Jump to content

Search the Community

Showing results for tags 'fix'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station


  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions


  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 9 results

  1. Microsoft has resolved a known issue leading to missing system and user certificates after updating managed Windows 10 systems using outdated installation media. The lost Windows 10 certificates issue impacts client (Windows 10 1903 or later) and server (Windows Server 1903 or later) platforms in managed environments. It occurs on devices upgraded using outdated bundles via update management tools (e.g., Windows Server Update Services (WSUS), Microsoft Endpoint Configuration Manager), physical media, or ISO images. Computers updated via Windows Update or Windows Update for Business are not affected as they always receive the latest feature updates. The certificates related to this issue include: Certificates in user, personal, machine, and Root CA stores Azure Active Directory Domain Join (AADJ) state and scenarios that rely on AADJ Access to EFS encrypted files Issue resolved, 20H2 refreshed media coming soon The lost Windows 10 certificates issue is now resolved "when using the latest feature update bundles that were released November 9, 2020, for Windows Server Update Services (WSUS) and Microsoft Endpoint Configuration Manager" according to Microsoft. "For information on verifying you're using the latest feature update bundles, see How to address feature update refreshes in your environment. "If you are using or creating custom media, you will need to include an update released October 13, 2020 or later." Refreshed media to address this issue is not yet available for Windows 10 20H2 on Volume Licensing Service Center (VLSC) and Visual Studio Subscriptions (VSS, formerly MSDN Subscriptions), Microsoft says it will be made available during the following weeks. Workaround available Microsoft also provides a workaround for environments where the feature update bundles released earlier this month cannot be immediately deployed. To do that you will have to go to a previous Windows 10 version using instructions available on the Recovery options support document. "The uninstall window might be 10 or 30 days depending on the configuration of your environment and the version you’re updating to," Redmond says. "You will then need to update to the later version of Windows 10 after the issue is resolved in your environment." You can also increase the number of days you can go back to choose a previous system version using the following DISM command (make sure you do this before the default uninstall window lapses): DISM /Online /Set-OSUninstallWindow /Value:[days] You can choose any time interval between 2 or 60 days. If it's lower or above this range, the number of days will be automatically set to 10 days. Source
  2. Microsoft fixes Windows 10 crash issue causing forced reboots Microsoft has addressed a known issue causing Windows 10 20H2 devices to force restart due to the Local Security Authority Subsystem Service (LSASS) system process crashing. LSASS is a Windows process responsible for security policy enforcing and updating the security log, as well as for handling user logins, password changes, and access token creation. Whenever LSASS fails, logged in users immediately lose access to the accounts, with the device force restarting after displaying an error. The known issue fixed on Thursday affects both client and server Windows devices where local built-in accounts such as Guest or Administrator have been renamed. "This issue is caused by duplicate built-in user accounts being created with the same security identifiers (SIDs) and relative identifiers (RIDs) during the update to Windows 10, version 20H2," Microsoft explained. "SIDs and RIDs for built-in user accounts are well-known as documented here and must be unique on a given device." After acknowledging the issue in November 2020, Microsoft also applied an update block to prevent impacted devices from being offered or installing Windows 10 versions 2004 or 20H2. Compatibility hold blocking updates also lifted "As of January 7, 2020, this issue is now resolved and the safeguard hold has been removed when devices are using the latest feature update bundles and refreshed media," Microsoft says on the Windows Health Dashboard. "Please note, if there are no other safeguards that affect your device, it can take up to 48 hours before you will be able to update to Windows 10, version 2004 or Windows 10, version 20H2." Also, starting Thursday, Windows users should only receive the safeguard hold dialog or safeguard ID if they are using outdated feature update bundles or media. Refreshed media was released by Microsoft on December 3 on Visual Studio Subscriptions (VSS, formerly MSDN Subscriptions) and on December 7 on Volume Licensing Service Center (VLSC). Information on how you can verify that you're using the newly released refreshed media can be found here. Microsoft has also resolved a second issue causing crashes with blue screens on Windows 10 2004 or 20H2 devices when users plugged in a Thunderbolt NVMe (Non-Volatile Memory Express) Solid State Drive (SSD). Source: Microsoft fixes Windows 10 crash issue causing forced reboots
  3. FixiF 14.02.17 - Collection of important fault Fixers, iF you need.. Included Tools: 64bit Checker 1.4.3 - Detects if you have 32bit or 64bit version of Windows AdwCleaner 3.018 - AdwCleaner is a tool that deletes Adware, Toolbar PUPHijacker AppRemover - Uninstallation of antivirus and security software CCleaner 4.10.4570 - System optimization, privacy and cleaning tool Compact Tray Meter 1.1 - Utility to report CPU and RAM usage right off the notification tray area Defraggler 2.17.898 - Defrag your entire hard drive, or individual files Everything - Fast Search Engine GPU-Z 0.7.7 - Lightweight utility designed to give you all information about your video card and GPU HijackThis iReset 1.3 - Files & Folders Reset Tool Just Manager - multi-tabbed multi-pane file manager Recuva 1.50.1036 - File Recovery Revo Uninstaller 1.95 - Real-Time installation monitor RRT - Sergiwa Antiviral Toolkit Rufus - USB Drives Formater Speccy 1.25.674 - Advanced System Information tool for your PC USBDeview 2.29 - View all installed and connected USB devices on your system Note: Above all tools are freeware only.. Download: https://shared.com Share code: /1nh3mn80w4
  4. HolySatan

