Logo

10 Worst Computer Viruses in history

Computers viruses, worms, ransomware, etc. are kinds of malicious software that no user should take lightly. On several occasions, we have touched upon security steps that each user should take in order to protect its identity and data. Sadly sometimes even when all precautions are taken some malware can still slip through and wreak havoc. Today we are looking at some of the worst or the best, depending on your view that has indeed wreaked plenty of havoc.

viruses10 worst computer viruses in history

In the list of the 10 most famous computer viruses below, we show the costs, dates, reach, and other key facts. First a note about terms: we use the words “virus” and “worm” interchangeably because most readers search for them that way. But there’s a subtle difference that we explain after the list.

1. Mydoom – $38 billion

The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent.
Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server.

Mydoom is still around today, generating 1% of all phishing emails. That’s no small feat considering the 3.4 billion phishing emails sent each day. By that figure, Mydoom has taken on a life of its own, infecting enough poorly-protected machines to send 1.2 billion copies of itself per year, 16 years after its creation.
Though a $250,000 reward was offered, the developer of this dangerous computer worm was never caught.
Wondering what makes the world’s most secure computers so safe? See the Tech@Work guide: Upgrade to the World's Most Secure and Manageable PC

2. Sobig – $30 billion

The 2003 Sobig computer virus is actually another worm. It is second only to the Mydoom virus in its scope. The $30 billion figure is a worldwide total, including Canada, the U.K., the U.S., mainland Europe, and Asia. Several versions of the worm were released in quick succession, named Sobig.A through Sobig.F, with Sobig.F being the most damaging.
This cybercriminal program masqueraded as legitimate computer software attached to emails. It disrupted ticketing at Air Canada and interfered with countless other businesses. Despite its widespread damage, the creator of the successful bug was never caught.

3. Klez – $19.8 billion

Klez is a close third on the list of the worst computer viruses ever created. With nearly $20 billion in estimated damages, it infected about 7.2% of all computers in 2001, or 7 million PCs. The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses.
As with other viruses and worms, Klez was released in several variants. It infected files, copied itself, and spread throughout each victim’s network. It hung around for years, with each version more destructive than the last.
Windows has come a long way since most of the computer viruses on this list hit the web. Thankfully, built-in protection with Microsoft Defender is always on the watch.

4. ILOVEYOU – $15 billion

The year 2000’s ILOVEYOU virus worked by sending a bogus “love letter” that looked like a harmless text file. Like Mydoom, this attacker sent copies of itself to every email address in the infected machine’s contact list. Shortly after its May 4 release, it had spread to more than 10 million PCs.
The virus was created by a college student in the Philippines named Onel de Guzman. Lacking funds, he wrote the virus to steal passwords so he could log into online services he wanted to use for free. He reportedly had no idea how far his creation would spread. This virus is also known as Loveletter.
Need to up your remote work security game before there’s another entry on the list of most deadly computer viruses? See our guide: How to Work Remotely and Securely

5. WannaCry – $4 billion

The 2017 WannaCry computer virus is ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. The WannaCry ransomware ripped through computers in 150 countries, causing massive productivity losses as businesses, hospitals, and government organizations that didn’t pay were forced to rebuild systems from scratch.
The malware raged like wildfire through 200,000 computers worldwide. It stopped when a 22-year-old security researcher in the U.K. found a way to turn it off. Computers with out-of-date operating systems were hit especially hard. That’s why security experts always recommend updating your systems frequently.

Ransomware strikes again

In September 2020, one of the potentially largest computer virus attacks in medical history hit Universal Health Services. The U.S. hospital chain, which has more than 400 locations, was reportedly struck by damaging ransomware. The attack forced the cancellation of surgeries and made healthcare workers switch to paper records.

6. Zeus – $3 billion

The Zeus computer virus is an online theft tool that hit the web in 2007. A whitepaper by Unisys three years later estimated that it was behind 44% of all banking malware attacks. By then, it had breached 88% of all Fortune 500 companies, 2,500 organizations total, and 76,000 computers in 196 countries.
The Zeus botnet was a group of programs that worked together to take over machines for a remote “bot master.” It originated in Eastern Europe and was used to transfer money to secret bank accounts. More than 100 members of the crime ring behind the virus, mostly in the U.S., were arrested in 2010. It’s not as prominent today, but some of the virus’ source code lives on in newer botnet viruses and worms.

Zeus caused documented damage of $100 million. But the real cost in terms of lost productivity, removal, and undocumented theft is undoubtedly much higher. A $3 billion estimate, adjusted for inflation, puts this virus at a cost of $3.7 billion in today’s dollars.

