How to Eject USB Storage Devices Using a Desktop Shortcut

If you are disconnecting a USB storage device from your computer, it is important to eject the device properly by heading to Windows notification area (system tray) and clicking on Safely Remove Hardware and Eject Media. When you will do so, you’ll put a stop to the read/write operations between the USB storage device and your computer. It will ultimately help you to minimize the risk of data corruption or loss.

But if you need to connect a USB flash drive, memory card, or external hard drive frequently to your computer, you may not like to follow the same routine each time to eject your device. In that case it will be convenient for you to create a desktop shortcut to eject USB storage devices quickly.

Safely Remove Hardware Using a Desktop Shortcut

To open the Create Shortcut Wizard, right-click on the free space on your desktop and choose New > Shortcut:

In the Type the location of the item field, copy/paste the following line (case-sensitive): Rundll32 shell32.dll,Control_RunDLL HotPlug.dll.

Once you are done, move to the next screen by clicking on Next:

By registering a new name in the Type a name for this shortcut field, you can rename the shortcut (e.g. Remove USB). After registering a new name there, click on Finish and that’s all there is to it to place the new shortcut on the desktop.

Safely Remove Hardware Using a Desktop Shortcut

How to Change the Shortcut Icon

It is very easy changing the default icon of a desktop shortcut. Right-click on the new shortcut > Properties > Shortcut and click on Change icon:

Now you will see a dialogue window titled Change icon, click on the Browse button and look for a file named “shell32.dll”:

Once you have found a file named “shell32.dll”, select the file (C:\Windows\System32\shell32.dll) and click on the option Open:

Now Windows will display the icons contained in the shell32.dll file. Choose the icon you want and click on OK to validate:

Assigning a Keyboard Shortcut

It is also possible to associate a shortcut key with your new desktop shortcut. In the Shortcut key field, go back to the Properties menu and define a key combination:

Click on Apply then OK to save your new settings.

Ejecting USB Storage Devices

As your new shortcut is ready now, you have a direct access to the Safely Remove Hardware utility. In the Safely Remove Hardware utility, you will see all the USB storage devices connected to your computer. To eject any device, just choose its corresponding entry from the Hardware devices list and click on the Stop button:

To validate your action, click on OK button on your computer screen. Now Windows will reflect a message that says, “The USB Mass Storage device can now be safely removed from the computer”.

If you require experts help while using a desktop shortcut to eject USB drive or anything else explained in this document, you can ask the experts at PCTECH24.COM.AU to get support for all hardware.

1800 832424 – TECH 24 (AUS)- Google’s Best Tips to Android Ransomware Protection

It is always a matter of concern that ransomware are infecting Android devices. As per report and according to Google, less than 0.00001% of apps that you install from Google Play ever have ransomware. On a justifying note, Google states that you’re more likely to be struck by lightning twice. However, that doesn’t mean that Google say that ransomware isn’t a very serious issue. They are still a crotical problem and obviously need to give it a second thought while using your Android device. You will get hardly hurt if you exercise caution. It is must especially when a device has as much sensitive information as your tablet or phone.

support for android

It is good to hear that Google has already done a lot of the work for Android users. To keep ransomware and all kinds of other threats from infiltrating your device, it has built numerous protections into Android. You’re in the best shape if you’re among the roughly 3% of users running Android 7 Nougat.

Google implemented several new features in its latest version to fend off ransomware, like “safety blinders”. This feature keeps apps from finding out all other running apps. Android 7 Nougat also launched protections against clickjacking which is a technique that attackers use to trick users into clicking buttons where they can’t see to kickstart malware.

This can be a big relief for you that Google has made it impossible for a malicious program to change your PIN. It is one of the most common way attackers and hackers use. They lock users out of their devices using ransomware apps and reinforce them to set up a PIN or other lock. Now for safety, Android apps are also sandboxed. Android apps will run inside isolated virtual containers so that they could not poke around where they’re not supposed to interfere. Though it’s not a impossible task to break out of a sandbox, but it is arduous.

