Ianis Dumitrescu
Pentru a afla mai multe despre echipa stelara, vizitati starteam.

6 PowerShell commands that fix the most common Windows 11 problems in seconds

  • Posted 04 May 2026
  • By Ianis Dumitrescu
  • -2
  • 64

If you suspect that a random outdated app is giving you a headache, you can run the winget command-line tool, which is capable of downloading, installing, and updating apps on your PC. To update most of the apps on your PC (unfortunately, winget cannot update every app), just type or copy the following command:

winget upgrade --all

The winget utility will then start updating your apps one by one. Depending on how many apps need updates, the process can take a while. Just note that you’ll have to stay close to the PC while apps are updated, because some will require manual intervention on your side.

All it takes is copying and pasting a few PowerShell commands

Random network-related problems are par for the course on Windows. I’ve been encountering them more often than I’d like on my handheld PCs, but the following PowerShell commands can solve them in a jiffy in most cases.

For basic troubleshooting type:

ipconfig /all

This will list all your network adapters, both active and inactive, along with various details about your network configuration. This info can be very handy when troubleshooting connectivity issues.

Refreshing your PC’s IP address can often be the only fix you need to solve network issues. However, this can affect any firewall rules set up for your PC’s IP address in your router, so make sure to adjust them afterward. To refresh the IP address, run the following two commands:

ipconfig /release
ipconfig /renew

If you’re encountering a “DNS Server Is Not Responding” error on your PC, clearing the DNS cache can often solve it. To clear the DNS cache, run:

ipconfig /flushdns

Resetting the Windows Sockets (Winsock) catalog to default settings and rebuilding the TCP/IP stack can often remedy various network connection issues. To do this, run the following two commands:

netsh winsock reset
netsh int ip reset

Then reboot your PC.

Lastly, you can restart your network adapter right from PowerShell, another trick that can fix random connectivity issues. To perform this, first run the ipconfig /all command to find out the name of the active network adapter (or multiple adapters, if you have both Ethernet and Wi-Fi). Once you find out the name of the active adapter, run:

Restart-NetAdapter -Name "The name of the active adapter"

My motherboard has two Ethernet ports that are listed as “Ethernet 3” and “Ethernet 4.” Since the Ethernet 4 adapter is active, I need to type the following:

Restart-NetAdapter -Name "Ethernet 4"

Restarting the adapter only takes a few seconds.

Fix your storage problems

The chkdsk command is super handy

Storage-related issues can trigger all kinds of erratic behaviour on Windows PCs, such as random crashes and freezes followed by a BSOD, slowdowns, error messages, and more. Check Disk (chkdsk) is the first-aid PowerShell command that can often resolve various storage issues. The base chkdsk command scans your storage drives for errors. If no errors are found, you’re fine. If errors are found, you can run the following command:

chkdsk /r

This will fix errors discovered on the disk as well as locate bad sectors and recover readable data. Since chkdsk needs to lock the drive it’s repairing you can use it to repair secondary drives while the PC is active. However, if you want to repair your boot drive, you’ll need to schedule chkdsk to run the next time your PC reboots.

Repair corrupted Windows files

With SFC and DISM commands

Corrupted files can wreak havoc on a Windows PC, even if we’re talking only about one or a few corrupted file instances. Use Windows System File Checker (SFC) to quickly scan and replace corrupted files. To run the tool type:

sfc /scannow

And let it do its thing.

If problems persist, you can run Deployment Image Servicing and Management (DISM), which repairs the Windows image. The catch-all DISM command that should fix most issues is:

DISM /Online /Cleanup-Image /RestoreHealth

This will repair and replace damaged and corrupted files using Windows Update as the repair source, and is the recommended course of action if issues persist even after running sfc /scannow.

List folders taking up the most storage

Find out what to delete to free up your PC’s storage

My previous PC only had a single 500GB SSD that I used as both the boot drive and for installing games, so I had to deal with low storage warnings regularly because the drive was almost always nearly full.

Oftentimes, I was able to free up a good chunk of storage by deleting random subdirectories inside the AppData folder used by apps and games that were taking up multiple gigabytes of space. The command I used to hunt down the folders taking up the storage space was very similar to the following:

Get-ChildItem "path to the location" -Directory | ForEach-Object {
$size = (Get-ChildItem $_.FullName -Recurse -File -ErrorAction SilentlyContinue | Measure-Object Length -Sum).Sum
[PSCustomObject]@{
Folder = $_.FullName
SizeGB = [math]::Round($size / 1GB, 2)
}
} | Sort-Object SizeGB -Descending

All you have to do is replace “path to the location” with the target directory you want to scan. Since the AppData folder is always my first suspect, I usually start the hunt by typing the following location:

"C:\Users\Administrator\AppData"

Once you locate the folder eating up the space, you can go one level deeper and find which subfolders are the real storage sinks. In my case, I’m running the command again, but with the following path:

"C:\Users\Administrator\AppData\Local"

As you can see below, the Packages directory is the worst offender, but a number of other folders are also taking up multiple gigabytes of space. It looks like I’ll have to do some more digging and deleting once I finish writing this piece.

Get rid of Windows bloat

winutil can solve and prevent a number of Windows issues

There’s no denying that the current version of Windows is the most bloated yet. You’ve got a bunch of ads and features you don’t need, along with plenty of background processes and extras that can slow Windows down and cause various issues over time.

Luckily, Windows Utility (winutil) is a fantastic open-source script developed by Chris Titus that you can use to debloat your Windows installation.

Running remote scripts with irm | iex can be risky because it executes downloaded code directly. In this case, winutil is a well-known open-source project made by a trusted developer, but in most cases, you should check the script first and make sure it’s safe to execute before typing it into PowerShell and hitting Enter.

