleanup-Image /Restorehealth” command. And if you want to remove a selected installed update package, you can use the “DISM /image:C: /ScratchDir:C:Scratch /Remove-Package /PackageName:Package_for_RollupFix~31bf3856ad364e75~amd64~~16299.196.4.9” command. Keep in mind that the mentioned package is only an example. And lastly, you also have to replace the drive letter in the new code snippet when you execute the commands given above.
Read More
Change Legacy to UEFI without reinstalling
There are some new generation motherboards for laptops and PCs that bring in support for both the Unified Extensible Firmware Interface or UEFI as well as the Basic Input Output System or BIOS. The main advantage of UEFI over the traditional BIOS is the fact that UEFI supports a hard drive that has a capacity of more than 2 terabytes. However, the disadvantage of UEFI is that it only supports the x64 Windows operating system versions and that the hard drive is supposed to use the GPT structure. So if your PC is compatible with and supports UEFI and you want to change from Legacy to UEFI, then you’ve come to the right place as this post will guide you on how you can exactly do that without having to reinstall it. There are two ways to change Legacy to UEFI. You can convert MBR to GPT using either the built-in utilities in Windows or using the Recovery Environment. Before you proceed, make sure that your computer fulfills the following prerequisites:
  • Your PC’s motherboard should support both Legacy and UEFI.
  • Your PC should be running at least the 1703 Windows 10 version or newer on an MBR partition.
Once you’ve made sure that your computer covers the aforementioned prerequisites, refer to the given options below.

Option 1 – Convert MBR to GPT via Windows built-in utilities

  • In the Windows Search box, type “command prompt” and from the search results that appear, right-click on Command Prompt and select the “Run as administrator” option.
  • After that, execute this command: exe /convert /allowfullOS
  • Now, wait until the process is completed since you can track its process on your screen.
  • Once it’s done, go to Settings > Update & Security > Advanced Startup options and from there, click on Restart Now. This will restart your computer and give you advanced options.
  • Next, select Troubleshoot > Advanced Options where you will see further options including System Restore, Startup Repair, Go back to the previous version, Command Prompt, System Image Recovery, and UEFI Firmware Settings.
  • Now select the UEFI Firmware Settings. This will take you to the BIOS. Boot Mode is typically available under Boot > Boot Configuration. Once you’re there, set it to UEFI and then save the changes you’ve made. After that, your computer will restart.

Option 2 – Convert MBR to GPT via the Recovery Environment

  • When the message appears on your screen while running Windows Setup, you need to tap the Shift + F10 keys to open Command Prompt.
  • Make sure to run Command Prompt as admin and then execute this command: exe /convert
  • After that, wait until the process is completed. When it’s done, you have to go to the BIOS just like in the first given option above.
  • As mentioned, you can usually find the Boot Mode under Boot > Boot Configuration. Once you’re there, set it to UEFI.
  • Now save the changes made and exit as your computer will restart.
Read More
How to Fix Error 126

Error 126 - What is it?

Error 126 is a Windows PC error that mostly occurs either during program installation or removal. It is commonly experienced by Vista, XP and Windows 7 users. When the error 126 is generated, it usually terminates the program installation process, immediately. It is advisable to take corrective error repair measures immediately to ensure that you are easily able to install your desired program and you don’t encounter the error again.

Solution

Restoro box imageError Causes

There are multiple reasons for the occurrence of the error code 126 including. The reasons are listed below:
  • Dll file corruption
  • Missing or damaged dll files
  • Corrupt and misconfigured system files
  • Improper program installation
  • Viral infection
  • Corrupt registry
  • Improper hardware

Further Information and Manual Repair

To resolve the error 126 on your PC, you don’t always have to hire a technician or be a computer programmer yourself. Though this error is critical the good news is that it is very easy to resolve. You can fix the error even if you are not technically sound. Try the solutions that we have listed below to help you resolve error 126 immediately:

Solution 1: Disable Firewall Protection

Sometimes Firewall protection may stop you from installing new programs on your PC successfully and this may display the error 126 on your PC. In such a scenario, disable Firewall protection and then try installing the desired program again. See if it works.

