iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to fix error 0x0000011b “Windows cannot connect to the printer” in Windows 11/10

0
When trying to use a network-shared printer, some users may become subject to facing error 0x0000011b with the following message Windows cannot connect to the printer. It may appear while adding a printer to the list of new devices or making a printout - both on Windows 10 and 11. Whatever it is, this issue can be manageable with the help of our instructions below. These instructions are quite generic to all guides you see on the web, which confirms their efficiency in resolving the error. Try each of them down below until one of them sorts outs the problem. The first and probably the easiest method is to run the basic Windows Troubleshooter feature. The operating system designed by Microsoft has several troubleshooting tools for various devices to help detect and rectify basic issues related to them. We also recommend you try this easy solution before moving on to other ones below.

How to fix error 740 “We can’t install this printer right now” in Windows...

0
We can't install this printer right now is usually a 740 error that may chase down users while trying to add a new printer to the device list. This is the kind of message users tend to receive when facing this issue: "That didn’t work. We can’t install this printer right now. Try again later, or contact your network administrator for help. Error: #740." The most common reasons for its appearance are usually insufficient administrative privileges, problematic printer drivers, and other technical difficulties such as temporarily malfunctioned printer servers. In this guide, we are going to show you a couple of methods that may potentially resolve the error and let you connect your printer without the same problem occurring. When connecting a printer and therefore trying to add it, Windows does all the job in the background without you seeing many details. In this method, we will try and run the printer installation wizard manually - through the Command Prompt console. This will help initiate installation with administrative privileges and potentially succeed in doing so.

How to remove Sheeva Ransomware and decrypt .sheeva files

0
Sheeva is a recently-discovered ransomware infection that targets Windows systems to encrypt potentially important data and demand payment from victims for its decryption. While executing the virus system on our machine, Sheeva encrypted mostly business-related files which involved accounting, finance, and database information. It also renamed each file according to this pattern id[victim's_ID].[Sheeva@onionmail.org].[original_filename].sheeva. For instance, a file named 1.xlsx was renamed to id[xmrJ9Lve].[Sheeva@onionmail.org].1.xlsx.sheeva and dropped its original icon. After this, the ransomware infection created a text file named sheeva.txt to feature decryption instructions. Cybercriminals say that victims will have to pay some amount of money (unspecified) in Bitcoins to retrieve unique decryption tools. For this, users are instructed to contact swindlers using either Sheeva@onionmail.org or Sheeva@cyberfear.com e-mail addresses and also include their personally-generated ID. It is also allowed to send two files (under 5 MB) and get them decrypted for free. Many cybercriminals use this trick to show their decryption abilities and also motivate victims into further collaboration with them. Since Sheeva Ransomware targets business-related data, it is reasonable to assume that its scope narrows down to corporate rather than home users. This means the further announced price for decryption may be quite high and shy many victims away from decryption. Unfortunately, unless there are serious bugs and underdevelopment inside a ransomware virus, manual decryption without the help of extortionists is almost impossible.

How to stop Geek Squad e-mail scam

0
Alike other similar schemes, Geek Squad email scam is designed to trick users into reacting to fake subscription notifications and acting upon cybercriminals' requests. The letter attempts to make users believe they have been charged for the renewal of the annual Geek Total Protection or similar subscription ($499.99). However, because users did not pay for any subscriptions intentionally, cybercriminal actors expect victims to call the provided +1-808-666-6112 (or similar) telephone number. Note that the subsidiary Geek Squad of the authentic consumer electronics corporation Best Buy has nothing to do with such letters you might have received. If you did not do any payments yourself and double-checked your bank account for such deductions, it is more likely such email messages are fake and contain the above-mentioned text. After calling the number of fake Geek Squad representatives, users will be therefore guided by cybercriminals to provide sensitive details (credit card info, social security number, etc.), pay a "fee" to cancel the subscription, or even install some software allowing scammers to remote-access your PC. Whatever they say is most likely a scam designed to extract financial benefits from inexperienced and gullible users. Beware of these scam techniques and read our guide below to learn how one can protect himself better against them.