    [WTA] Icon Error Win 8

    how to fix this error?? or can anyone give me the "keyword" to help me google the problem & solution thx...
  5. Option to securely carry your user profile with you in next release The systemd-homed service, which enables portable home directories, has been merged into the code for systemd and will be included in the forthcoming 245 release. Systemd releases are typically every three to four months, and version 244 was finalised at the end of November 2019. The new merge includes over 21,000 additions to systemd. Once 245 is out, it will be up to individual Linux distributions to decide when to update it. Use of the new home directories service is optional. The purpose of the change is described here: Each directory it manages encapsulates both the data store and the user record of the user so that it comprehensively describes the user account, and is thus naturally portable between systems without any further, external metadata. Home directories in the new system support several storage mechanisms and may be located on a removeable drive. The user record is cryptographically signed so the user cannot modify it themselves without invalidating it. There is an option for encryption with fscrypt (applies encryption at the directory level), or mounting from a CIFS network share, or in a partition encrypted with LUKS2 (Linux Unified Key Setup). This last is the most secure approach. Systemd inventor Lennart Poettering described the new feature at the All Systems Go event in Berlin, September 2019, as reported here. Poettering said it would improve security as well as being more logical. "It solves a couple of problems we saw with traditional ways to manage home directories, in particular when it comes to encryption," he said in the release notes for version 245. One use case is where a user has a PC running Linux in both their home and office, and is able to carry their home directory with them on a portable storage device. The advent of cloud storage has made this less of a problem than would have been the case a few years back, and a common reaction to the new systemd approach is that the problems it fixes are not pressing and may be outweighed by potential incompatibilities. Source
  6. How to fix the Firefox 89 user interface A new interface design, called Proton, will launch in Firefox 89, scheduled for a release on June 1, 2021. Mozilla wants to modernize the user interface of the Firefox web browser with Proton. Firefox 89 ships with address bar, toolbar, tab and menu changes. One common denominator is that everything will be a big larger in the new interface. Proton will remove some options from Firefox, or hide them. The Compact density option won't be displayed anymore on the "customize" page of the browser if it has not been used in the past. While it is possible to restore it, most users won't because it requires editing a configuration preference that cannot be discovered accidentally. Firefox users who want a design that is more compact may use the linked guide above to enable the compact density option in the browser to start using it. Another option is to modify user interface elements with CSS. Firefox UI Fix includes CSS fixes that modify the Firefox 89+ user interface to make the interface more compact. It reduces padding and other design elements to improve the usability for users who prefer light interfaces over large ones. Here are two screenshots of the Firefox 89 interface after the fixes have been made. The first screenshot shows the normal density design, the second the compact density design. Installing Firefox UI Fix Installation is not as straightforward as installing a Firefox add-on, but it is not complicated either. First, you have to prepare Firefox to allow CSS files to modify the user interface: Load about:config in the Firefox address bar. Confirm that you will be careful. Search for toolkit.legacyUserProfileCustomizations.stylesheets. Use the toggle button to set its value to TRUE. Search for svg.context-properties.content.enabled. Use the toggle button to set the value of the preference to TRUE. Once done, download the two CSS files from the project's Github repository. Select userChrome.css first to display it on GitHub, then the RAW button to display it, and right-click on the page and use Save As to download it. The filename should be userChrome.css on your computer. Repeat the steps for the userContent.css file. In Firefox, load about:support and activate the "show folder" button next to Profile Folder; this opens the profile folder in the file browser on the system. You may close Firefox now. Create a "chrome" folder in the profile root if it does not exist. Place the two files, userChrome.css and userContent.css, inside the chrome folder, and start Firefox again. Firefox uses the CSS instructions and the interface is changed noticeably. Note that you may need to check the GitHub repository occasionally for updates. If the files have been updated, download them and replace the older files in the chrome directory. If you do know CSS, you may modify the information to customize the interface further. Landing Page https://github.com/black7375/Firefox-UI-Fix Source: How to fix the Firefox 89 user interface