While it’s not a tool for fixing problems per se, it can make your PC run faster and help prevent a bunch of issues from showing their ugly heads in the first place. While it’s recommended to run it on a fresh Windows install, you can use it anytime. All you have to do is run the following command:

irm christitus.com/win | iex

This will launch the program, allowing you to tweak various settings, remove a bunch of unnecessary things, and customize your Windows installation to your liking. The tool is quite robust and includes a ton of features, so I recommend checking out the tutorial video created by the developer (who is also a popular YouTuber), as well as reading our winutil guide.

PowerShell is a super handy Windows utility

Windows PowerShell is a very powerful utility that’s much faster than clicking through a ton of Windows menus. It’s not a miracle worker, but you can use it to solve a ton of common Windows problems simply by running a few relatively short commands.

[mai mult...]

How to use Wireshark to capture, filter and inspect Packets

  • Posted 03 March 2026
  • By Ianis Dumitrescu
  • 3
  • 41
Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and display them in human-readable format. Wireshark includes filters, color coding, and other features that let you dig deep into network traffic and inspect individual packets.

This tutorial will get you up to speed with the basics of capturing packets, filtering them, and inspecting them. You can use Wireshark to inspect a suspicious program’s network traffic, analyze the traffic flow on your network, or troubleshoot network problems.

Getting Wireshark

You can download Wireshark for Windows or macOS from its official website. If you’re using Linux or another UNIX-like system, you’ll probably find Wireshark in its package repositories. For example, if you’re using Ubuntu, you’ll find Wireshark in the Ubuntu Software Center.

Just a quick warning: Many organizations don’t allow Wireshark and similar tools on their networks. Don’t use this tool at work unless you have permission.

Capturing Packets

After downloading and installing Wireshark, you can launch it and double-click the name of a network interface under Capture to start capturing packets on that interface. For example, if you want to capture traffic on your wireless network, click your wireless interface. You can configure advanced features by clicking Capture > Options, but this isn’t necessary for now.

As soon as you click the interface’s name, you’ll see the packets start to appear in real time. Wireshark captures each packet sent to or from your system.

If you have promiscuous mode enabled—it’s enabled by default—you’ll also see all the other packets on the network instead of only packets addressed to your network adapter. To check if promiscuous mode is enabled, click Capture > Options and verify the “Enable promiscuous mode on all interfaces” checkbox is activated at the bottom of this window.

Click the red “Stop” button near the top left corner of the window when you want to stop capturing traffic.

Color Coding

You’ll probably see packets highlighted in a variety of different colors. Wireshark uses colors to help you identify the types of traffic at a glance. By default, light purple is TCP traffic, light blue is UDP traffic, and black identifies packets with errors—for example, they could have been delivered out of order.

To view exactly what the color codes mean, click View > Coloring Rules. You can also customize and modify the coloring rules from here, if you like.

Simple Captures

If there’s nothing interesting on your own network to inspect, Wireshark’s wiki has you covered. The wiki contains a page of sample capture files that you can load and inspect. Click File > Open in Wireshark and browse for your downloaded file to open one.

You can also save your own captures in Wireshark and open them later. Click File > Save to save your captured packets.

Filtering Packets

If you’re trying to inspect something specific, such as the traffic a program sends when phoning home, it helps to close down all other applications using the network so you can narrow down the traffic. Still, you’ll likely have a large amount of packets to sift through. That’s where Wireshark’s filters come in.

The most basic way to apply a filter is by typing it into the filter box at the top of the window and clicking Apply (or pressing Enter). For example, type “dns” and you’ll see only DNS packets. When you start typing, Wireshark will help you autocomplete your filter.

You can also click Analyze > Display Filters to choose a filter from among the default filters included in Wireshark. From here, you can add your own custom filters and save them to easily access them in the future.

For more information on Wireshark’s display filtering language, read the Building display filter expressions page in the official Wireshark documentation. Another interesting thing you can do is right-click a packet and select Follow > TCP Stream.

You’ll see the full TCP conversation between the client and the server. You can also click other protocols in the Follow menu to see the full conversations for other protocols, if applicable.

Close the window and you’ll find a filter has been applied automatically. Wireshark is showing you the packets that make up the conversation.

Inspecting Packets

Click a packet to select it and you can dig down to view its details. You can also create filters from here — just right-click one of the details and use the Apply as Filter submenu to create a filter based on it.

[mai mult...]

How to Bypass Windows 11’s TPM, CPU and RAM Requirements

  • Posted 03 March 2026
  • By Ianis Dumitrescu
  • 5
  • 58

If you just have a regular Windows 11 install disk or ISO, you can bypass the Windows TPM and RAM requirements by making some registry changes during the install. Note that this method only works on a clean install and does not allow you to bypass the requirement for at least a dual-core CPU.

1. Boot off of your Windows 11 install disk. The first screen should ask you to choose the language of your install (which will probably be correct).

2. Hit SHIFT + F10 to launch the command prompt

3. Type regedit and hit Enter to launch registry editor

4. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\Setup.

5. Create a new registry key under Setup and name it LabConfig. To create a registry key, right click in the right window pane and select New->Key. Then enter the key name

6. Within LabConfig, create DWORDs values called BypassTPMCheck and BypassSecureBootCheck and set each to 1. To create a new DWORD value, right click in the right window and select new DWORD (32-bit) Value then name the key, double click to open it and set it to 1.

If you also want to bypass the RAM requirement, add a DWORD values for BypassRAMCheck

7. Close regedit and the command prompt

You should be able to continue with your Windows 11 installation as normal

How to Bypass Windows 11’s TPM Requirement using Rufus

With Rufus, a free utility, you can create a Windows 11 install disk on a USB Flash drive with settings that disable the TPM, RAM and CPU requirements. You can either boot off of this USB Flash drive to do a clean Windows 11 install or run the setup file off of the drive from within Windows 10 to do an in-place upgrade.

