iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to transfer data from Android to iPhone

0
Just a few years ago, the level of interaction between iOS and Android systems was extremely poor and brought vast inconveniences for those who used two devices at the same time. Even optimization between Windows and Mac experienced severe problems forcing users to find circuitous routes for doing various things. One of such eternal problems has been the question of how to transfer different kinds of data between both operating systems, which still continues to remain acute nowadays. Luckily, it has become a lot easier with an upgrade of in-built iOS and Android features and also the rise of third-party utilities alleviating a number of tasks, such as transferring data from one device to another, for instance. If you are wondering how to transfer your data/files (photos, documents, contacts, smartphone settings, etc.) from Android to iPhone, then this article will be exactly for you. Below, you will find a number of methods ranging from traditional to more advanced ways of transferring smartphone data. Note that some instructions will require you to have a PC or laptop by your hand.

How to remove Azov Ransomware and decrypt .azov files

0
Azov is a ransomware infection that restricts access to data by running its encryption. During this process, the virus assigns the .azov extension to all affected files and creates the RESTORE_FILES.txt note in each folder with encrypted data (including desktop). For instance, a file originally named 1.png will change to 1.png.azov and reset its original icon.

How to remove Maze Ransomware and decrypt .maze files

0
Maze is a ransomware program discovered by one of the malware researchers named Jérôme Segura. This infection has been observed using RSA-2048 + ChaCha encryption algorithms and distributed in several different versions. Depending on the version that attacked the system, victims may see either .maze or .ILnnD extensions added to their files. For instance, an original file like 1.pdf may end up 1.pdf.maze or 1.pdf.ILnnD after successful encryption. After this, the virus changes desktop wallpapers and creates either DECRYPT-FILES.html or DECRYPT-FILES.txt files, again depending on the version of ransomware. Make sure you read our article below to potentially decrypt your data for free.

How to remove Phobos-Duck Ransomware and decrypt .duck files

0
Duck is a recent file encryptor developed and published by the Phobos ransomware family. While blocking access to data, the virus alters files' appearance by adding the generated victim's ID, cybercriminals' e-mail, and .duck extension as well. For instance, a file originally named 1.pdf will change to something like 1.pdf.id[9ECFA84E-3316].[supprecovery@torguard.tg].duck, reset its icon, and become no longer accessible. Once all data ends up encrypted, cybercriminals display decryption instructions in two ransom notes (info.hta and info.txt) to extort money from victims.

How to remove Killnet Ransomware and decrypt .killnet files

0
Killnet is a ransomware infection designed to encrypt personal data. During encryption, it assigns the .killnet extension, forcing a vivid change in files' appearance. For instance, a file that was originally named 1.pdf will change to 1.pdf.killnet and become no longer accessible after encryption. To follow this stage of attack, the virus creates a text note called Ru.txt with text written in the Russian language. In addition, the ransomware replaces the desktop wallpapers as well. The information given inside this note is vague and does not give any clear guidelines on what victims should do. There are only a number of Telegram handles for different purposes named "donates", "support", and so forth. Normally, the goal of ransomware attackers is to extort money from victims by offering full decryption of data in return.

How to remove DAGON LOCKER Ransomware and decrypt .dagoned files

0
DAGON LOCKER is a new variant of Mount Locker ransomware. While encrypting access to data, the virus changes all files with the .dagoned extension. For instance, a file originally named 1.pdf will appear as 1.pdf.dagoned and become no longer accessible after encryption. Following this, cybercriminals create the README_TO_DECRYPT.html file to feature decryption instructions. Once opened, the file greets victims with information that all valuable files have been encrypted and exfiltrated to remote servers of cybercriminals. Unless victims contact extortionists using Tor Browser within 72 hours, the collected data may become leaked to the public. Unfortunately, it is usually impossible to decrypt files without the direct help of cybercriminals.

How to fix iPhone error 2005/2003

0
2005 and 2003 are two quite old error codes that one may encounter while attempting to update the firmware or restore their iOS devices through iTunes. The message appears in a pop-up window and usually looks like this (depending on whether you tried to update or restore your device): "The iPhone [device name] could not be restored. An unknown error occurred (2005/2003)." or "The iPhone [device name] could not be updated. An unknown error occurred (2005/2003).". Although there is no single reason for why these errors occur, they are often related to problems with USB cables, outdated software, compatibility issues, and other possible causes as well. Both 2005 and 2003 issues were reported a long time ago, but still continue to stretch their existence in the iPhone world of various issues. Below, we have gathered a list of the most common and effective solutions that will potentially help you get rid of the problem and successfully update your iPhone.

How to remove AROS Ransomware and decrypt .ARS files

0
AROS is an infectious program categorized as ransomware. Software of such is designed to run encryption of system-stored data and blackmail victims into paying the so-called ransom fee for decryption. After infiltrating the system, AROS has been observed to assign the new .ARS extension, accompanied by cybercriminals' e-mail and unique victim's ID. To illustrate, a file originally named 1.pdf will experience a change to something like 1.pdf.[5d3e178db8].[luckyguys@tutanota.com].ARS and become no longer accessible. The final step of AROS Ransomware is the creation of How_to_decrypt_files.txt, which is a text note containing decryption guidelines.