There’s also a feature called Verify Apps feature, which has been around for years. This feature scans for suspicious behaviour and blocks them.  This feature will even remove suspicious behaviour from your device in very serious situations, all without you lifting a finger.

How Android users can avoid getting a ransomware infection

The first step to avoid getting a ransomware infection on your Android device is, don’t mess with the “untrusted sources” switch in your settings. Google screens apps in Google Play after checking them on its security parameters. It is not obvious that other places where you can find Android apps, like third-party app stores and filesharing sites will be necessarily screening apps.

Google advises you to do little investigation before clicking on download and install button of any app even in Google Play Store. Though Google is good at keeping threats out of its store, but still odd ones can still slip through cracks. Before installing any app, have a look at its reviews and see what permissions it will request. Skip the install if in case things aren’t adding up.

Another super-simple way to provide the protection to your device is, keep the software up-to-date. Make sure that you have the latest Android patches and current updates whatever software you have installed on your device. It will help you keeping malware at bay.

If you it is being difficult for you to understand how you can keep your device protected against ransomware and malware, you can ask the experts to do hacks for you. Here at PCTECH24.COM.AU, we have experienced experts who can provide you support for android ransomware protection as well as device running on any other platform.

How to Recover Password for Windows

What if you forget or lose your login credentials because you are accessing your account after a long time or there are so many IDs and passwords that’s why it is tough for you to remember. In such tricky situations, password recovery tools can be useful. These tools can be handy for you if you work as IT or network engineer. Password recovery tools can be useful as a computer user also while reinstalling or upgrading your version of Windows. These tools can help you to understand certain security risks like storing credentials unencrypted, and mitigating them.

Window Support
Window Support

How to Recover Passwords Saved by Web Browsers

It is easy to recover passwords saved in the popular web browsers like Internet Explorer, Google Chrome, and Mozilla Firefox. To recover password in Chrome and Firefox, you can access a list of saved passwords via the browser settings. You can view a list of saved passwords in the Credential Manager of Windows for Internet Explorer in Windows 8 and Windows 10. You can use these ways to double-check passwords you’ve saved.  For instance, you may need to know a password to login to a website from another computer on which it isn’t saved. However, it is risky also to save browser passwords and someone quickly could get to them.

Moreover, there are third-party tools also that can help you to recover passwords from multiple browsers. These tools allow you to save a list of all the passwords and will prove handy when you are reinstalling Windows or upgrading it and don’t utilize browser syncing. To keep your passwords more secure, you can import them in password managers which encrypt them for better security.

Alternatively, Firefox users need to enable their native master password feature that put encryption on the passwords so that third-party tools cannot recover them.

How to Retrieve Passwords for Wi-Fi Networks

Yu can also recover WEP keys, Wi-Fi passwords, and the PSKs of WPA or WPA2, saved by Windows.In Windows 7, open the Network and Sharing Center, select Manage Wireless Networks, click on the desired network to open it, and view the password on the Security tab. In Windows 8 and Windows 10, you can view the passwords in that same place, but you won’t find Manage Wireless Networks screen as it is gone. In Windows 8 and late, you can only open the wireless network properties of the specific network you’re connected to via the Network and Sharing Center. Windows 8 and later also, you can use third-party tools to capture and export a list of all the Wi-Fi passwords.

As you have seen how easy and insecure it is to retrieve Wi-Fi passwords stored by Windows.  You can see that the personal (PSK) mode of WPA/WPA2 can be very insecure than the Enterprise mode. The personal mode means if all the users will have and use the same password and their device is stolen or lost, or they leave the company, you will have to change the password in order to keep your network secure. But when you use the enterprise mode of WPA/WPA2, you could simply change or revoke a particular user’s login or password. Though the enterprise mode needs a RADIUS server the 802.1X authentication, but these days there are cloud-based options so you don’t have to deploy your own server.