For most people, this method is ideal, but there are a couple of disadvantages. First, it requires a 16GB or larger USB Flash drive. Second, because it’s on a Flash drive, it’s more difficult to use for installing Windows 11 on a virtual machine where an ISO file would be ideal.

1. Download the latest version of Rufus and install it on your machine. At the time of writing the latest version is 3.19 which includes the Extended Windows 11 Image support.

2. Insert a blank 16GB or larger USB stick then open Rufus

3. Select the USB device that you want to install Windows 11 to

4. Ensure that Boot Selection shows “Disk or ISO image” and click DOWNLOAD

5. Select Windows 11 and click Continue

6. Select the latest release and click Continue

7. Select the edition and click Continue

8. Select your preferred language and click Continue

9. Select the architecture (most likely x64) and click Download. A new window will open asking where to save the ISO image. Save it to your Downloads folder. You can also download the image using a browser if you wish.

The download will take several minutes to complete.

10. Click on the Image option drop down and select Extended Windows 11 Installation to disable TPM, Secure Boot and the 8GB of RAM requirement.

11. Double check that the correct drive has been selected and click on Start to begin the installation.

The write process can take some time, depending on the USB drive being used, but when done the drive can be removed and used to install Windows 11 on an older computer or even in a virtual machine.

12. Install or upgrade to Windows 11. Run setup on the USB drive, if you ware doing an in-place install from an existing Windows 10 installation. Boot off of the drive if you are doing a clean install. Note that you may need to disable secure boot in your BIOS if it gives you a problem.

How to Bypass Windows 11 TPM Check from Windows Update

If you want to use Windows Update rather than creating an install disk, you’ll need a method that runs in Windows and fools the updater into thinking you meet the requirements. This may be more important if you are trying to use Windows Update to upgrade to a new build of Windows 11, perhaps an Insider Build, on a computer that already bypassed the requirement.

For example, when we joined the Windows Insider program on one of our Windows 11 VMs (which clearly did not have TPM), we got the dreaded “Your PC doesn’t meet the requirements” error. But using AveYo’s Media Creation Tool workaround script solved the problem. Here’s how to make it happen.

1. Navigate to the Skip_TPM_Check_on_Dynamic_Update.cmd source code on AveYo’s Media Creation Tool Github

2. Click the “Copy raw contents” button in the upper right corner of the code box

3. Create a new file on your desktop and name it skip_tpm_check.cmd. Make sure that you are able to view file extensions and the file extension is really .cmd, not .txt or else it won’t run

4. Open skip_tpm.cmd for editing, using notepad or another text editor

5. Paste in the code you copied from github

6. Save and run the skip_tpm.cmd file

7. Click Yes if prompted by User Account Control

You will now see a message saying “Skip TPM on Dynamic Update” has been installed. If you run the program again, it will disable the utility. Windows Update should now be able to either update your existing Windows 11 Build or even perhaps upgrade you from Windows 10 to 11.

How to Bypass Windows 11 TPM the Official Microsoft way

Knowing that some users will want to install Windows 11 on systems that don’t meet all of its hardware requirements, Microsoft has provided a registry hack that loosens them up somewhat. Using this hack, you can install on a system that has at least TPM 1.2 and has an unsupported CPU. That said, we recommend the scripts above because they don’t require you to have TPM of any kind.

1. Open Regedit

2. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup

3. Create a DWORD (32-bit) Value called AllowUpgradesWithUnsupportedTPMOrCPU if it doesn’t already exist

4. Set AllowUpgradesWithUnsupportedTPMOrCPU to 1

5. Close regedit and restart your PC. You should now be able to upgrade to Windows 11 from within Windows 10 by using installation media (provided you created it).

[mai mult...]

How to remove AI Features and bloat from your Browser

  • Posted 02 February 2026
  • By Ianis Dumitrescu
  • 10
  • 242

Here’s a quick look at what Just the Browser does best to simplify modern web browsers.

  • It disables built-in AI assistants and experimental AI modes, removing features like Microsoft Copilot in Edge, Gemini in Chrome, and similar integrations in Firefox.
  • Strips out shopping-related clutter, including price tracking, coupon pop-ups, cashback prompts, and buy-now-pay-later offers that interrupt browsing sessions.
  • Removes sponsored content and third-party recommendations from new tab pages, such as suggested articles, ads, and promotional shortcuts.
  • Turns off telemetry, studies, and most background data collection features to significantly improve user privacy, while leaving optional crash reporting enabled where supported.
  • Eliminates default browser nags, welcome screens, and repeated prompts to import data or change system settings.
  • Prevents browsers from launching background services or startup boost processes without explicit user permission, helping reduce resource usage.
  • Works across Windows, macOS, and Linux using native policy formats like registry files, mobile configuration profiles, and JSON policies.
  • Uses fully readable and auditable configuration files, ensuring every change is transparent and reversible without extensions or binary modifications.

Installation and Setup

One of the best things about this utility is that it supports all major operating systems. It uses a script to automate the process, so you don’t have to manually edit registry files or system folders.

On Windows, the tool uses a PowerShell script to apply registry changes. Simply right-click your Start button and select Terminal (Admin). Then, copy the following installation command, paste it into your terminal, and hit Enter.

& ([scriptblock]::Create((irm "https://raw.githubusercontent.com/corbindavenport/just-the-browser/main/main.ps1")))

The script will launch a simple menu.

Type the number corresponding to the browser you want to clean (e.g., 1 for Chrome, 2 for Edge) and press Enter.

Mac and Linux users can also use the terminal to download and run the setup script. Simply open your terminal emulator of choice and run:

/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/corbindavenport/just-the-browser/main/main.sh)"

The script will detect which browsers you have installed (Chrome, Firefox, or Chromium). Select your browser from the list, and the script will drop the necessary JSON policy files into the correct folder.

