iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to remove DeathOfShadow Ransomware and decrypt .Death_Of_Shadow files

0
DeathOfShadow is a ransomware virus that encodes access to system-stored files (using AES+RSA algorithms) and demands victims to pay money for decryption. During encryption, it also assigns its own .Death_Of_Shadow extension to highlight the blocked data. For instance, a file like 1.pdf will change to 1.pdf.Death_Of_Shadow and become inaccessible. After all targeted files end up restricted, the virus creates a text note called (Malakot@protonmail.com).txt or (malakot@tutanota.com).txt depending on what ransomware version attacked the system. The text note is where cybercriminals outline decryption instructions for their victims. Overall, it is said victims have to contact extortionists through their e-mail address. Following this, victims will supposedly be given further guidelines on how to pay money and return the files. As a rule, most cybercriminals make demands to pay ransoms in crypto as it is an untraceable and safe way to receive fraudulent earnings. In addition, threat actors offer to test their decryption abilities implying that victims can send a file (non-valuable and up to 10 MB) and get it decrypted for free. The text in the ransom note also warns that unless victims establish contact with cybercriminals within 48 hours, the decryption of files will no longer be possible.

How to remove Mztu Ransomware and decrypt .mztu files

0
If your files became unavailable, got weird icons, and got .mztu extension, that means your computer got hit by Mztu Ransomware (also known as STOP Ransomware or Djvu Ransomware). This is an extremely dangerous and harmful encryption virus, that encodes data on victims' computers and extorts ransom equivalent of $490/$960 in cryptocurrency to be paid on an anonymous electronic wallet. If you didn't have backups before the infection, there are only a few ways to return your files with a low probability of success. However, they are worth trying, and we describe them all in the following article. In the text box below, you can get acquainted with the contents of _readme.txt file, which is called "ransom note" among security specialists and serves as one of the symptoms of the infection. From this file, users get information about the technology behind the decryption, the price of the decryption, and the contact details of the authors of this piece of malware.

How to recover lost or corrupted Microsoft Access Database (*.mdb, *.accdb files)

0
Microsoft Access is a great and widely-used tool for storing and managing databases of files. Those familiar with this tool know how important it is in a variety of industries. Unfortunately, sometimes users tend to encounter various errors and problems while accessing *.mdb, or *.accdb files due to corruption in the Microsoft Access database. Our guide will help you repair your Access database and recover files if they have been damaged or corrupted. You can choose to go either through the manual steps for both repairing and recovering databases or use a specialized utility called Stellar Repair for Access with easy-to-use functionality for solving Access-related issues in just a few steps.

How to remove Mzqw Ransomware and decrypt .mzqw files

0
Mzqw Ransomware (aliases: Djvu Ransomware, STOP Ransomware) is an extremely dangerous file-encrypting virus, that extorts money in exchange for decrypter. Ransomware utilizes a strong AES-256 encryption algorithm and makes files unusable without decryption master key. Particular malware in this review appeared in the end of January 2023 and appends .mzqw extensions to files. As a result, file example.jpg converts to example.jpg.mzqw. Mzqw Ransomware creates a special text file, that is called _readme.txt, where hackers give contact details, overall information about encryption, and options for decryption. Threat places it on the desktop and in the folders with encrypted files. Cyber-criminals can be contacted via e-mail: support@freshmail.top and datarestorehelp@airmail.cc.

How to remove SecureAgent Ransomware and decrypt .secured files

0
SecureAgent is a ransomware virus that encrypts system-stored data and blackmails victims into paying money for its decryption. Along with encrypting access to data, the ransomware also assigns the .secured extension to highlight the blocked files. For instance, a file originally named 1.pdf will change to 1.pdf.secured and reset its icon as well. After encryption is done, the virus changes the desktop wallpapers and displays a pop-up window containing decryption guidelines. Overall, the window features a deadline timer for transferring $120 (in Bitcoin) to the cybercriminals' crypto address. After the given time expires, the decryption key for unlocking the data will supposedly be deleted making files permanently inaccessible. Developers behind SecureAgent do not provide any contact information, which makes it unclear how they will send a decryption key after the payment.

How to remove Poqw Ransomware and decrypt .poqw files

0
Poqw Ransomware (also known as STOP Ransomware) is a cynical virus that knocks out the soil and leaves users at a loss because it affects the most intimate type of information - personal photos, videos, e-mails, as well as documents, archives, and other valuable data. Ransomware is a type of threat that not only encrypts those files, but demands a buyout. STOP Ransomware is officially the most widespread and dangerous virus among the file-encrypting type of malware. There have been more than 500 versions of it and latest struck with .poqw extensions. Such suffixes are added by Poqw Ransomware to files it encodes with its powerful AES-256 encryption algorithm. In 99% of cases, its algorithms are unbreakable, however, with instructions and utilities covered in this article you get this 1% chance of recovery. Firstly look at the ransom note, that Poqw Ransomware copies to the desktop and affected folders.

How to change too small font in Outlook

0
If you think your font is too small or large while reviewing or writing e-mail messages in Microsoft Outlook. This applies to seeing subject lines/column headers in the message list overview and also reading, composing, replying, or forwarding an e-mail message. This short article will quickly guide you through how to adjust different kinds of text in Outlook - down below. You can temporarily enlarge or decrease the appearance of text while reading or writing a message using the Zoom feature. Unfortunately, the zoom that you choose applies only to the message you are reading, which means it will reset back to its default value after you switch to another message. Though, the setting can be memorized for all messages if you have Outlook version 1901 or newer installed. Here are the instructions on how to use the Zoom feature and also memorize its settings (since version 1901).

How to fix OneDrive error code 0x800701AA

0
Some users get unlucky to encounter error code 0x800701AA when trying to download, copy, or even open shared files in Microsoft OneDrive. Here is the kind of message that users get to witness once the error occurs: Error 0x800701AA: The Cloud operation was not completed before the time-out period expired. This issue can arise due to a number of factors - such are usually unstable internet connection, corrupted OneDrive cache, insufficient space on your drive, problems with network certificate, and even that the file being downloaded is too large. In rarer cases, it can also be an external issue on OneDrive servers, which is not dependent on users and the solution is simply to wait until it gets resolved. You can check whether OneDrive servers experience any problems using this DownDetector page. If multiple attempts to resume the download process results in consistent failure, then there might a problem that you should take care of. We encourage you to take use of our guidelines below and try each solution we offer. They will most likely fix your issue and remove the 0x800701AA error when using your files in OneDrive. The instructions were written on the basis of Windows 11, however, most of the steps are very similar on Windows 10 as well.