Solution 2: Restore Points

Sometimes dll files can go missing due to program removals and you may come across the error 126. To resolve it, restore points. This will help you restore your PC back to the way it was functioning before you removed a program and will also help you recover the lost and missing dll files.
  • This can be done, by clicking the start menu.
  • Now go to all programs, then accessories, and then system tools.
  • Here you will see the ‘System Restore’ option. Simply click on it.
  • This will help you open a new window. Here select the option ‘Restore My Computer to an Earlier Time’ point.
  • As you select it, it will show you a list of restore points.
  • Choose the latest restore point you see in the list and click ‘Next’ to continue. Now confirm to finish restoration.
  • Restart your PC to activate the changes.

Solution 3: Scan for Viruses

The underlying cause for the error could also be related to viruses on your PC. To remove the viruses, you will have to download a powerful antivirus and scan your entire PC. Please note, anti-viruses are notorious for slowing down system performance, so you might have to compromise on the speed of your PC.

Solution 4: Run a Hardware Diagnostic

To find out which hardware is causing the error message to pop up, you will have to run a hardware diagnostic. For this, simply go to the start menu, type Memory Diagnostic in the search bar. Now access this tool and click on Diagnose your Memory problems. As you click on it, it will ask you to perform the check by either restarting the PC immediately or on the next restart. Select the immediate one to get going. The system will carry a scan on the memory and show you the list of problematic errors detected during the scan. To resolve this error then all you have to do is replace the piece of faulty hardware. Nonetheless, if no faulty hardware is detected, this means the error is related to the registry.

Solution 5: Clean and Restore the Registry

The error 126 is also sometimes generated due to poor PC maintenance which leads to registry issues. The registry basically saves and stores all the data and activities performed on the PC. This also includes junk files, invalid registry entries, bad keys, temporary files, internet history, and cookies. This accumulates a lot of disk space. If not removed, they damage the registry and corrupt other important files like system and dll files, thereby generating PC-related error codes like error 126. The best way to resolve this error on your PC in seconds is to download Restoro on your PC. This is an advanced and multi-functional PC repair tool embedded with multiple powerful utilities including an intuitive registry cleaner, an antivirus, and a system optimizer. The registry cleaning feature detects all registry issues and errors. It wipes out all the unnecessary and obsolete files cluttering the system, fixes the damaged dll files, and restores the registry back to normal. Simultaneously, the antivirus utility scans for all privacy errors and malicious software infecting your system. This includes malware, adware, spyware, and Trojans. The system optimizer feature ensures your PC performance does not slow down. It boosts the speed of your PC to its optimum level. This PC fixer is safe, user-friendly, and efficient. It can be downloaded on any Windows version. Click here to download Restoro on your system and resolve error 126 right away!
Read More
Connecting Cortana on Windows and Android
Microsoft's anniversary update has come with many new features and improvements. One of these features is that Microsoft's Cortana can now be installed on your Android phone and as long as you are logged in to your Microsoft account on different devices, she can pass information between devices. You can not see battery life on your desktop PC, notifications, etc. There are some prerequisites in order to get this going, first is to have a Windows version 1607 or newer. The second is to have the last Android version

Installing Cortana on Android

  1. Download and install the Cortana app from the Google Play store.
  2. Open the app and accept the license terms.
  3. Enter the credentials for the Microsoft account you use to sign in to your PC.
  4. After a few seconds, Cortana will open.
  5. Click the settings button and select Sync Notifications.
  6. By default, missed calls, incoming messages, and low battery notifications will be turned on. You can turn this on\off from here. The only option off by default is for App notifications. Any non-system apps such as Facebook and Instagram can also send alerts to your Windows box. You can choose to enable the App notification sync option or leave it off.
  7. If you enable “App notification sync,” you will need to give Cortana permissions to read and control notifications on your phone.
  8. You can then select exactly which applications will be synched to your PC.
  9. Once done you can exit out of Cortana.

Configuring Cortana on PC

  1. Click the Windows button and type Cortana. Click the icon for Cortana and Search Settings.
  2. Scroll through the settings list and look for Send notifications between devices
  3. Click the switch to turn it on.
  4. Sign in to the same Microsoft account you used in the previous section
  5. Navigate back to the Cortana & Search settings tool.
  6. Click Edit Sync Settings. Make sure that your phone shows up on the list. You can also determine if you want PC notifications are sent to your phone.
With those settings in place, you should now start getting alerts for the items you enabled in your Action Center. As notices come in, you will see them pop up in a small bubble on the lower right of your screen. You can dismiss the notification or use the link to find a compatible app in the Windows store.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status