Once the script finishes, the changes are usually immediate. You simply need to restart your browser (fully quit and reopen it). When you open Chrome or Edge next, you might see a message saying “Managed by your organization.” This is good! It means the policies are active and the tool is successfully blocking the bloat.

Further, you can also verify which policies are active in Firefox by typing about:policies in the address bar, while Chrome and Edge users should navigate to chrome://policy/ or edge://policy/. You’ll see a complete list of applied settings.

Removing the settings from your browser

If you decide you want to remove Just the Browser configurations later, rerun the installation script the same way you ran it while installing in PowerShell. The menu will appear with options for updating and removing settings for a specific browser. From there, select Remove Settings option and press Enter, and your browser will return to its default state.

Some Drawbacks of Just the Browser

Just the Browser relies on enterprise settings in Chrome, Edge, and Firefox, so the cleanup only works as long as those policies continue to exist and behave the same way. If browser vendors change or remove them in future updates, the configuration files may need adjustments. The setup also requires administrator access, which can be a problem on work or school managed computers where policy changes are restricted.

In addition, the applied policies do not remove AI features from Google Search; they only affect the browser software. It is also designed for desktop platforms only, so if you do most of your browsing on mobile devices, you will still see AI features and other content there.

[mai mult...]

5 things I wish I knew when I first learned programming

  • Posted 03 January 2026
  • By Ianis Dumitrescu
  • -2
  • 119

Starting your programming journey is exciting, but it’s easy to fall into traps that slow down your progress. By understanding the common mistakes new programmers make, you’ll set yourself up for success right from the start.

  • Focus on logic, not syntax

When learning to program, it’s natural to worry about getting the syntax right. The symbols, keywords, and structure of any language can feel intimidating at first, so you might wrongly focus primarily on memorizing syntax. However, this can be counterproductive, especially since syntax alone won’t help you understand how or why code works.

What truly matters in programming is logic, the process of breaking down problems into steps that can be executed by a computer. Syntax is simply a way to express that logic in a way the machine can interpret. Consider the classic beginner problem FizzBuzz. When trying to solve this, a syntax-focused beginner might get caught up in how to structure the if statements.

  • Get good at one langauge before branching out

Many beginners think that knowing multiple programming languages makes them better programmers. But in reality, depth of knowledge in one language is much more valuable than a shallow understanding of several. Switching from language to language without mastering any of them can lead to confusion and inefficiency.

When you focus on a single language, you develop a strong foundation in essential programming concepts, such as variables, loops, conditionals, functions, and object-oriented programming. These concepts are the core of programming, and once you grasp them deeply, you can apply them to any language with relative ease.

Imagine you start with Python because it’s beginner-friendly and widely applicable in fields like web development, data science, and automation. By focusing exclusively on Python, you can become comfortable with core programming principles and start building projects that reinforce these concepts.

  • Don’t let tutorials tie you down

When starting to learn programming, it’s easy to get drawn into the cycle of watching tutorials one after another, thinking you’re making progress. But simply watching or following along doesn’t build the skills you need to write your own code or solve real-world problems. This is what’s commonly referred to as “tutorial hell,” where you keep consuming information without actually applying it.

The reality is that programming is a practice-based skill. Just like you can’t learn to play soccer by watching someone else play, you can’t become a programmer without actually coding. Suppose you’re learning Python and find a tutorial series that guides you through building an expense tracker. You code along with the instructor, and by the end of the video, you have a working calculator. It feels like progress.

A big mistake I made was collecting different video tutorials, courses, blogs, and other resources and started binging them. I watched video after video, finished playlist after playlist, and only copied the code along the way. Since I only followed along, I struggled when asked to build an app or even a small project from scratch.

When you don’t have to make decisions or face challenges on your own, you can’t internalize the logic behind a project. Instead, after watching the first part of a tutorial, try to pause and build a simpler version of the project. Working through even a simplified version without direct instructions will help you understand how to structure and problem-solve yourself.

  • Learn by doing

When it comes to programming, nothing beats “learning by doing.” Theoretical knowledge and passive learning can give you a foundational understanding, but only hands-on experience will solidify that knowledge and help you become a confident programmer. Project-based learning, where you actively create and build will help you develop real-world programming skills.

Projects can be as small as a to-do list app, a quiz app, or a simple game. Each project you attempt will introduce you to new challenges, forcing you to look up specific syntax or problem-solve on the spot. By focusing on projects, you gain the confidence to solve real-world problems and begin to see yourself as an independent programmer, not just a tutorial follower.

  • You don’t need to know everything

When you first start programming, it’s easy to feel like you need to know everything. Every language feature, every framework, every tool out there. But trying to learn it all up front is overwhelming and unrealistic. Even the most experienced developers don’t know everything, and that’s completely fine. Programming is a constantly evolving field, and there will always be more to learn. Accepting this fact can take a huge weight off your shoulders and help you focus on making steady progress rather than trying to master it all at once.

Programming involves a vast range of skills: syntax, algorithms, data structures, frameworks, debugging techniques, libraries, and more. Attempting to cover it all at once dilutes your focus and keeps you from gaining depth in any one area. This lack of depth makes it difficult to build projects or solve real problems because you’re constantly jumping from one new topic to another without fully understanding any of them.

Learning to program is a journey filled with challenges, and making mistakes is simply part of the process. Embrace these setbacks as opportunities to grow and remember that every expert was once a beginner too. Remember that each line of code you write brings you closer to becoming the programmer you want to be.

[mai mult...]

4 common ways Windows PCs get hacked and how to prevent them

  • Posted 08 November 2025
  • By Ianis Dumitrescu
  • -4
  • 102

I’ve certainly seen my share of malware over the years, and while the methods evolve, our thinking must evolve too. It’s easy to believe the threats are all “advanced,” but for everyday Windows users, the majority of compromises still come down to the same few glitches that are recognizable to most. A click we shouldn’t have made, a “free” download we didn’t check well enough, or a system update we kept postponing. If you think you’re safe because you’re not part of some headline-grabbing breach, you might want to take another look.

