Format the external drive or control diskette with the command prompt

The only way I could reuse the external drive was to check for disk errors and format it if necessary.

If you find that your USB or external hard drive has become inaccessible in such a situation, this tutorial will help you by showing you how to check and format the hard drive for errors using CMD or the command prompt and hopefully access it again.

Check the disk with CMD

In the Windows 8 WinX menu, open a raised prompt and type the following :

/f E :

Here is the letter E of the USB or external drive – or any other drive – where you want to look for errors and correct them. So make sure you replace it with the correct letter in your case and press Enter. read more

Hardware that does not work on Windows 7/8/10

You must have noticed that when you disconnect a device from your Windows computer, safely remove the hardware

Because before disconnecting a device from your computer, you must prepare Windows for the change with this feature. This ensures that Windows has backed up all data on the device again and that the device is released from the hold. If you delete the device without using the Safely Delete Hardware function, you may damage your files and data. read more

File or folder permissions cannot be changed in Windows

When you create a new file or folder in Windows 10/8/7, the Windows operating system assigns it a default set of permissions called Effective Permissions. You may want or need to change these permissions from time to time.

File or folder permissions cannot be changed

But if, for some reason, you cannot set custom permissions for files or folders, here are some things you can try depending on your symptoms.

      1. If the Security tab is not visible : If you can only see the Share tab and NOT the Security tab, check the properties of this disk. The Security tab is only visible on NTFS drives and is NOT displayed if you are using the FAT file system. If you set permissions and then apply them to something other than the default location (this folder, subfolders and files), Windows Vista and later add a check mark in the Special Permissions box. You can now view the permissions assigned by clicking Advanced > Edit > Edit > User / Groups > Edit. You may need to scroll to the end of the permissions list to view them.
      2. You notice that check boxes are shaded for some users, and check boxes for these users are not available in the Permissions dialog box: Such permissions are inherited from the folder where the file/folder is stored and are not explicitly set. To interrupt the inheritance chain, click’Advanced’ in the’Security’ tab in the’Advanced Security Settings’ field, then click’Edit’ and finally’Include inheritable permissions from parent objects’.
      3. If authorization settings are not available: You must check your user accounts. Are you logged in as a member of the Administrators group? Or are you the owner of the object to define its permissions? If you are logged in as a default user, you can only see your own authorization settings. If you select another user/group in the Security tab, the authorization field is not available.

      If this does not help, use DropPermission to solve this problem immediately. For more information on troubleshooting file and folder permissions problems, see this article. read more

Control panel or empty system restore window in Windows 7/8/10

A handful of Windows 7/8/10 users have faced this problem. When they opened the Control Panel or system restore window, it looked empty or white.

In addition, some Windows users have also found that if they use.

Control Panel or System Restore

If you are faced with this problem, here are two things you might want to try:

Perform the system file check. Restart and see if it helped.

If this does not help, it can also happen if some of your affected DLL files are not saved for some reason. DLL is an abbreviation of Direct Link Library. DLLs are code libraries used in programming applications to work with the Windows operating system and other applications. They offer several functions in a single file. The advantage of DLL files is that they do not load your computer’s memory, since DLLs are loaded into memory only when the file is needed. read more

The hosted network could not be started when Windows was configured as a HotSpot

We all know that Windows 7 has added the function Wireless Hosted Network to the operating system -Windows for the first time, so you can transform your system -Windows into a hotspot to share data connections with different devices. We have already explained how to manually configure Windows as a hotspot. Today, we encountered a problem that prevented us from hosting the hotspot from a Windows 8 system.

The hosted network could not start

Every time we tried to start the hosted network , Windows came out with this error:

The hosted network could not start. read more

Create a program compatibility troubleshooting desktop shortcut

Programs or applications developed for earlier versions of Windows may also work in higher versions of Windows, but some may work poorly or not at all. As a last resort, you can try running Program Compatibility Troubleshooter to simulate the behavior of earlier versions of Windows when an older program does not work properly. The program can be better adapted to an older version of Windows. Program compatibility troubleshooting allows you to test your program in different modes (environments) and with different settings. This allows you to emulate earlier versions of Windows so that a program thinks it is running on the operating system it needs. read more

Lock, manage, edit the Hosts file under Windows 10/8/7

Hosts file in Windows

In this message we see its location and also how to manage, lock or edit Hosts file.

Host file location

The Hosts file under Windows is located at the following location :

C:WindowsSystem32DriverSetc

Lock the Hosts file to prevent hijacking

Imagine by clicking www.windowsbulletin.com and seeing a completely different website in your browser. Malware can redirect web addresses on your computer by modifying your Hosts file. This is called Host File Hijack.

To avoid host file hijackings, navigate to it, right-click it, select properties, and make it a read-only file . This will lock your Hosts file and prevent someone or any malware from writing to it. read more

Create a desktop shortcut to disable Enable Windows firewall

Windows Firewall helps protect your PC from hackers and malware. It is a powerful tool that allows you to customize protection and notifications for different network profiles such as Home, Work and Public. If you are connected to a public network such as a library or a café, you can block all incoming connections for security reasons. A firewall protects your system from unwanted problems, whether at home or at work.

If you frequently need to disable or enable the Windows firewall, you can create a shortcut on your desktop instead of going through the entire Control Panel. This is especially useful if you notice that the firewall is interfering with any of your running tasks. read more

ScreenBlur: Innovative locking screen to lock your Windows desktop

I just heard about this ScreenBlur tool, which can protect my computer data securely and privately from unauthorized viewing and could not resist the urge to share it with you. With ScreenBlur, I can temporarily lock my screen to prevent unauthorized access.

Although I am a Windows 8 user who already has my own default locking screen, I have found that Screenblur has taken a completely different approach to locking my screen and protecting it from unauthorized access.

After downloading the software from the trusted source, extract the files and run the Screenblur.exe configuration. When you perform the quick install, you will be prompted for a password. You can see a small padlock in the taskbar. Here you can lock your screen. read more

Data execution prevention or DEP function under Windows 10/8/7

Data Execution Prevention (also known as Execute code) from memory incorrectly, DEP closes the program.

Here are answers to some common questions about Microsoft Help Data Execution Prevention (DEP).

What programs does the DEP monitor? 12)
The DEP automatically monitors important Windows programs and services. You can increase your protection by having all programs monitored by DEP. To increase DEP protection, see Changing Data Execution Prevention Settings.

Yes, but only if you leave DEP enabled for this program so that Windows can continue to detect code execution attempts from protected locations and prevent attacks.
read more