7. Code Red – $2.4 billion

First observed in 2001, the Code Red computer virus was yet another worm that penetrated 975,000 hosts. It displayed the words “Hacked by Chinese!” across infected web pages, and it ran entirely in each machine’s memory. In most cases it left no trace in hard drives or other storage.
Financial costs are pegged at $2.4 billion. The virus attacked websites of infected computers and delivered a distributed denial of service (DDoS) attack on the U.S. White House’s website, www.whitehouse.gov. In fact, the White House had to change its IP address to defend against Cod Red.
Can your printer get a virus? See our cool infographic: The State of Printer Security

8. Slammer – $1.2 billion

The SQL Slammer worm cost an estimated $750 million across 200,000 computer users in 2003. This computer virus randomly selected IP addresses, exploiting vulnerabilities and sending itself on to other machines. It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic.
The Slammer worm hit banks in the U.S. and Canada especially hard, taking ATMs offline in many locations. Customers of Toronto’s Imperial Bank of Commerce found themselves unable to access funds. The attack reared its ugly head again in 2016, launching from IP addresses in Ukraine, China, and Mexico.

9. CryptoLocker – $665 million

Thankfully, ransomware attacks like the 2013 CryptoLocker virus have dipped since their 2017 peak. This malware attacked upwards of 250,000 machines by encrypting their files. It displayed a red ransom note informing users that “your important files encryption produced on this computer.” A payment window accompanied the note.
The virus’ creators used a worm called the Gameover Zeus botnet to make and send copies of the CryptoLocker virus. According to a report by security firm Sophos, the average ransomware attack costs a business $133,000. If we estimate that CryptoLocker hit 5,000 companies, that would put its total cost at $665 million.
Where will cybersecurity go next? See our guide: The Future of Cybersecurity

10. Sasser – $500 million

The Sasser worm was written by a 17-year-old German computer science student named Sven Jaschan. He was arrested at the age of 18 in 2004 after a $250,000 bounty was posted for the computer virus’ creator. A friend of Jaschan’s tipped authorities that the youth had penned not only the Sasser worm but also the damaging Netsky.AC attack.
Jaschan was given a suspended sentence after it was found he was a minor when he wrote the malware. The Sasser worm crashed millions of PCs, and though some reports put damages at $18 billion, the relatively low infection rate suggests a more likely cost of $500 million.
Other notable viruses

The top 10 worst computer viruses above are just the ugly tip of a gargantuan digital iceberg. With a million new malware programs popping up every 3 years, we may miss the forest for a few outstanding trees. Here are just a few more viruses that have wreaked havoc over the years:

Mimail: This worm tried to harvest data from infected machines to launch a string of DDoS attacks, but was relatively easy to remove.

Yaha: Yet another worm with several variants, thought to be the result of a cyber-war between Pakistan and India.

Swen: Written in C++, the Swen computer worm disguised itself to look like a 2003 OS update. Its financial cost has been pegged at $10.4 billion, but not reliably.

Storm Worm: This worm showed up in 2007 and attacked millions of computers with an email about approaching bad weather.

Tanatos/Bugbear: A 2002 keylogger virus that targeted financial institutions and spread to 150 countries.

Sircam: A computer worm from 2001 that used counterfeit emails with the subject line, “I send you this file in order to have your advice.”

Explorezip: This worm used fake emails to spread to every machine on thousands of local networks.

Melissa: The most dangerous computer virus in 1999, Melissa sent copies of itself that looked like NSFW pics. The U.S. FBI estimated cleanup and repair costs at $80 million.

Flashback: A Mac-only virus, Flashback infected over 600,000 Macs in 2012 and even infected Apple’s home base in Cupertino, Calif. In 2020, there’s now more malware on Macs than on PCs.

Conficker: This 2009 virus still infects many legacy systems and could do significant damage if it ever activates.

Stuxnet: This worm is reported to have destroyed Iranian nuclear centrifuges by sending damaging instructions.

Do You Need Help with Your Device?

Our Team of Experts May Help
Troubleshoot.Tech Experts are There for You!
Replace damaged files
Restore performance
Free disk space
Remove Malware
Protects WEB browser
Remove Viruses
Stop PC freezing
GET HELP
Troubleshoot.Tech experts work with all versions of Microsoft Windows including Windows 11, with Android, Mac, and more.

Share this article:

You might also like

Chrome automatically opens a new tab
Recently, a number of users reported that their Google Chrome browsers keep on opening new tabs no matter what they do. This issue could be due to lots of reasons but the main ones are corrupt installation, background applications, adware, dubious browser extensions, malware, and so on. Although there are a lot of possible causes for this particular issue in Chrome, its potential fixes are straightforward so you should not have any problem following the given options below.

Option 1 – Get rid of any conflicting browser extensions

As mentioned, shady browser extensions can cause unusual behavior in a browser. Chances are, these extensions or toolbars might be conflicting with the loading of the website. Thus, you have to get rid of these unwanted extensions and toolbars to fix the issue.
  • Open Chrome and press Alt + F keys.
  • Go to More tools and click Extensions to look for any suspicious browser extensions or toolbars.
  • Click the Recycle bin and select Remove.
  • Restart Chrome and press Alt + F keys again.
  • Proceed to On Startup and mark Open a specific page or set of pages.
  • To check if the browser hijacker is still active, click Set pages, if it is active, overwrite the URL.