How to Catch Login Credentials Sniffed from the Network

In recovering lost or forgotten passwords, catching login credentials sniffed from the network might not have a big practical use, but it helps demonstrate network security risks. In order to capture usernames and passwords for various kinds of services via protocols like HTTP, SMTP, FTP, and POP3, you can use tools to monitor a certain PC’s or the entire network’s traffic.

When you are on public Wi-Fi hotspots that have no encryption, remember to ensure that all services and sites you login should be using the standard SSL encryption. To check if site is using SSL encryption, check for the https in the URL. You also need to ensure that email clients and other apps should be using encryption as well. For peace of mind, encrypt all your Internet traffic using a VPN server provided by your company or a third-party VPN service.

On private Wi-Fi networks that are secured and encrypted, you’re also vulnerable to password hacking and hijacking. Users can still snoop on each other’s network traffic on networks secured with the personal (PSK) mode of WPA/WPA2 security. However, with the enterprise mode of Wi-Fi security, this is not the case. So businesses and organizations should use it.

Email Server and Login Credentials Details

You may want to save the server and login credentials details along with the emails themselves if you are reinstalling Windows.  Windows has an email client Outlook that you may be using. To get the email server and login credential details, go into the account settings of the email client. But this usually doesn’t show you the password in clear-text. There are fair chances to forget the password if you don’t use it often. To quickly retrieve the server details and password, use a tool instead of having to reset it via the email provider and then save them to a text file for later reference.

How to Reset Windows Account Passwords

It’s typically easier to reset a forgotten password instead of having to reinstall Windows when working with non-domain Windows computers. You can reset anywhere via the Microsoft site if it’s a Microsoft Account on a Windows 8 or newer computer. You can use bootable tools to do an offline password removal for Windows 7 and earlier (or local accounts on Windows 8 and later). However, when performing offline resets like this, some of your secured data like any passwords saved by Windows and any files encrypted by Windows may be wiped out.

It’s easy to retrieve and save most passwords when reinstalling or clean upgrading Windows. It can save your passwords as well as time and frustration that may develop because you accidently wiped out your passwords and forgotten them. But it also impose risk if you store login credentials so it is recommended to you that for better security, utilize encryption for your saved passwords or a whole-disk encryption solution.

Though it is easy to find passwords for saved Wi-Fi networks, when trying to connect other devices to the wireless, but in this case hackers can also snoop on your public and private network connections. They can hijack your accounts and capture your passwords so for the superior security, use enterprise mode instead of the personal (PSK) mode.

How to Disable the Option “Use printer metrics to lay out document” and use the option “Allow background saves”

How to Disable the Option “Use printer metrics to lay out document”

Disable the Use printer metrics to lay out document option when you work with documents which were created in Microsoft Word for Windows 95 and Microsoft Word 6.0 for Windows. If you disable this option, Word does not check printer settings to calculate layout and formatting, hence scrolling speed gets increased.

Important Note: Use printer metrics to lay out document option is enabled by default in documents which are converted to preserve Word 6.0 for Windows document formatting or Word for Windows 95. Minor changes in document pagination or line wrapping may occur when you disable this option.

pctech24au

Follow the steps given below to disable the Use printer metrics to lay out document option:

  • Start the Word program on your computer.
  • Click the Microsoft Office Button in Word 2007 and click File in Word 2010 and then click Word Options.
  • Click on Advanced option in the Word Options dialog box, scroll down to the Compatibility options for section, and then click on the option All New Documents.
  • Expand Layout Options, click in the check box to clear it available along side Use printer metrics to lay out document option, and then click on the OK option.

How to use the option “Allow background saves”

The Allow background saves option is enabled by default. You can continue to work in Word while you save a document if this option is enabled.

When this option is enabled, it uses additional system memory. You can disable this option if you want to conserve system resources. Follow the steps given below to do this:

  • Start the Word program on your machine.
  • Click on the Microsoft Office Button and then click on Word Options.
  • Click on the Advanced option in the Word Options dialog box, and then scroll down to the Save section.
  • Clear Allow background saves check box by clicking on it and then click on the OK button on your computer screen.