How to remove Checkmate Ransomware and decrypt .checkmate files

0
Checkmate is a new ransomware infection that encrypts large volumes of office data and demands victims to pay 15,000 USD for its decryption. The virus uses secure algorithms to encipher important pieces of data (e.g., documents, tables, databases, photos, etc.). During this process, all affected files get visually changed with the .checkmate extension. For instance, a file named 1.xlsx will change to 1.xlsx.checkmate and reset its original icon to blank. As a result, the data will become no longer accessible. Lastly, developers create a text note called !CHECKMATE_DECRYPTION_README.txt to explain how files can be decrypted. The text note states how many files have been encrypted and what can be done to reclaim them. As mentioned above, extortionists require victims to pay an equivalent of 15,000 USD in Bitcoin to their crypto wallet address. Additionally, swindlers also offer to try free decryption - by sending 3 encrypted files (no more than 15 MB each) through the Telegram Messenger. They will afterwards supply the victim with free decrypted samples and provide the wallet address for the ransom payment. After transferring money, cybercriminals promise to respond back with decryption tools to unlock access to data. Unfortunately, at the moment of writing this article, there are no third-party tools that could allow free decryption without the direct help of cybercriminals. Means of encryption used by ransomware are usually very strong, making independent tools oftentimes useless with regard to decryption.

How to remove LIZARD (LANDSLIDE) Ransomware and decrypt .LIZARD or .LANDSLIDE files

0
LIZARD and LANDSLIDE are two very similar ransomware infections developed by the same group of extortionists. They both encrypt personal data and create identical text files (#ReadThis.HTA and #ReadThis.TXT) explaining how users can restore access to the restricted data. The two ransomware variants are also identical in how they rename encrypted files with slight differences. Depending on which of the two ransomware affected your system, targetted files will be altered according to [DeathSpicy@yandex.ru][id=victim's_ID]original_filename.LIZARD or [nataliaburduniuc96@gmail.com][id=victim's_ID]original_filename.LANDSLIDE different only in e-mail of cybercriminals and final extension (.LIZARD or .LANDSLIDE) used at the end. After encryption is done, the virus creates text files we mentioned above with identical content. Victims are informed that, in order to decrypt the files, they have to contact swindlers through one of the given e-mail addresses. Cybercriminals say they will set an exact price for decryption to be paid by victims in Bitcoin (BTC). After this, they promise to send the decryption tool that will help affected users unlock the restricted data. In addition to this, cybercriminals offer to send a 100-200 KB size file along with the e-mail message. It will be decrypted for free and returned to victims as proof that ransomware developers are capable of decryption. Although cybercriminals are usually the only figures able to decrypt files completely, many security experts advise against paying the ransom.

How to remove Makop Ransomware and decrypt .mkp, .baseus or .harmagedon files

0
If you wonder why you are unable to access your data, then this could be because Mkp Ransomware, Baseus Ransomware or Harmagedon Ransomware attacked your system. These file-encryptors belong to the Makop ransomware group, which has produced a number of similar infections including Mammon, Tomas, Oled, and more. Whilst encrypting all valuable data stored on a PC, this versions of Makop assigns victims' unique ID, cyber criminals' email address, and the new .mkp, .baseus or .harmagedon extensions to highlight the blocked files. For instance, 1.pdf, which was previously safe, will change its name to something like 1.pdf.[10FG67KL].[icq-is-firefox20@ctemplar.com].mkp, 1.pdf.[7C94BE12].[baseus0906@goat.si].baseus or 1.pdf.[90YMH67R].[harmagedon0707@airmail.cc].harmagedon at the end of encryption. Soon after all files end up successfully renamed, the virus goes forward and creates a text file (readme-warning.txt) with ransom instructions.

How to fix iPhone (iTunes) error 4000

0
It is a popular error that prevents users from updating their iOS devices. The message interrupting update success usually appears like this - "The iPhone Could not be Updated. An Unknown Error Occurred (4000)" and does not offer any list of solutions. As a rule, the reason why users are unable to perform a successful iPhone update in iTunes is because there is something that blocks proper syncing between the two. It is, in other words, a connection issue that hinders your device and iTunes from working together in order. Very often such connectivity problems are caused by third-party anti-malware software, outdated operating system or iTunes, or even hilarious bugs related to insufficient battery level and locked screen of a device. The 4000 error became a subject of wide discussion in 2021 where most of the reports were centered around iPhone XR while updating from iOS 13.5 to iOS 14.1. However, not excluded that the same issue may occur on other iPhone models and iOS versions as well. If you are also into a struggle of fixing the 4000 error, feel free to follow our tutorial below and try each solution presented. Chances are you will find the one that sorts out the issue.