Option 2 – Try to disable applications from running in the background

  • Open Google Chrome and then click on the menu button located in the top-right corner.
  • From the drop-down, select Settings and then scroll down until you see the Advanced button. Click on it.
  • Next, turn off the toggle for “Continue running background apps when Google Chrome is closed” under the System section.
  • Now restart Chrome and check if it is working properly.

Option 3 – Try to configure the search settings of Chrome

  • Open Google Chrome and type any search query in the address bar and then tap Enter.
  • After that, it will open the Google search engine. From the top-right corner, click the Settings button.
  • Next, select Search settings from the drop-down menu.
  • Then scroll down to the new page that appears and make sure that the “Open New Window for each result” option is set to Uncheck.
  • Once you’re done, save the changes made and restart Google Chrome.

Option 4 – Reset Chrome

Resetting Chrome can also help you fix the error. This means that you will be restoring its default settings, disabling all the extensions, add-ons and themes. Aside from that, the content settings will be reset as well and the cookies, cache, and site data will also be deleted. To reset Chrome, here’s what you have to do:
  • Open Google Chrome, then tap the Alt + F keys.
  • After that, click on Settings.
  • Next, scroll down until you see the Advanced option, once you see it, click on it.
  • After clicking the Advanced option, go to the “Restore and clean up option and click on the “Restore settings to their original defaults” option to reset Google Chrome.
  • Now restart Google Chrome.

Option 5 – Try to clean reinstall Chrome

There are instances when programs leave files behind after you’ve uninstalled them and the same thing can happen to Chrome so before you reinstall Chrome, you have to make sure that you have deleted the User Data folder. To do so, refer to the following steps:
  • Hit the Win + R keys to open the Run dialog box.
  • Next, type “%LOCALAPPDATA%GoogleChromeUser Data” in the field and hit Enter to open the User Data folder.
  • From there, rename the default folder and name it something else, e.g. “Default.old”.
  • After that, install Google Chrome again and check if the issue is now fixed.

Option 6 – Try scanning your computer using Windows Defender

As mentioned, the error when accessing the security settings or properties of a folder or file might be due to a virus or malware. It could be that it had made some modifications that prevents you from accessing security settings or properties. To eliminate it, you have to scan your computer using security programs like Windows Defender.
  • Tap the Win + I keys to open Update & Security.
  • Then click on the Windows Security option and open Windows Defender Security Center.
  • Next, click on Virus & threat protection > Run a new advanced scan.
  • Now make sure that Full Scan is selected from the menu and then click the Scan Now button to get started.
Read More
Windows 11 new features and preview
Microsoft has presented its next version of their flagship product, Windows 11, and feelings are divided among users. Some users like it very much and eager to upgrade, some do not like the graphic overhaul it went through, but overall I think Microsoft has done a good job with it. Here in this article, we will discuss some of the new features which Windows brings to the table, well at least ones that were showed, I am sure there are plenty more which we will see once OS has been released.

New Start menu

Winodws 11 start menuOne of the first things that everyone saw when Microsoft has unveiled Windows 11 is its Start menu. Funny enough this is what has caused most of the divide among users, some find it interesting, and some do not like it. Truth is, it is different, and it is centered in the middle instead of the lower left part of the screen. It has been confirmed however that the Start menu can be moved to any part of the screen so if you want, you could place it on the lower left as it has always been. Live tiles do not longer exist in the Start menu, instead, we have styled simple icons.

Windows 11 Snap controls are great

Windows 11 snap controlsIf you have used the cascade option in previous Windows versions then it is most likely that you will like the new Snap controls. You can quickly snap windows side by side, or arrange them in sections on your desktop just by hovering over maximize button on the title bar.

Windows 11 File Explorer

Windows 11 file explorerFile explorer has gone through some visual and design changes, the ribbon on top has been completely removed and replaced with a header-like feature with a slick and clean design. The header contains a nice organized and designed single row of icons like cut, paste, copy, rename, delete, and new folder icons.

Settings app ovberhaul

Windows 11 settings appThe settings app also has gone through visual and design changes. It has a new design that is very visually appealing and navigation has been simplified and more organized. Finding the right and desired setting is much faster and clearer now.

Widget tab makes comeback in Windows 11

Windows 11 widgets barYes, widgets are back but not like you remember them. Instead of being all-time present at your desktop like once they used to be, now there is a button on the taskbar which brings the widget bar up that contains desired widgets. This way they are easily accessible and do not clutter desktops. So far we have weather, news, calendar, and stocks widget but we will see how development on these goes. I expect to have community-made widgets like in old days for all of our needs.

XBOX app

Windows 11 xbox appThe new Xbox app is now integrated into Windows 11, offering quick access to Xbox Game Pass games, the social parts of the Xbox network, and the Xbox store.