Important Note: A status indicator bar appears on the status bar when Word saves a document in the background. If Word may not save a document in the background, it saves the document in the foreground.

If you are a Windows user and facing any problem with any of the Microsoft or any other software program, you can ask the experts at PCTECH24.COM.AU to help you with the issues. PCTECH24.COM.AU provides support for Windows 10, Windows 8, Windows 7, and for other operating systems also.

How to Fix the Issue of Printing a document in Word 2016 for Mac

Sometimes, Mac users may fall for situations like unable to print a document in Office for Mac or you want to print on both sides of the page (duplex) in Word 2016 for Mac. Here are some steps given below to help you in troubleshooting the printing issue in Word 2016 for Mac.

Please note that all the steps given in this document apply to Word 2016 for Mac. The troubleshooting procedure includes a procedure before printing a document. Before you give a print command, you have choice to preview your document, specify the page number you want to print, as well as other options.

pctech24au

  1. Preview before printing an entire document
  • Head to the File menu and click on the Print option.
  • Click on the forward and backward arrows in Print dialog box to preview pages.
  • By using the arrow control to change the number in Copies or just by simply typing the number, set the number of copies to print and then click on the Print button on the Mac screen.
  • Word sends all pages to the selected printer when All under Pages is selected.
  • Now click on the Print option on your computer screen.
  1. Print specific pages by entering specific page number
  • Head to the File menu and click on the Print option.
  • Specify specific pages or ranges of pages or the currently displayed page under Pages:
  • Select Current Page for printing the page shown in preview.
  • Choose the range of pages (for example, 1 through 4) to print consecutive pages. Choose From and enter the starting page number in the box given alongside from and the ending page number in the box given alongside To.
  • To print ranges of pages and individual pages, like page 3 and pages 4 through 6, enter the Page Range, and the page numbers and separated the range by commas (for example, 3, 4-6).
  • Now click on the Print option on your computer screen.
  1. Choose other printing options and print a document
  • Open the File menu, click on the option Print.
  • Choose Microsoft Word in print.
  • See additional printing options by clicking on the Word Options.
  • Microsoft Word program will display additional printing options once you click on Word options.
  • Once you are done with your selections, return to the previous window by clicking on the option close this window.
  • Choose an item from the Print What list if you want to print any content other than the final document. Options include AutoText entries, document showing markup, list of markup, styles, document properties, and key assignments.
  • Now click on the Print option on your computer screen.

For more detailed information and help, you can ask Pctech24.com.au experts and get comprehensive support for Mac.

Precautionary Measures to Stay Protect You are on the Internet

Internet is not a safe place who doesn’t take care of their online privacy and security. There are millions of infections available online which are attacking more and more number of users on daily basis. So here some precautionary measures are given to keep yourself protected against online infections and scams.

pctech24au

Verify data is encrypted

Encrypt all the confidential information that you are sharing and transferring over the internet. Encrypt information such as credit card numbers, usernames, or passwords and send it securely. To verify this, look for Internet browser security lock (a small lock) next to the address bar or in the bottom right corner of your browser window. Once you are able to see this, makes sure that it should be in the locked position. Also make sure that the URL begins with https.

Data is encrypted if the lock is in the locked position. No one can intercept the data if try to intercept it if the data is locked. All information can be read if there is no lock visible and once it is intercepted. Use a password that you don’t use with protected sites if a web page such as online forum is not secure.

Use a safe and strong password

You should use strong and safe passwords for those websites which store confidential data. It is advised to you that use a different and strong password for each website that requires a login. Use a password manager if you cannot remember your passwords.

If available, enable two-factor authentication

If you enable two-factor authentication, you add an additional step for your online protection while verifying a login. Typically with two-factor authentication, after entering password, if the service does not recognize your device, you will receive a text message with a specific code to login. It is a good way of protection because no one can access your account even though one has a valid password because it requires that specific code to login.

E-mail is not encrypted

Never transmit you highly confidential data like your credit card information, passwords, and bank details over e-mail is not encrypted and any intruder may hack and read it.

