iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to uninstall stubborn apps on Mac

0
Some apps installed on Mac can be extremely annoying and piss off many users that struggle to delete them. This is especially popular with low-reputation products that try to stick around systems as long as possible. Rather than developing their own quality, they focus on making their apps undeletable to force inexperienced people to continue the usage. Oftentimes, manual uninstallation of such apps can leave lots of residual files that will accumulate over time loading up system resources. If you consider yourself part of this category, we will help you unchain your Mac from persistent software that mulishly hangs inside of your system.

The microphone is not working in Windows 10. How To Fix It?

0
Since the rise of electronic technologies, the way people percept the world has changed beyond recognition. The Internet became one of the breakthroughs in communications and regular lifestyle. Microphones themselves have been playing a significant role in building a bridge between speakers all over the world. They get constantly upgraded with new features to make your voice sound better and clearer. Now, everybody who owns a laptop or smartphone, has microphones built-in already as a staple thing. Those who gravitate towards higher quality, buy external devices and plug them in configuring settings for personal needs. Unfortunately, some users of Windows 10 experience issues with sound recording devices for unknown reasons. This can be related to various reasons like driver issues, damaged port (USB), and others. If you are one of them, we will help you seal the problem down below.

How to remove Scott.Armstrong Ransomware and decrypt .LOCKED files

0
Scott.Armstrong is a ransomware virus that encrypts sensitive files by appending the .LOCKED extension. This is meant to highlight the blocked data and catch the attention of infected victims. For example, a file like 1.pdf will change to 1.pdf.LOCKED and reset its original icon. After this, users will no longer be able to access their data as previously. Rigth at the end of encryption, the virus triggers a pop-up window called HOW_TO_RECOVER_MY_FILES.hta to open. It also creates a separate text note (HOW_TO_RECOVER_MY_FILES.txt) containing detailed instructions on how to return your data. The text note instructs victims to install the qTox private messenger and contact developers using the provided TOX-ID. Alternatively, you may also establish contact with cybercriminals through e-mail by sending your Key Identifier, which is attached in the note. You are also allowed to send up to 3 files together with the Key ID to get them decrypted for free. These files should be less than 5MB each, non-archived, and do not contain any valuable information (e.g. databases, backups, large excel sheets, etc.). Based on the message content, it is clear that Scott.Armstrong puts more emphasis on infecting company networks to export bigger amounts of ransom.

How to remove Willow Ransomware and decrypt .willow files

0
Willow encrypts personal data using cryptographic ciphers, alters file extensions to .willow and demands 500$ payment to reset the assigned changes. All of these traits categorize it as ransomware. A sample of encrypted data would look something like this 1.pdf.willow. The files will lose their original shortcut icons as well. Willow Ransomware also changes desktop wallpapers and creates the READMEPLEASE.txt text note. Both wallpapers and text note display the same ransom instruction that victims should follow to recover the data. It is said victims should pay 500$ in BTC to the attached Bitcoin address unless they want to lose their files forever. It is also mentioned third-party decryptors will not be able to remove ciphers applied to files by Willow. Unfortunately, this is nothing, but true as many ransomware infections use high-grade encryption algorithms and store their keys on online servers. For this reason, manual decryption very often appears to be impossible. We do not recommend you pay the required ransom because there is a risk to get scammed eventually. Extortionists hold fame for dumping their victims and not sending any decryption tools even after receiving the money.

How to fix “The action cannot be completed because the file is open in...

0
The action cannot be completed because the file is open in another program is a message reflected in the "File in Use" window when trying to delete, rename, or move specific files and folders. The error appears because the manipulated file or folder is currently used by some application or background process. In most cases, it is enough to find and terminate the process that uses the file or simply restart your PC. However, there are situations when none of the above helps you get rid of the problem. The issue may keep reiterating itself even after rebooting the system. Unfortunately, the featured message offers no real solution on how to avoid this problem. Intuitively, users should stop the related process and try to delete or move their files afterward. Sometimes there are simply no related processes visible, which means users are unable to shave them. Luckily, there are potential prospects to address this issue and restore full control of the file. Follow this bundle of methods below that will help you remove the issue potentially.

How to remove Mallox Ransomware and decrypt .mallox files

0
Mallox is the name of a ransomware virus able to encrypt all valuable data stored on a PC. The file-encryptor uses strong encryption algorithms to assign unique ciphers and deny further access to data. It also attaches the new .mallox extension meant to highlight the blocked data. To illustrate, a file like 1.pdf will change to 1.pdf.mallox and reset its original icon. Note that removing the .mallox extension will not help you open the file as long as it is encrypted. After successful encryption, the virus opens and places a text note called RECOVERY INFORMATION.txt onto your desktop that contains ransom instructions. The file says only unique decryption software will be able to access your data. In order to get it, users should send an e-mail letter with their personal ID to cybercriminals. Then, victims will be given further instruction on how to purchase the decryption tool. It is also mentioned there is a possibility to test free file decryption by sending a few encrypted samples that do not contain valuable data. Before you start thinking about recovery options, we have to inform you about the risks of paying the ransom. Many cybercriminals fool their victims and do not send any decryption instruments even after receiving the money.

How to remove Thanos Ransomware and decrypt .steriok, .cyber or .crystal files

0
Also known as Hakbit, Thanos is a ransomware group that develops a number of file-encrypting infections. It was first discovered by GrujaRS, an independent security researcher specializing in ransomware. The virus has quite a long genealogy tree with lots of different versions using AES algorithms to run file encryption. Each of them has a separate extension that is assigned to encrypted data. The most recent are .steriok, .cyber, and .crystal. If you spotted the change of shortcut icons along with extensions, this means your files have been successfully encrypted. To illustrate, a file like 1.pdf will change to 1.pdf.steriok, 1.pdf.cyber, 1.pdf.crystal or similarly depending on which version infiltrated your system. After encryption, Thanos creates either HOW_TO_DECYPHER_FILES.txt, HELP_ME_RECOVER_MY_FILES.txt or RESTORE_FILES_INFO.txt text files. These are the names of ransom notes containing instructions on how to redeem your data.

How to remove Zoom Ransomware and decrypt .zoom files

0
Zoom is a ransomware program that runs encryption of data to demand money for its recovery. During file encryption, Zoom uses strong mathematical algorithms along with the .zoom extension that is appended to change files visually. For instance, a file like 1.pdf will change to 1.pdf.zoom and reset its default shortcut icon. The same will be seen across all other data targetted by Zoom Ransomware. After getting things done with the encryption, Zoom changes desktop wallpapers and creates the recover-youe-all-files.txt file containing ransom instructions.