Security and TPM 2.0 in Windows 11

Windows 11As widely known by now Windows 11 will require you to have a TPM 2.0 module capable CPU in order to install it. This system requirement has caused a lot of controversies but essentially it seems that MS's goal is to protect your personal data by using this module. The upside of course is that your data will be protected much more than in previous Windows versions, the downside, of course, will be that you will need newer hardware to run OS on it. and that is essentially it, keep on tuned on more Windows 11 information and overall articles tied to PC and technology here at errortools.com
Read More
Diablo 3 lost connection to the game server
Diablo has changed how action RPG games are made and has placed homework for many developers. Diablo 3 is 3rd continuation in the series and to the joy of many players worldwide it has brought some interesting things in the genre like teaming up with other friends to slay demon hordes together introducing much needed multiplayer element. Sadly sometimes we get the error that Diablo 3 can not connect or that the connection to the game server has been lost. Keep reading and try provided solutions as they are presented to fix this issue and continue gaming.
Read More
How to Stop online tracking in Browsers
It is no longer a secret that websites, social media, and other various places on WEB are tracking you and your messages and emails for keywords that they will later use to promote and serve your specific ads linked to those keywords. Altho the process is fully automated it does feel a little forced and uneasy. That is why we are bringing you this article in which we will show you how to stop website tracking in the most popular and used browsers.

SAFARI

Apple’s Safari browser gives you the option to block cross-site tracking. It also has a Privacy Report that displays all the sites and agencies that are gathering information about you. Before blocking these trackers, you may want to review exactly which sites are tracking you online and gathering information about you. Armed with this information, you may decide that cross-site tracking isn’t a huge issue for your particular browsing habits, or you may decide to avoid certain websites entirely. To access Safari’s Privacy Report:
  1. Launch the Safari web browser.
  2. In the toolbar, select Safari > Privacy Report.
  3. Select the Websites tab. This will display information about all the websites that are profiling you.
  4. Select the Trackers tab. This displays a list of all the trackers that are gathering information about you. This includes the companies that created these trackers and the number of times Safari detected these trackers during your browsing sessions.
You can also check how intrusive a particular website is by navigating to the website in question and then selecting the shield icon that appears alongside Safari’s address bar. You can then select Trackers on This Web Page, and Safari will display a list of all the trackers that are active on this particular webpage. Once you’ve seen all the websites and agencies who are tracking you, if you want to block these trackers:
  1. In the Safari toolbar, select Safari > Preferences …
  2. Select the Privacy tab.
  3. Select the following checkbox: Prevent Cross-Site Tracking.
Safari will now prevent these trackers from following you across the World Wide Web.

CHROME

As you’re browsing the web, Chrome can send a request for websites not to collect or track your browsing data. It’s important to note that this is a request, so there’s no guarantee that every website will honor the request. Frustratingly, Chrome doesn’t provide information about the websites that are tracking you online. However, we still recommend enabling this feature, as it can help minimize the number of websites that are tracking your online movements:
  1. In Chrome’s upper-right corner, select the three-dot menu icon, then Settings.
  2. In the menu on the left, select Privacy and security.
  3. Click Cookies and other site data.
  4. Find the Do not track slider and push it into the On position.
Now Chrome will send a Do Not Track request to every website you visit. Since this is only a request, you may want to take additional steps to protect your online privacy. Ghostery is a Chrome extension that enables you to view and block online trackers. After installing Ghostery, you can view all the trackers that are active on a particular website:
  1. Head to the site in question.
  2. Click the Extensions icon in the Chrome toolbar.
  3. Select Ghostery to see a list of all the trackers this extension has detected.
  4. You can block all of these trackers by selecting the Detailed tab and then clicking Restrict site.
Repeat this process for every site you visit.

MOZILLA FIREFOX

Firefox has an Enhanced Tracking Protection feature that can block all the cross-site trackers identified by Disconnect. This feature can also preserve your online privacy by blocking social media trackers, fingerprints, and crypto miners, making this a great all-arounder for the security-conscious Internet user. Enhanced Tracking Protection should be enabled by default. However, you can verify whether it’s active for your particular Firefox installation by navigating to any website. Next, click the little shield icon that appears alongside Firefox’s address bar and you should see a message confirming that Enhanced Tracking Protection is enabled.
If Enhanced Tracking Protection isn’t enabled, we recommend activating it:
  1. In Firefox’s upper-right corner, select the three-line icon, then Preferences.
  2. In the menu on the left, select Privacy & Security.
  3. You can now select either Standard or Strict. Note that Strict may affect the functionality of certain websites, so it’s recommended you opt for Standard unless you specifically require a greater level of protection.
Similar to Chrome, Firefox can send a Do Not Track request. While you’re in the Privacy & Security menu, you may want to consider activating Mozilla’s Do Not Track feature.