To put it in perspective, the threat landscape isn’t slowing down anytime soon. According to recent data from Microsoft, their customers face 600 million attacks every day, showing that your PC isn’t just a target, it’s a potential doorway for hackers and bad actors. The bottom line is simple: the more you understand how attackers work, the easier it is to spot their tricks, and stop them before they get in.

Phishing scams still work because they feel real

Phishing and social engineering are old tricks painted up to look new. Instead of hackers brute forcing their way into your computer, they trick you into handing over the keys. They send messages that look real enough, emails from “Microsoft,” fake shipping updates, or urgent password reset links, that are all designed to get you to click before you think. It could be a fake tech support call claiming your PC is infected, or a pop-up that looks like Windows Defender in need of attention. It’s not about breaking through your security; it’s about getting you to open the door yourself.

My wife recently got a call from someone claiming to be from American Express. They told her my credit card had been compromised and needed data for “verification.” They even went as far as to say I was a suspect and that she shouldn’t discuss it with me. She texted me mid-call, thankfully, but by then she’d already shared enough information for them to steal money. Amex handled it quickly, but it was a painful reminder of how convincing these scams can be.

The best defense is knowing what to look for and having a good amount of healthy skepticism. Don’t click links in unexpected messages and never trust an email attachment unless you’re sure who sent it. If something feels too urgent or off, open your browser and go directly to the source instead of following the link. Turn on two-factor authentication everywhere, let Windows Defender do its job, and keep your system and browser patched. If you get a call from your bank or credit card company that seems strange, hang up and call them back on a phone line that you know is legitimate. Most phishing attempts fall apart the second you stop, think for a moment, and start verifying, because once you recognize the pattern, it’s much easier to see what’s coming.

Why pirated or ‘free’ software isn’t really free

Pirated software and “free” downloads present a real risk. Cracked apps and unofficial installers don’t just bypass license checks; they can often sneak in unwanted extras like spyware, adware, or hidden backdoors that run quietly in the background. Many of these fake installers look polished and professional, which makes them even easier to trust. The problem isn’t just that you might end up with a sluggish PC, it’s that you could unknowingly hand over your passwords, files, or even remote access to someone.

Before you install anything that didn’t come directly from the developer’s website or a verified store, pause and ask yourself if it’s worth it. File-sharing sites and “free” download hubs are often loaded with fake buttons, malicious ads, and “trojanized” files that look legitimate until it’s too late. Stick to official sources, open-source projects with active communities, or the Microsoft Store when possible. Keep Windows Defender active, scan new downloads before running them, and check the digital signature or hash of installers if you can. A few extra seconds of caution can save you from days of frustration, and potentially, a full system rebuild.

Outdated software is an open invitation

Running unpatched or unsupported software is like having a screen door in a submarine. It doesn’t matter how careful you are online, if the programs you rely on every day haven’t been updated, they can become an easy target. Attackers don’t need to find new exploits when there are millions of systems still running versions of Windows or apps potentially rife with vulnerabilities. Once software reaches end of life, it stops getting those quiet background fixes that keep you and your data safe and secure. And while that out-of-date media player or backup tool might seem harmless, it can still open the door for drive-by downloads, ransomware, or remote code execution exploits that take advantage of old code.

We’re already seeing this issue surface with Windows 10’s upcoming end of life. Millions of PCs still run it, and many of those systems don’t meet the hardware requirements for Windows 11. It’s understandable that users want to hold on to a reliable setup, but once Microsoft stops issuing security updates, every new exploit becomes a permanent hole in your armor.

I’ve written before about how browser extensions can go bad, and the same logic applies here. Every bit of software you install adds another potential point of failure. When a developer stops maintaining a tool, or you forget to patch a long-forgotten app, it becomes a blind spot in your security. The solution is less about paranoia and more about discipline: keep automatic updates enabled, uninstall what you don’t use, and periodically audit your installed software the same way you’d review browser extensions. Treat updates as part of normal system maintenance, not an inconvenience. In the long run, keeping your software current is one of the simplest and most effective ways to keep your Windows PC safe.

Malvertising: You don’t need to download anything to get infected

Sometimes all it takes is visiting the wrong website. Malvertising hides inside legitimate-looking ads on sketchy streaming or download sites, quietly redirecting your browser to a page that installs malware, adware, or harvests data in the background. Attackers buy ad space, disguise their payload as normal campaigns, and wait for clicks. Even legitimate ad networks can get fooled.

The fix is simple; use an ad blocker or your browser’s built-in tracking protection, avoid visiting sites that trade in pirated content or “free” movie streams, and keep your browser and extensions patched.

Good habits are your best defense

At the end of the day, keeping your Windows PC secure isn’t about mastering cybersecurity, it’s more about being thoughtful and deliberate. Most of us don’t think twice about the software we install, the sites we visit, or the alerts we ignore, but those quiet decisions can have serious real-world consequences. Technology will keep evolving, and so will the cyber-threats that we have to face, but a little awareness and consistency go a long way. Keep your tools up to date, question what doesn’t feel right, and don’t let convenience become the reason you let your guard down.

[mai mult...]

This is why you should replace your ISP’s Router ASAP

  • Posted 08 October 2025
  • By Ianis Dumitrescu
  • 0
  • 129

These days, people have more devices connected to their home Wi-Fi than ever. TVs, game consoles, appliances, phones, computers, and more. Most homes are a pretty complex system of connected devices today, and here’s the thing about routers provided by your ISP: nine times out of ten, they are pretty cheap. This is hardware the company is handing out to hundreds of thousands, if not millions of customers. Giving everyone a cutting-edge router would cost way too much.