Be careful while accepting or agreeing to prompts

Read and understand the agreement before clicking on the Ok button while installing any program. Cancel or close the window if you do not understand the agreement or feel that it is not necessary to install the program.

Additionally, check out for any check box that asks if it’s ok to install a third-party program, toolbar, etc. If it asks so, leave these boxes unchecked or cancel the install as these third-party programs causes more issues than good.

Be aware of phishing scams

Be aware of different types of phishing scams and techniques, which are meant to trick innocent users into providing their account information.

Stay concerned where you’re logging in from

Business: Your place of work can install key loggers or use various ways of monitoring you system when you are online. Someone who has access to this information may be able reading and recording this information. So it is recommended to you that don’t store any password in your browser if your system is shared with co-workers.

Wireless network: Your computer can be intercepted and read by someone else who is nearby when you are on a wireless network. Log onto a secure network using WEP or WPA to prevent this from happening. If you are on a home network. Make sure that it secure.

Friend’s house: Be careful if logging into an account on a friend’s computer because a computer or network you are not familiar with could unintentionally or intentionally log usernames and passwords. Never save the password information on the browser if you are logging into any site on a friend’s computer.

Use the latest browser

An outdated browser is highly insecure so use the latest version of the browser like use Microsoft Edge instead of Internet Explorer and also use alternative browser such as Google Chrome or Mozilla Firefox to stay safe.

Be attentive of those around you

Be careful of anyone’s shoulder surfing at work, school, library, or anywhere else. At such places, people may watch you filling up your confidential information like login ids and passwords. To keep your information private that display on the screen, use privacy filter for the display.

Update Internet browser plugins

Make sure all installed Internet plug-ins like Adobe Flash are up-to-date as often attackers find out security vulnerabilities through browser plugins.

Secure saved passwords

Always store passwords and login information in a secure area. Never write login information in a text file that is not encrypted or on a sticky note. Use a password manager to keep your login information secure.

Have against malware, spyware, and viruses

Give the complete protection to your device by installing an anti-virus program on it. Software programs like Trend Micro, Norton, Avira, etc. can keep your computer safe against malware, viruses, and other such infections.

If in case you don’t want to install anti-virus protection and running the latest version of Windows, run at least Windows Defender on your computer.

Learn to Hide Annoying MacOS Update Notifications

It is really annoying if you log into your MacOS Yosemite and Sierra systems and you quickly hit with an Apple notification that says “You have updates”. It seems a pain if you are in the middle of something and you need to get your work done and your computer screen keeps on displaying notifications about updates. It not only disturbs you while interacting with your device, but also wastes time and create nuisance. It is really distracting to get updates that you don’t care about.

This guide will help you in learning the ways to hide some updates which may be annoying you:

pctech24comau

Get rid of a few unwanted MacOS update notifications

Though you cannot hide all update notifications, but a few of them, you can hide for sure. You can hide at least a few of update notifications that Apple doesn’t think are important. To get rid of a few of those updates follow the steps given below:

  • Head to the MacOS App Store
  • Click the “Updates” tab (icon)
  • Right-click in the area next to an update when your updates are shown and then select the option “Hide Update” from the popup menu

About a few of other update notifications

Below given tricks will work only for selected update notifications. It is not known how Apple has decided which updates are necessarily important and which are not. This T may not work out for all the Mac users and all updates. Some of you may find these tricks helpful and some of them may not. This technique doesn’t work on Keynote, Pages, Numbers, Xcode, iPhoto, iMovie, etc.

You may follow these steps to hide their notifications, but it is not necessary that they will work for you:

  • Open the MacOS App Store app
  • Click the Purchased tab (icon)
  • There will be bit open area next to an app, right-click there and choose the option “Hide Purchase”

These steps don’t work on Apple apps, but may work on third-party.

MacOS App Store Preferences

Many of the Mac users want that they get notifications if there is any update available rather than it get installed automatically. It is better to get notification about available updates as there may be updates to update those programs that you are not going to use for a long time and there may be crucial updates like security updates that you need to install immediately.