OPERA

When you first installed Opera, it gave you the option to block trackers. If you didn’t take Opera up on the offer then, you can start blocking trackers now:
  1. Along the left side of the Opera browser, click the cog icon. This opens Opera’s settings.
  2. In the menu on the left, select Basic.
  3. Find the Block Trackers slider and push it into the On position.
  4. Blocking trackers can impact the functionality of certain websites. If you start noticing strange behavior on a particular website, you may want to add that site to your Exceptions list. By allowing this site to use trackers, you should be able to resolve any issues you’re experiencing.
To make an exception for one or more websites:
  1. Launch Opera’s settings by clicking the little cog icon.
  2. Navigate to Basic > Manage Exceptions.
  3. Click Add and then type the address of the site where you want to permit trackers.
Repeat for all the sites that you want to add to your exceptions list.
Read More
Remove login screen in Windows 10
Each time we turn ON our computer or wake it from hibernation we are greeted with a Windows login screen where we need to provide login credentials in order to get into Windows itself and start working. This method of preserving data and privacy is perfectly fine and as a matter of fact, it is recommended for mobile computers but if you have a home computer in a safe environment where no one will try to look at your data or rummage through your personal stuff then removing login screen is safe enough action and can cause you a lot piece, from time-saving to less frustration on every restart or sleep action. In previous Windows versions, it was much easier to turn off this feature but it seems Microsoft has determined that our privacy and security are important and somewhat removed the ability to turn OFF the lock screen. In this guide, we will show you how you can still remove the lock screen and automatically log in with your account like in the good old days. The first thing you need to do is to press ⊞ WINDOWS + R  to bring up the Run dialog keyboard with windows and r markedIn the dialog, type in netplwiz and press ENTER. run dialog with netplwiz typed inYou will find yourself in the User Accounts window, inside deselect Users must enter a user name and password to use this computer. Press OK user accounts windowSign in the window will pop up where you will have to type in your password and confirm it in order to start the feature. automatically sign in dialogAfter typing in your password and confirming it, press OK. That's it, next time you wake your computer from hibernation or turn it ON, you will automatically be greeted with a desktop instead of a Windows login screen.
Read More
SoftwareUpdater Malware Removal Guide

Software Updater is an ad-supported browser extension hijacker that claims to update your PC programs and drivers. In addition to managing the installation of your selected software, this install manager will make recommendations for additional free software that you may be interested in. Additional software may include toolbars, browser add-ons, game applications, anti-virus applications, and other types of applications. The hijacked homepage, softwareupdater.com, did not have valid legal privacy and disclaimer policies on its website as of publication date.

This software adds a Windows Task Scheduler in order to launch the program at various times, including system startup. The software has access to all installed applications on your PC and can install bundled products with unwanted malware. It is also commonly distributed in bundles with unwanted software. Several anti-virus programs have classified this software as malware and are therefore not recommended.

About Browser Hijackers

Browser hijacking means that a malicious code has control over and modified the settings of your internet browser, without your consent. They’re made to interfere with browser programs for several purposes. The idea is to force users to visit specific sites that are trying to increase their visitor traffic and produce higher ad revenue. It may appear harmless, but most of these sites are not legitimate and could present a severe threat to your online safety. Browser hijackers can even allow other malicious programs without your knowledge to further damage your computer.

How to determine if your web browser is hijacked

The common symptoms that indicate having this malicious software on your computer are: 1. home page is changed 2. you find new unwanted bookmarks or favorites added, typically directed to advertisement-filled or pornography websites 3. the default search engine has been changed and your browser security settings have been lowered without your knowledge 4. you find unwanted new toolbars added 5. you may find many pop-up ads on your computer screen 6. your internet browser has become unstable or starts running sluggishly 7. you can’t go to specific websites such as home pages of anti-malware software.

Exactly how browser hijacker infects computers

Browser hijackers infect PCs in numerous ways, including via a drive-by download, a file-share, or an infected email. Many web browser hijackings come from add-on software, i.e., browser helper objects (BHO), toolbars, or extensions added to web browsers to provide them additional functionality. Also, certain freeware and shareware can put the hijacker in your PC through the “bundling” technique. Some of the well-known hijackers are SoftwareUpdater, Conduit Search, Babylon Toolbar, OneWebSearch, Sweet Page, and CoolWebSearch. Browser hijackers may record user keystrokes to collect potentially valuable information leading to privacy issues, cause instability on systems, drastically disrupt user’s browsing experience, and eventually slow down the computer to a point where it will become unusable.

Browser Hijacker Malware – Removal

Certain hijackers could be removed by just uninstalling the related free software or add-ons through the Add or Remove Programs in the Windows Control Panel. In some cases, it can be a tough task to identify and get rid of the malicious piece because the associated file could be running as part of the operating system process. Besides, browser hijackers might modify the Computer registry so it can be extremely tough to fix manually, especially when you are not a very tech-savvy person.

How To Get Rid Of Malware That Is Preventing Anti-Malware Installation?

Malware can cause many different types of damage to PCs, networks, and data. Some malware is meant to restrict or prevent things that you want to do on your computer system. It may not permit you to download anything from the net or stop you from accessing some or all of the internet sites, especially the anti-virus websites. If you’re reading this now, you’ve perhaps recognized that a malware infection is a reason for your blocked internet traffic. So how to proceed if you need to install an anti-virus software like Safebytes? Even though this type of problem can be difficult to circumvent, there are a few actions you can take.