They aren’t as powerful, and that means they often struggle throughout the day. You may face sluggish response times on your devices if there are multiple doing bandwidth-heavy tasks at the same time. Just one person streaming a video could impact performance throughout the whole house. Newer routers, especially those with Wi-Fi 6 or 7, are designed for dense networks and tons of connected devices. They can handle dozens of connected clients and give them all the prioritized bandwidth they need.

This means buying your own router is likely to pay for itself within a year, and if you’re going to be spending the same amount of money overall anyway, why settle for a router that is inferior to what you could buy? Moreover, if you buy the latest router with the newest technology, even if new upgrades come out, it’ll probably still be perfectly viable for at least a few years, not becoming obsolete nearly as quickly.

Even if you buy a used router, it might still be a mroe cost-effective option than paying for the ISP’s router.

Earlier, I mentioned Wi-Fi 6 and 7. These are Wi-FI standards used to denote how advanced the Wi-Fi technology is. Right now, Wi-Fi 6 is probably the most common standard in Wi-Fi routers, but there are already some Wi-Fi 7 routers out there. Your ISP is almost certainly not going to provide you with a Wi-Fi 7 router, because that’s expensive when an ISP has to buy routers in bulk. You’re much more likely to get a router with Wi-Fi 6 or in some cases, even the older Wi-Fi 5 standard.

Now, it may not seem that bad to use an older protocol. Allegedly, Wi-Fi 5 routers can provide up to 3.5Gbps throughput, which should be more than enough for a lot of different things. However, real world speeds are usually lower than this alleged throughput, so you may still want Wi-Fi 6. Moreover, newer Wi-Fi standards come with more than just raw performance, they also have newer features.

For example, Wi-Fi 6 comes with OFDMA (Orthogonal Frequency Division Multiple Access), which allows those routers to ping multiple devices at the same time instead of relying on a request que. This can massively reduce the latency you experience compared to older Wi-Fi standards.

If you ever have a problem with your ISP-issued router, you will probably need to get help from them to fix it. In order for them to do that, they usually set up the CPE WAN Management Protocol so they can access the router remotely. Admittedly, this is pretty convenient when you need their help to fix some serious problem, but nevertheless, it is a potential security risk.

After all, this type of backdoor allows anyone who knows how to access it change settings, see connected devices, or monitor your activity. While it’s not very likely, a total stranger could theoretically do this and spy on you, and this is especially concerning since a lot of ISP routers use outdated security standards. Security standards grow over time much like Wi-Fi standards do, and today, the most used standard is WPA3.

But just like Wi-Fi standards, ISPs don’t always update their routers to the newest security standards. It can mean further training and complications for their technicians, and they just don’t have much of a financial incentive to do so, since most people will take their shoddy routers when getting new service anyway. If the router is running an older security standard, it can be even easier for bad actors to access that backdoor the ISP put in your device.

You may not be able to change All Settings on an ISP Router

While this may vary based on the exact provider, but many ISPs don’t want their customers messing around with the advanced settings of their loaned routers, since that could make remote troubleshooting more difficult. With a lot of ISP routers, the customer won’t be able to change anything other than the network name and password. Admittedly, this might not be an issue for most people who don’t want to mess around with more complicated settings anyway.

But if you’re the type of person who wants full access to their router and its provided network, such as network band selection or UPnP functionality, you’ll want to ditch the ISPs router and get your own. Aftermarket routers will let you change literally anything you want, from device specific parental controls to custom DNS. If you want flexibility, you’ll want your own personal router.

Firmware updates are very important. They are put out by the manufacturer of the router to patch fatal flaws, like holes in security or other performance issues. It’s like getting a security update for your laptop. However, unlike your personal computer, you don’t get to choose when an ISP router gets a firmware update. It’s completely up to the ISP, and they aren’t always acting with real urgency. It’s up to the ISP to test and approve a firmware update before it gets applied to your router.

This process can take weeks or sometimes even months, which is practically an eternity is the world of security exploits. In some cases, it may never happen at all. After all, the ISP could just choose not to push a new firmware update if they don’t want to. This could leave the router you are using vulnerable to all sorts of problems.

Naturally, this isn’t an issue if you buy your own router. With that, you’ll be able to apply a new firmware update whenever you see fit, instead of relying on some company that may be dragging its feet. There are plenty of reasons to ditch whatever router an ISP tries to give you and go buy your own instead.

[mai mult...]

How to service your own Computer

  • Posted 08 September 2025
  • By Ianis Dumitrescu
  • 4
  • 153
  • Remove Viruses and Malware

Many people still wrestle with infected Windows PCs. If your computer is infected and isn’t working properly, you don’t have to pay someone else to fix it. The Geek Squad doesn’t have any magic tools — they use many of the standard antivirus tools you can use yourself.

To find an antivirus product that actually offers good protection, consult an antivirus test website and see how your antivirus of choice stacks up. If you don’t feel like doing all that research yourself, luckily we’ve done it for you.

Kaspersky and Bitdefender consistently rank in the top of both the AV-Test and AV-Comparatives rankings, and we’ve used both products with good results. They aren’t free, but most of the free antivirus out there is bundling extra nonsense or trying to redirect your search engine to their “secure” solution that isn’t really secure and just shows you more ads or spies on your shopping habits.

For a really deep infection, a good repair place may dig through your autostart entries and registry by hand and manually remove malware that isn’t being caught by tools. However, this can be time-consuming — and if the computer is already so infected, there’s no guarantee all the malware will be removed. In cases like this, they’ll often just reinstall Windows. You can do that yourself, too.

  • Reinstall the Operating System

Some people think that computers become slower over time and eventually need to be replaced — it’s sad, but true. Other people may take the computer to a repair place when it starts slowing down. When dealing with a computer that’s become bogged down by startup programs and toolbars, a simple Windows reinstall is often the fastest, easiest solution.