It would be better if there will be more granular notification of updates, but as of now, you can only put them off for a day at a time.

Is it Possible to stop IP-spoofing in the Internet?

IP-spoofing is a severe enough problem that requires serious attention. Cyber criminals have developed inexpensive IP-spoofing techniques to mount reflector attack which significantly causes and contributes to large volume DDoS attacks against various Internet infrastructure and resources. This document explains the required measures to stop IP-spoofing and the massive Distributed Denial-of-Service (DDoS) attacks that you continue to see on the Internet and why these measures are useful, what network operators, enterprises and others can do to reduce and prevent DDoS attacks and other similar threats. To prevent “spoofing” of IP addresses, there is one mechanism called anti-spoofing technologies” that network operators can implement. This article explains how you can make Internet faster and more secure so some of the tools, technologies, and reasons are covered here for implementing anti-spoofing.

pctech24comau

DDoS attacks are executed by trading on the vulnerabilities like malware and “bots” running on unsuspecting computers. Attackers use malware and “bots” running on a targeted computer to execute a DDoS attack. To perform a DDoS attack, attackers send large number of requests at a target server which make it busy and unresponsive.  All requests typically have “spoofed” and bogus source IP addresses and when the server tries to revert on these requests it gets stuck and wait to open connections to the non-existent requesting servers.  As the attack use spoofed source IP addresses, it gets extremely difficult to track down the sources of the attacks from where they are coming.

In this scenario what seems to be an easy solution is just don’t allow packets to leave your network and travel the rest of the Internet with a spoofed IP source address.  At the very edge of the Internet, a home network or an enterprise can know precisely the range of IP addresses on its network to allow only those addresses as source addresses for outgoing packets. However, it gets very complicated and challenging in larger network but it is still very effective approach. In general, this approach is called Best Current Practice. Some people also call this approach “network ingress filtering” or “source address validation“.

Volumes of DDoS attacks are continuously growing. The real problem is ISPs don’t want to bear exceeded costs and take risks associated. They also don’t see instant benefits from deploying anti-spoofing measures. Your network is not completely secure even if your network hosts anti-spoofing measures like using ingress filtering or taking any other similar action. But you still need to deploy ingress filtering and need for better documentation and practical use cases to make risks, costs, and benefits more clear. It is also about the awareness of ISPs. They need to think if they are part of problem or victim of attack in a recent amplification reflector attack. However, this is definitely not evident and it is very difficult to track back the culprit, but there is way out to address these challenges and make visible improvements in all directions.

It is a difficult task to make a good anti-spoofing business case as it increases a sense of collective responsibility. Though anti-spoofing technique doesn’t necessarily protect a network’s own resources, but it provides benefit for the Internet as a whole. On a network it is implemented, it makes sure that the same network does not work as a launch pad for “spoofed” attacks.

In many cases, applying ingress filtering is easy and simple filters work perfectly well. However, this may not be true in case of more complex setups. There more care should be taken and detailed descriptions of pitfalls and corrective measures instructions could certainly help to overcome doubt and fear of implementing various solutions appropriately. You need t o think as a network user and find out the points where the anti-spoofing measures can be implemented more effectively. Besides that promoting egress filtering, users need to apply and follow security protocols. They should apply anti-spoofing tools and technologies. They need to install programs like AVG Internet security that can filter out malware and infectious contents to leave vulnerabilities on your network and make it safe. For more help you can ask pctech24.com.au experts to get AVG Support.

Avail Windows 10 OS Customer Support at PCTECH24.COM.AU

Every computer such as laptop, tablet, and Smartphone requires an operating system to connect with an external peripheral device and to run various applications and software programs. To make sure that you interact in the best possible way with your digital devices, Microsoft has been putting its best efforts to come up with the advanced operating systems. Since the launch of its first operating system to Windows 10, it has integrated so many changes and technologies in its operating system as well as in its other programs including productivity tools, browsing programs, etc. it has offered till the date. Windows 10 is the latest operating system launched by Microsoft and to make sure that it remains convenient to use it for Windows 7 and Windows 8 users, Microsoft has integrated the best features of both.