Install the anti-virus in Safe Mode

In Safe Mode, you can change Windows settings, un-install or install some software, and eliminate hard-to-delete viruses and malware. In the event, the virus is set to load immediately when PC boots, shifting into this particular mode can prevent it from doing so. To start the computer into Safe Mode, hit the “F8” key on your keyboard right before the Windows boot screen comes up; Or after normal Windows boot up, run MSCONFIG, check “Safe Boot” under Boot tab, and click Apply. As soon as you restart into Safe Mode with Networking, you could download, install, as well as update the anti-malware program from there. At this point, you could run the antivirus scan to remove viruses and malware without hindrance from another malicious application.

Switch to an alternate browser

Some malware only targets certain internet browsers. If this sounds like your situation, utilize another browser as it might circumvent the virus. The best solution to avoid this problem is to select a web browser that is well known for its security measures. Firefox contains built-in Malware and Phishing Protection to help keep you secure online.

Install and run anti-malware from your flash drive

To effectively remove the malware, you might want to approach the issue of running anti-virus software on the affected computer system from a different perspective. Adopt these measures to run the antivirus on the affected PC. 1) Download the anti-malware program on a virus-free PC. 2) Mount the USB drive onto the same computer. 3) Run the setup program by double-clicking the executable file of the downloaded application, which has a .exe file extension. 4) Pick a thumb drive as the place when the wizard asks you exactly where you want to install the program. Follow the on-screen instructions to complete the installation. 5) Disconnect the pen drive. You can now use this portable anti-malware on the infected computer. 6) Double-click the anti-malware program EXE file on the flash drive. 7) Run Full System Scan to detect and get rid of all types of malware.

Features of SafeBytes Anti-Malware

Want to install the best anti-malware software for your computer system? You can find many applications available that come in paid and free versions for Windows systems. Some of them do a great job in getting rid of threats while some will affect your PC themselves. You must be careful not to choose the wrong application, especially if you purchase a paid software. Among few good programs, SafeBytes Anti-Malware is the strongly recommended software for the security-conscious individual. SafeBytes anti-malware is really a powerful, highly effective protection application made to assist users of all levels of IT literacy in identifying and eliminating harmful threats from their computers. Through its cutting-edge technology, this software protects your PC against infections brought on by different types of malware and similar threats, including spyware, adware, computer viruses, worms, trojan horses, keyloggers, ransomware, and potentially unwanted program (PUPs). SafeBytes possesses a plethora of great features that can help you protect your laptop or computer from malware attack and damage. The following are some of the best ones: Real-time Active Protection: SafeBytes delivers complete and real-time security for your laptop or computer. They are very efficient in screening and getting rid of different threats because they are constantly revised with new updates and safety measures. Best AntiMalware Protection: This deep-cleaning anti-malware application goes much deeper than most antivirus tools to clean your personal computer. Its critically acclaimed virus engine finds and disables hard to remove malware that conceals deep inside your computer. Safe Browsing: SafeBytes gives an instant safety rating about the web pages you’re about to check out, automatically blocking unsafe sites and make sure that you’re certain of your online safety while browsing the net. Lightweight Tool: SafeBytes is a lightweight and easy-to-use antivirus and antimalware solution. As it uses minimal computer resources, this application leaves the computer’s power exactly where it belongs: with you actually. Premium Support: You may get absolutely free 24/7 technical support from their computer experts on any product queries or computer security issues.

Technical Details and Manual Removal (Advanced Users)

If you wish to manually remove SoftwareUpdater without the use of an automated tool, it may be possible to do so by removing the program from the Windows Add/Remove Programs menu, or in cases of browser extensions, going to the browsers AddOn/Extension manager and removing it. You will likely also want to reset your browser. To ensure the complete removal, manually check your hard drive and registry for all of the following and remove or reset the values accordingly. Please note that this is for advanced users only and may be difficult, with incorrect file removal causing additional PC errors. In addition, some malware is capable of replicating or preventing deletion. Doing this in Safe Mode is advised.

The following files, folders, and registry entries are created or modified by SoftwareUpdater

Files: C:Program FilesSoftware UpdaterSoftwareUpdater.exe C:Program FilesSoftware Updatersuscan.exe C:Program FilesSoftware Updater C:Program FilesSoftware Updater cpprest120_xp_1_4.dll C:Program FilesSoftware Updater cpuidsdk.dll C:Program FilesSoftware Updater DriversHQ.SDK.REST.Win32.dll C:Program FilesSoftware Updater msvcp120.dll
Read More
DuckDuckGo for better privacy
Many of us are taking the google search engine for granted and it is no true that it has crawled in almost every spore of our digital lives but if we wanted a little more privacy? Do we have options or we are destined to use google and send our information to this company. What if we really wanted that our searches are well safe, secure, and private? We could try other search engines like BING but since BING belongs to Microsoft we would exchange only one company for another without making any progress in the privacy battle. Enter DuckDuckGo. DuckDuckGo is a privacy-focused search engine that’s been online since 2008. Find websites, maps, videos, news, and more without tracking your searches and serving you targetted ads. It took DUckDuckGo as you can tell sometimes to gain ground and to be recognized but finally, it got the attention it deserves. Its big breakthrough happened in September of 2014 when Apple offered it as a default search engine in Safari and since it has gained more and more ground. It seems people care about their privacy after all. Since then DuckDuckGo has been gaining ground and all the major browsers have integrated it as an option for a default search engine. In this article, we will show you how to switch to DuckDuckGo and set it as your preferred search engine in all major browsers.
  1. Google Chrome

