iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to fix Windows Update error 0x80070490 in Windows 10

0
Error 0x80070490 is a problem stating a failure when trying to update your system. Being unable to keep your PC up-to-date due to such issues turns out to be quite spread around Windows users. Usually, these errors occur as a result of conflicts created by third-party software, lack of important elements, malware, and other things wrecking configuration settings. To solve this, we recommend you to follow the step-by-step guide presented below. A number of tested and efficient methods will help you say goodbye to this problem eventually.

How to remove Leitkcad Ransomware and decrypt .leitcad files

0
Leitkcad is a pure example of crypto-malware that runs encryption over personal data to garner a so-called ransom. The most vivid symptoms hinting at the Leitkcad's presence is the assignment of .leitkcad extension. In other words, it will be seen at the end of each file affected by malware. For example, a file like 1.mp4 will be changed to 1.mp4.leitkcad and reset its original icon. Then, once all of the files are changed, the virus moves to the next phase creating a note called help-leitkcad.txt. It contains information on the encryption as well as instructions to restore your data. Cybercriminals say that you should contact an operator and fill in your ID, personal key, and e-mail via the chat page. The link to it can be opened only by using the Tor browser, which has to be downloaded by victims. Then, after establishing contact with cybercriminals, you will receive further instructions on how to purchase the decryption software. Also, it is worth-noting that rebooting and altering encrypted files can lead to permanent loss. Extortionists set certain algorithms that help them detect your activity. This means that if you refuse to comply with any of the above warnings, your files will be deleted momentarily.

How to remove LuciferCrypt Ransomware and decrypt .LuciferCrypt files

0
A new cryptovirus known as LuciferCrypt stepped into the game a couple of days ago to encrypt personal data. As long as the study goes, it is already evident that this ransomware restricts access to data by assigning a long-string extension (.id=[].email=[].LuciferCrypt). A quick illustration of an infected sample would look like this 1.id=0ED53ADA.email=cracker.irnencrypt@aol.com.LuciferCrypt.mp4. After the encryption process is done, the virus continues its presence creating a text file called HowToRecoverFiles.txt. Within this document, extortionists are notifying victims about successful encryption. To revert it, victims should contact cyber criminals via e-mail and pay a fee to recover the files. Once done, your data will be decrypted automatically, without involving any manipulations. It is also said that the price directly depends on how fast you reply to the swindlers. Before doing that, you are also allowed to take advantage of free decryption. Developers offer to send up to 3 files (less than 4MB and non-archived), which should not contain valuable information.

How to remove Pump Ransomware and decrypt .pump files

0
After Pump Ransomware attacks your system, all data become chained by strong algorithms restricting access to it. The malware appends .pump extension to the files it encodes. For example, a file like 1.mp4 will acquire a new look of 1.mp4.pump and reset its original icon. The extension applied in the end means that your files are under encryption. Such modifications are usually accompanied by the creation of ransom instructions. In our case, the virus drops a text file called README.txt that will help you recover the files. The content presented inside is short, cybercriminals only attached their e-mail address to call victims into contacting them. Then, they will supposedly give further instructions on how to purchase the decryption software. No matter how far the price goes, complying with the requests of swindlers is risky - they may become foolish in their promises and leave you no tools even after making a payment.

How to remove MARS Ransomware and decrypt .mars or .vyb files

0
MARS Ransomware is a malicious program discovered by Michael Gillespie. The way it encrypts files is very similar to other infections of such type - by appending the new .mars or .vyb extension to highlight the affected data. Victims will see their files transform into something like this 1.mp4.mars or 1.mp4.vyb. As a result of these actions, files cannot be opened or manipulated by users in any way. To fix it and recover your data, cybercriminals offer to read instructions in a text note (!!!MARS_DECRYPT.TXT) created after encryption. It informs you that various data types stored on your PC have been encrypted with the virus. To revert it, people have to pay 500$ in BTC for the decryption key. Before doing so, extortionists strongly insist on sending up to 3 files for free decryption to make sure of their trustworthiness. After this, the cybercriminals team will reply back with the payment link towards purchasing their software. You can also contact developers via Telegram and buy the key right away without testing free decryption. Although such features provided by swindlers may instill trust in their intentions, it is recommended against agreeing on what they say, because there is no actual guarantee that they will return your data safe and undamaged.

How to fix DISM error 87 on Windows 10

0
DISM (Deployment Image Servicing and Management) is a tool created by Microsoft to solve system-related issues. Its application is constantly present in different guidelines helping to solve Windows errors. Unfortunately, some users experience trouble using DISM on their systems. When trying to launch it, the DISM error 87 appears and prevents people from booting the scan. Although DISM exists on older versions of Windows as well, the phenomenon is usually seen on Windows 10. As long as users tend to make mistakes in the spelling of commands, rectifying the issue is usually simple. Of course, there are other reasons prompting the issue such as lack of updates, corrupted files, malware presence, and so forth. Thus, make sure you try each method in the instructions below until it resolves the error.

How to get unbanned on Omegle

0
Omegle is an online platform initially fostered to expand the global impact of human communication. Its features allow people to have a one-on-one session with strangers paired from the whole globe. At the base of development, Omegle was considered a chat-only website. Soon after, it grew the numbers of traffic and brought in the usage of cameras and microphones. The idea behind developers was to provide a convenient and anonymous experience, not requiring to spend time on registration. Omegle can be a great tool to find new friends and talk about mutual interests (you can choose sports, films, video games, and other topics to match a stranger) with somebody you have never seen before. Unfortunately, the fact that there are some people propagating adult content in Omegle, security administrations are forced to put up a lock on accessing this platform. In addition to that, you can be banned by Omegle itself. The reason behind this can be related to reports thrown by other users. Omegle wants to create a friendly environment, so if you are being rude to others, then this may be the reason. You could also get banned after using copyrights-protected music or videos played in the background. Omegle has these rules listed in Terms and Conditions, so do not violate them. Whilst waiting until Omegle lifts up a ban from your IP-address can be draining, there are easy steps that will help you overcome such a constrain and continue using Omegle. To learn them, please follow the guideline below.

How to remove FileEngineering Ransomware and decrypt .encrypted files

0
FileEngineering is an example of ransomware-infection configuring files of victims to restrict access to them. Most of the time, users do not spot malware coming into the systems. Once upon a time, they end up seeing their data changed and locked from regular access. FileEngineering does it this way - by assigning victims' ID, cybercriminal's e-mail address, and .encrypted extension at the of the files. There are two versions of FileEngineering being spread around the web. The only difference is in using different e-mail addresses to contact swindlers. For example, you may see your data appear as 1.mp4.id=[BE38B416] Email=[FileEngineering@mailfence.com].encrypted or id=[654995FE] Email=[FileEngineering@rape.lol].encrypted depending on which version affected your PC. Then, the next step of FileEngineering's activity is creating a note called Get your files back!.txt that contains information regarding decryption. Inside of it, the information is addressed by a so-called security engineer. He says that you should contact him via e-mail and pay some amount of Bitcoin. Then, he will return your files decrypted and give some tips on improving your safety. Before that, you are also allowed to send a small file to prove he can unlock your data. Trusting cybercriminals is always a huge risk, so it is up to you whether you want it or not. If files are not of big value to you, you can simply delete FileEngineering and continue using your PC.