Windows 10 is the highly popular OS and there are fair chances that Windows 7 and Windows 8 users must be having issues while dealing with their devices once they have just installed Windows 10. It is a system software that helps in performing fundamental tasks of a computing machine such as administering peripheral and external devices, maintaining record of files and directories on the hard disk, receiving input from the input devices, redirecting output to the display screen, etc. The latest version of Windows OS has a redesigned start menu, new improved edge browser, the Xbox center, a dedicated window for Windows store, unified setting for PC customization, and various other features.

pctechau

Notifications about Windows 10 may be nagging you if you continue to use either of the two operating systems. It may seem annoying to some users, but it is a good thing to remind you of upgrading your version of Windows as the new operating system has a lot to offer. It is more responsive, has lots of new features, and partially shaped by user’s requests and feedback. Microsoft keeps on updating its Windows Operating system according to the user’s requirements. The latest one offers features, such as Cortana and the edge browser to give you seamless and faster performance experience. Cortana can perform a wide variety of tasks like it can tell you meeting schedules and jokes.

There are many enhancements in Windows OS that you may not know and remain unexplored, but our technicians are able to see your OS with a much better approach. When you just cannot find the way you needed, go down the route of technical support. Contact technical support of the PCTECH24.COM.AU is the easiest way you can get support for Windows 10. Doing so will establish one-on-one connection with Windows 10 experts. Our technicians will guide and provide you tips and tricks to get grips of this operating system. Dial PCTECH24.COM.AU toll free number for Windows 10 OS Customer Support and connect with our engineers to get professional help from us.

Our Windows OS tech professionals can help you with installing clean version of Windows if your OS installation ends to a mess. They can help you in upgrading you Windows OS as well as if you want to roll back your previous version of Windows (Windows 10 to Windows 7). You can call us or have a chat with our representatives to get the technical help. We are just a call away. Our support experts assure your setup, installation, update or upgrade of Windows without hindrances.

How to Disable Windows Automatically Restart Feature After Windows Update?

The system needs to restart after Windows updates are installed for them to take effect. When the installation process is complete, Windows Update normally initiates an automatic restart. This document describes the steps to disable this feature. Before disabling this feature, just bear in mind that updates will not be applied unless the computer doesn’t restart. To disable Windows Automatically restart feature after Windows Update, choose your version of Windows from the given list and proceed with the instructions:

windows.8.gpedit.no_.auto-restart

Windows Vista, Windows 7, and Windows 8

  • Press the Windows Key on the keyboard or Click the Start button and type gpedit.msc in the search text field and hit Enter keyboard.
  • Navigate to the following location in the Local Group Policy Editor window:

Local Computer Policy > Computer Configuration > Administrative Templates> Windows Components > Windows Update

  • For scheduled automatic updates installations option, double-click on No auto-restart with logged on users in the Windows Update window.
  • In the upper left-hand corner of the screen in the windows that opens, select the circle next to Enabled.
  • Click on the option Apply, and then OK.

Useful Tip:  Walk through the same steps to turn the automatic restart back on, but choose the Disabled option in Step 4.

Windows XP users

  • Click the Start button on the screen and then Run.
  • To open the Registry Editor, type regedit in the search for field appears.
  • Navigate to the following Registry key:
  • HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
  • To disable Automatic restart after update, find NoAutoRebootWithLoggedOnUsers and change the DWord value to a 1.

Useful Tip:  Walk through the same steps to turn the automatic restart back on, but change the DWord value to a 0 in Step 4.

Important Note: For Windows XP Microsoft made a change to that in Service Pack 2 allowing updates to be installed when the user initiates a computer shut down or restart. This feature is helpful to stop auto restart from occurring.

If you need any kind of professional help to configure your computer or expert support for Windows 7 talk to us for immediate support. We provide 24*7 help to resolve all technical complexities related to your printer and Windows as well as Mac computers.

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save