    Launch Chrome and click on the three dots in the upper right. Choose settings. Choose Search engine in the list on the left of the screen. Click on the drop-down box next to Search engine used in the address bar and choose DuckDuckGo.
  2. Mozilla Firefox

    Launch Firefox, click on the three lines hamburger menu icon in the top-right corner of the window. Click on Preferences. Click on Search in the menu to the left of the screen. Under Default Search Engine, click the drop-down box and choose DuckDuckGo.
  3. Microsoft Edge

    Click on the three dots menu button in the top-right corner of the window Then select Settings. Click on Privacy, Search and Services in the menu that appears on the left Scroll down to the Services menu and choose Address bar and search. Click the dropdown menu next to Search engine used in the address bar and choose DuckDuckGo.
  4. Apple Safari

    Click Safari in the menu bar at the top of the screen Then click Preferences. You can also use the Command+, shortcut to quickly bring up Safari’s Preferences. Click on the Search tab, then choose DuckDuckGo under the Search engine drop-down box.
  5. Opera

    Click on the Settings cog button in the sidebar on the left of the screen. Under Basic settings scroll down until you see Search engine and a drop-down box. Select DuckDuckGo from the list.
Read More
How to Fix Windows 10 Error 0x800488AB

Code 0x800488AB – What is it?

The Error Code 0x800488AB will appear when a user is in the Windows 10 Mail app and has provided an Outlook.com e-mail address. The mail app will give a message that the “account information is out of date” and it does provide an option to fix the issue. After clicking the Fix button, this error code will show up to the user. Common symptoms include:
  • A dialog box will appear with the Error Code 0x800488AB
  • Microsoft Windows 10 Mail App will not retrieve (or subsequently send) mail
  • User cannot delete and re-add the Outlook email account in the Windows 10 Mail app
  • User can still access and log in to various Microsoft websites, including logging into the Outlook Mail website

Solution

Restoro box imageError Causes

This error can be caused by a few different actions of the user when they have changed a password or a PIN number to access their Outlook mail. This error does have a relatively easy fix after the cause is determined and where the break-in information has occurred. A few of the causes may be:
  • If the user changes their password on the Microsoft website and uses the alternative PIN login method to access the Mail App.
  • The log-in information on the Microsoft website does not match the login information on the Windows 10 App.
  • The login information was changed on the Microsoft website and was not updated to reflect on the Windows 10 Mail app.
The Microsoft website and Microsoft Mail app do not share the knowledge of the change in login credentials, therefore the log-in credentials appear to be incorrect when trying to access the Microsoft Mail app. It should be noted that a user may bypass the password option if they log in to the Microsoft Mail app while using the alternative PIN log-in method, thus still leaving the password undetected.

Further Information and Manual Repair

As is the case with all new technology and having a few wrinkles, the release of Microsoft Windows 10 is not left out. There have been a few discussions of errors and bugs, including Error Code 0x800488AB. As of right now, there are three different methods that can be utilized by any at-home user. These methods are rather simple and make sense when the problem has been identified.

Method 1:

Run the built-in Windows Store Apps troubleshooter:
  1. Press the Windows Key and then type ‘troubleshoot’ and hit Enter
  2. Select “View all” on the left panel and run the “Windows Store Apps” troubleshooter from the list displayed and see if it works.

Method 2:

Use the System File Checker tool to repair corrupted or missing system files:
  1. Click Start.
  2. Type cmd, and then press CTRL+SHIFT+ENTER to open the elevated command prompt (I.e. Command prompt with administrative rights).
  3. The User Account Control window should appear, be sure that the action it exhibits is correct, and then press the Continue button.
  4. Type or copy-paste the below command line into it without quotes:
“Sfc /scannow”

Method 3:

  1. Press the Windows Key
  2. Search for "Credentials Manager"
  3. Click on Windows Credentials
  4. Look for any reference to your windows account (generally your @outlook.com is listed)
  5. Delete them.
  6. Then select your account at the top of the start menu and select Log Out.
  7. If using a Pin Code, switch to type input and put your password into the box.
When you go to Mail, and select "Fix Issues" it will detect your password and your account should sync with new emails. In some cases, depending on why this particular error code was caused, you may have to use a powerful automated tool to have it resolved.
Read More
Your password may have expired or ...
There are instances when you have to connect to another Windows 10 PC via remote connection from another Windows 10 PC. However, when you encountered an error saying, “Your password may have expired or the remote pc might not accept blank passwords” while doing so then read on as this post will walk you through how you can fix it. Here is the full content of the error message:
“Your password may have expired, or the remote PC might not accept blank passwords. Try connecting again. If this keeps happening, ask your admin or tech support for help.”
It is unknown what the exact cause of the error message is as it could involve several factors. Even so, there are still various potential fixes you can try to fix this kind of error. You can try to check if your password has expired or troubleshoot any issues with the network. You could also use a remote desktop application or configure the settings of firewall or restart the remote desktop service. For more details, refer to each one of the given options below. But before you proceed, make sure that you have someone to help assist you on the other side to help you troubleshoot the issue.