This can also help if you’re experiencing other problems with your computer, such as file corruption or weird errors. While it’s often possible to troubleshoot these things by replacing corrupted files and bad drivers, it’s usually faster to just reset Windows back to its factory state.

Most new computers come with factory restore partitions, which you can access by pressing the correct key during the boot process (check your computer’s manual). You may also have CDs or DVDs you can restore your computer from. If you installed Windows yourself, you can use the Windows installation disc. On Windows 8, use the Refresh or Reset feature to easily reinstall Windows.

Be sure to back up your important files before doing this. Some places may back up your important files for you, while some may ask you to back them up ahead of time — that’s because they’ll just be reinstalling Windows for you.

  • Remove Included Bloatware

If you’ve just purchased a new computer — or reset your old computer back to its factory default state — you’ll often find it packed full of useless software. Computer manufacturers are paid to include these programs, which slow your computer down (particularly during the startup process) and clutter your system tray.

Best Buy’s Geek Squad will charge you to remove this bloatware. Even Microsoft is getting in on the action — if you bring a Windows PC to a Microsoft store, they’ll remove the bloatware for $99.

Don’t fall for it: You don’t have to pay a dime to remove these preinstalled programs. There are three ways you can go about doing this:

  • Use a program like PC Decrapifier. It will automatically scan your computer for bloatware and automatically uninstall it.
  • Open the Uninstall a program control panel and manually uninstall each piece of bloatware, one-by-one. If you do this on a new computer, be sure not to uninstall any hardware drivers. Everything else should be fair game.
  • Reinstall Windows. Many geeks like performing a fresh install of Windows on their new computers to start from a clean state. You’ll often have to download and install hardware drivers from your computer manufacturer’s website after the reinstall

Upgrade your RAM or Hard Drive

Some computer upgrades are particularly simple. Adding new RAM to your computer is a very simple process — as long as you buy the right RAM for your computer, installing it is will be easy (even in many laptops.) You can also upgrade your hard drive (or add a new hard drive) to increase the storage space you have available. This is a bit more complicated, as you’ll have to reinstall Windows or move your existing operating system over if you’re replacing the original hard drive, but it’s not too hard.

If you bought a laptop or pre-assembled desktop computer, you don’t need to take it to a repair place if it breaks. If it’s still under warranty, you can contact the manufacturer to RMA the computer and have them repair it. RMA stands for “return merchandise authorization” — you’ll need to tell the manufacturer’s service department your problem and receive an RMA number before mailing it to their service center.

[mai mult...]

How to buy used Computer Hardware without getting scammed

  • Posted 07 August 2025
  • By Ianis Dumitrescu
  • 1
  • 178

Corsair CX650M

While not the cheapest PSU around, the CX650M offers plenty of power for mid-range gaming PC builds, is well built, and can hold its ground against many pricier options.

As for storage, both SSDs and HDDs degrade over time, so while they can be an okay purchase if you find a good deal, you’re still risking losing all your data. That said, if the seller has checked the storage health, and it’s above ~95%, then it could be an okay purchase.

Now that you know what hardware is worth buying, it’s time to learn how to identify good deals. This step involves a bit of time and effort on your part, but trust me, every minute you spend learning about the current market prices will be well worth the savings in the end. Regardless of what component you’re planning on buying, you need to learn about the current market prices so that you can determine if the deal is worth the risk.

Start by setting your maximum budget for the component in question. Let’s say you have $400 to spend on a graphics card. First, learn a bit about the current offerings by NVIDIA, AMD, and Intel, then check how they stack up against the past two generations. For instance, AMD sells the RX 9060 XT 16GB for $349, and NVIDIA has the RTX 5060 Ti 8GB for $379. I’m skipping over the Intel B580 because it wouldn’t be a fair comparison given the card’s $250 MSRP.

Now, let’s see which older GPUs compare to the AMD RX 9060 XT 16GB and NVIDIA RTX 5060 Ti 8GB in terms of performance and price. On the AMD side, the RX 7700 XT (~$370–$400 used) and RX 6800 XT (~$360–$390 used) are strong contenders. NVIDIA’s closest equivalent is the RTX 3080 (~$380–$420 used). I personally picked up a used RX 6800 XT for $330 before the RX 9000 Series launched, and I’ve been very happy with the value I got.

Performance can vary quite a bit between these cards due to factors like ray tracing capabilities and upscaling technologies. Also, the new cards currently cost well above MSRP, and used cards cost more than usual, too, due to high demand. These are just rough comparisons, so take them as general estimates.

If you were able to buy the new cards at MSRP, they could actually be a better deal than these used cards. You might sacrifice a bit of raw performance, but you’re getting a warranty, better long-term driver support, and additional features like AMD FSR 4 and NVIDIA Multi-Frame Generation, which can boost performance significantly.

However, since new cards are currently priced well above MSRP, if you need a GPU right now, a well-priced used card is likely the better choice.

This situation highlights how quickly market conditions can change—a principle that applies to all types of hardware, not just GPUs. Always do your own research based on current prices and trends. Compare benchmarks for the hardware within your budget, but don’t forget to factor in long-term driver support, reliability, and other features.

Where to buy and how to recognize Scams

The safest places to buy used computer parts are sites that sell refurbished goods, such as Micro Center, Amazon, and Newegg. While you’re unlikely to find the absolute lowest prices, it’s also much harder to get scammed. Many items are inspected, certified, and often include a warranty and return protection.

That said, if you’re looking for the best deals, you’re more likely to find them on general-purpose digital marketplaces like eBay or Facebook Marketplace. These platforms often include local listings, which let you save on shipping and inspect the item in person. Plus, with seller review systems in place, it’s easier to spot trustworthy listings and avoid scams. This is my preferred method for buying most things, especially expensive computer hardware.