  7. There is a 0-day vulnerability for Windows, called InstallerFileTakeOver, which Microsoft has yet to address. The vulnerability was discovered by Abdelhamid Naceri, a security researcher, who discovered two other 0-day vulnerabilities in Windows this year already. We mentioned the vulnerability in late November 2021 already here on this site. The issue was unpatched back then and Microsoft has yet to release a security update that addresses the vulnerability. Micro-patching company 0Patch released a free patch for the issue this week that is available to all users. The micropatch that 0Patch released is available for the following operating systems: Windows 10 version 1709 to 21H1. Windows 7 ESU Windows Server 2012, 2012 R2, 2016, 2019. Windows Server 2008 R2 ESU 0Patch notes that non-ESU Windows 7 and Windows Server 2012 installations are not affected by the vulnerability. Windows Server 2022 and Windows 11 are likely also affected, but not officially supported by the company yet (hence no patch). Windows 8.1 was not analyzed because of low interest in the particular version of Windows. The vulnerability takes advantage of rollback files that Windows Installer creates during installation. It stores files that are deleted or modified during the installation process, to allow rollbacks. The rollback file is created in system directories and then moved to a temp folder in the user's directory. Naceri discovered that a symbolic link can be placed in the location, so that the RBF file is moved to another location. The symbolic link points to a file on the system that is then made accessible to the user, provided that Local System has write access to it. Since Windows Installer is running as Local System, any file writable by Local System can be overwritten and made writable by the local user. The micropatch that 0Patch has created checks if the destination for the rollback file operation contains junctions or links. The operation is blocked if that is the case, or allowed otherwise. Patching systems with 0Patch micropatches requires a free account at 0Patch Central and the installation and registration of 0Patch Agent from the company. The patch is applied automatically, a reboot is not required. Here is a demo video that 0Patch published on YouTube: Here is the video of our micropatch in action. Without the micropatch, exploit works and a command line window is launched as Local System; with the micropatch, the code we correct in msi.dll determines that destination path contains a symbolic link, aborts the file move operation and triggers an "Exploit blocked" event. Check out the 0Patch blog for additional details. Now You: how do you handle unpatched vulnerabilities? Source
  8. PrintNightmare is a vulnerability that allows privilege escalation by letting regular users install fake printer drivers which grant hackers admin privileges. After a number of patched is various efficacy Microsoft has chosen to fix the issue with this month’s Patch Tuesday by requiring users to have admin privileges before they can install printer drivers. Microsoft notes: Our investigation into several vulnerabilities collectively referred to as “PrintNightmare” has determined that the default behavior of Point and Print does not provide customers with the level of security required to protect against potential attacks. Today, we are addressing this risk by changing the default Point and Print driver installation and update behavior to require administrator privileges. The installation of this update with default settings will mitigate the publicly documented vulnerabilities in the Windows Print Spooler service. This change will take effect with the installation of the security updates released on August?10, 2021 for all versions of Windows, and is documented as CVE-2021-34481. This means regular users will not be able to install printer drivers without the assistance of an admin, but given how rarely this is needed this is unlikely to be a major issue. If it is a major inconvenience however this behaviour can be bypassed via the registry, but this is of course not recommended. Admins can read more about the issue at CVE-2021-34481. via onMSFT Patch Tuesday fixes PrintNightmare by requiring admin privileges to install print drivers
  9. System Optimize Expert is specialized in: Overall scanning & repairing System Optimize Expert's reliable scanning covers your entire system, giving your PC the full-scale protection by repairing all the errors: invalid registry entries, system problems and so on.System improving Acting as your private doctor, System Optimize Expert is capable of offering professional diagnosis and treatment to ensure a stable and smooth system and keep it at peak performance.Offering the easiest operation You need not to be a computer talent to handle all its functions, as running System Optimize Expert is as simple as ABC. Try it, you will be totally impressed by its neat interface and solid features.Free version available Not just trial version. It's 100% free for your lifetime usage and upgrades. The scan, repair, optimization, etc. are also available.Automating protection* Enable the Automated Scan and Sweep, and you can also set a schedule of when and how often System Optimize Expert is about to launch. So you can enjoy the real-time protection without your trouble of clicks.And more *PRO Edition Only[Homepage] http://www.systemoptimizeexpert.com/ [Medicine] http://www.mirrorcreator.com/files/0N6T0WCJ/system.optimize.expert. Instructions: 1.Disconnect Internet. 2.Patch it. 3.Enter any serial no. 4.Activate manually. 5.Enter any unlock code. 6.Enjoy :rolleyes: :lol: ...BsB... :showoff: :rolleyes: ;)
  • Create New...