Option 1 – Try to check if the password has expired

The first thing you can do to fix the problem is to check if the password has expired as it could be the reason why you’re experiencing this problem. You have to make sure that you are using a user account that is on the remote computer and then check if the user account password has not expired yet. And if your PC is not within your access, then you can just ask someone to verify the password for you.

Option 2 – Try to troubleshoot network issues

To troubleshoot network-related issues that might be the one that triggers the error, you need to run the Network Troubleshooter. To get started, refer to these steps:
  • Open the Search bar on your computer and type in “troubleshoot” to open the Troubleshoot settings.
  • Next, scroll down and select the “Network Adapter” option from the right pane.
  • Then click on the Run Troubleshooter” button.
  • After that, your computer will check for any possible errors and will pinpoint the root cause of the problem if possible.
  • Restart your computer.

Option 3 – Try to use a remote desktop software

A number of users reported that the issue occurred when they used the universal app for Remote Desktop and they were able to fix it by switching to the Remote Desktop application. Thus, you can try to switch to the remote desktop software and see if it fixes the problem or not.

Option 4 – Try to configure Firewall settings

You might also want to configure the settings of the Firewall as it could also help in fixing the problem. It is possible that the firewall is blocking the incoming connection on the remote computer. To check if whether the firewall is the culprit or not, follow the steps below.
  • Go to Windows Security and then go to Firewall and network application.
  • Next, click on the Advanced Settings link. This will open the classic Windows Defender Firewall and Advanced Security application.
  • From there, look for the rule named “Remote Desktop – User Mode (TCP-In)” under inbound rules and check if it has been disabled or not.
  • If the rule is disabled, you have to enable it.
  • Once done, check if the error is now fixed or not.

Option 5 – Try to restart the Remote Desktop service

If none of the four given options given above worked, you might want to restart the Remote Desktop service as it can help you in fixing the problem. To do so, follow these steps:
  • Tap the Win + R keys to open the Run dialog box and type “services.msc” in the field and hit Enter to open the Windows Services Manager.
  • Next, from the list of services, look for the Remote Desktop Service and right-click on it, and then click on the Restart option.
  • Once done, check it was able to fix the “Your password may have expired or the remote pc might not accept blank passwords” error or not.
Read More
Error occurred while checking for updates in VLC
There is no doubt that the VLC media player is one of the best kinds of media players available today. However, it is not without any issues and one of the common issues encountered by users is VLC’s inability to be updated. And when you try to update VLC, you only get an error message saying, “An error occurred while checking for updates”. This inability to update VLC can be quite a headache for many users especially the ones who are facing other issues in VLC and has to update it in order to resolve them. So how will you update VLC and fix its issues when you can’t even update it in the first place? Worry not as this post will help you out. Refer to the suggestions laid out below to resolve the issue in updating VLC.

Option 1 – Check if VLC is not being blocked by the Firewall

There are instances when the Firewall like the Windows Defender Firewall blocks VLC for some unknown reason without your knowledge. Thus, you need to allow VLC to get past the Firewall in order for you to fix the issue else you won’t be able to send out a network communication. To do that, follow the steps below.
  • Tap the Windows key + I to open the Settings app.
  • Then click on the Update & Security option.
  • After that, click on Windows Security and click the Open Windows Defender Security Center option. This will open the Windows Defender antivirus and antimalware program.
  • From there, click on Firewall & network protection.
  • Next, click on Allow an app through Firewall. You should see a list of programs. Scroll down until you see VLC and make sure that all the boxes are ticked including the Public and Private ones.
  • Once you’re done, restart your PC and then try updating VLC again.
  • Just open VLC and select the Help menu and click on Check for Updates.

Option 2 – Try running the VLC media player as an administrator

There are programs designed for Windows 10 that won’t work fully unless some parameters are met. In most cases, starting the program as an admin should resolve the problem, thus, that’s what you have to do to try and fix the “An error occurred while checking for updates” in VLC.
  • First, right-click on the VLC Media Player desktop icon and then select the “Run as administrator” option or you could also right-click on the icon and click on Properties.
  • After that, click the Compatibility tab and then tick the box labeled “Run this program as an administrator”.
  • Next, click the OK button and then open VLC again and try updating it. That should fix the problem.
Read More
1 2 3 171
Logo
Copyright © 2023, ErrorTools. All Rights Reserved
Trademark: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: ErrorTools.com is not affiliated with Microsoft, nor claims direct affiliation.
The information on this page is provided for information purposes only.
DMCA.com Protection Status