The third option is specialized used computer hardware platforms like Jawa, Swappa, and even subreddits like HardwareSwap. These sites fall somewhere between the previous two options—potentially better prices than retailers, but with fewer protections and deals than digital marketplaces.

Regardless of the platform, stick to the more popular listings and sellers to avoid scammers. The old proverb of “If something sounds too good to be true, it probably is” definitely holds true here. I’m not saying you should avoid the cheapest options on your site of choice, but be cautious. For example, if someone is selling a used RTX 4070 for $200 while most others list it at $400 or more, there’s a very good chance the card either doesn’t work or doesn’t even exist.

Once you contact the seller, if you find that they’re not answering your questions and are overly eager to sell you the item, be cautious. While there’s always the off chance they just need quick money, scammers often use this tactic to sell broken or stolen parts. They might say something like, “I have other buyers lined up, so if you don’t order now, someone else will take it!” Don’t fall for those tricks.

The most important step of all is to test the hardware in person. While not everyone will agree to these terms, and you might not always find the part you’re looking for locally, that’s okay. If you’re not in a rush, you can simply wait and keep an eye out for a local listing. I’ve bought and sold dozens of computer parts this way, having both had sellers test the hardware for me and tested hardware for my buyers.

Always meet in public, well-lit places when buying or selling used computer parts. Bring a friend if you can and trust your instincts—if something feels off, walk away. The best and safest way to test hardware is to bring your own test rig to a public space with accessible power outlets where you won’t be disturbed, such as a coworking space or library. You could also ask a local tech shop if they can help you test for a small fee.

Once your test rig is set up, first inspect the computer part for physical wear or damage like bent motherboard (or CPU) pins, then run a stress test and benchmark for at least 15 minutes while monitoring GPU and CPU temperatures. Run a few demanding games as well, since these can reveal issues like GPU artifacting or overheating.

Also, don’t forget that this is your opportunity to ask questions. Don’t be shy—ask about the part’s history and if it has any issues that they’re aware of. If it’s a GPU, ask if the card was used for mining and if the thermal paste and pads have been replaced.

If your only option is to have the computer part shipped to you, contact the seller and ask them for a quick video showing the computer part in action. Even better, ask them for a quick video call and have them run a stress test and some games with MSI Afterburner or the GPU’s overlay enabled.

Once you’ve finally brought the purchased computer part home, there are a few things that you should do. If it’s a dusty GPU or cooler, give it a thorough dusting and wipe it off with a microfiber cloth. If it’s a CPU, clean off the old thermal paste with rubbing alcohol. Next, add it to your PC if you’ve already bought the other components.

If it’s a motherboard or CPU, install the latest chipset drivers and consider updating the BIOS. If it’s a GPU, get the latest drivers. For storage, RAM, and fans, you generally don’t need to install anything, except RGB software if the components have RGB lighting.

Once everything is installed, I usually test the hardware thoroughly with stress tests and games one more time, especially if it’s a graphics card. For example, my friend bought the same graphics card from the same seller as me and only started experiencing problems under load during demanding games. He was able to get a replacement from the seller without issue, but if he hadn’t tested and reported the problem within a few days, the seller might have blamed him and refused the replacement.

[mai mult...]

How I get an Email when someone logs into My Windows 11 PC

  • Posted 07 August 2025
  • By Ianis Dumitrescu
  • 3
  • 174

Create a Script to Send the Email

The first step is to write the script that sends an automatic email when someone signs in to a user account on your Windows 11 PC. This script contains your email account’s login details and the custom message that you receive when someone has signed to your PC.

This script stores your email password in plaintext. In theory, that is a security vulnerability if someone finds it and starts going through it. If you’re concerned about that security risk, you can create a throwaway email to use for this instead. That way there is no risk of someone gaining access to your real email.

To create the script, access Windows Search (press Windows+S), type Notepad, and launch the app. In a new document, type the following script:

# Email Settings
$smtpServer = "smtp.youremailprovider.com"
$smtpPort = "587"
$smtpUser = "yourname@youremailprovider.com"
$smtpPass = "youremailpassword"
$toEmail = "recipient@email.com"
$subject = "Login Alert on $env:COMPUTERNAME"
$body = "User $env:USERNAME has just logged in at $(Get-Date)."

# Send Email
$msg = New-Object System.Net.Mail.MailMessage $smtpUser, $toEmail, $subject, $body
$smtp = New-Object Net.Mail.SmtpClient($smtpServer, $smtpPort)
$smtp.EnableSsl = $true
$smtp.Credentials = New-Object System.Net.NetworkCredential($smtpUser, $smtpPass)
$smtp.Send($msg)

In the script, in the Email Settings section, replace the SMTP settings with those that reflect your email account. You can get these details from Gmail, Outlook, or another email provider that you use. In case you’ve enabled two-factor authentication for your email account, you’ll have to create an app-specific password and use that instead in the SMTP settings section.

  • After you’ve configured the settings in the script, save the script.
  • From Notepad’s menu bar, select File > Save As.
  • On the Save As window, choose the folder in which you want to save the file.
  • Select the “Save as Type” drop-down menu and choose “All Files”
  • Click the “File Name” field and type something like SendLoginEmail.ps1
  •  Then, choose “Save”.

Your email script is ready, and you’ll now use Task Scheduler to run the script each time someone logs in to a user account on your PC.

  • To do that, open Windows Search (press Windows+S), type Task Scheduler, and launch the utility. On the right pane, click “Create Task.”
  • In the General tab, select the “Name” field and type a name for the task. This could be something like Login Email Alert.
  • Turn on the “Run Whether User Is Logged On or Not” and “Run With Highest Privileges” options.
  • From the top bar, open the “Triggers” tab. Click “New” to add a new trigger. Select the “Begin the Task” drop-down menu and choose “At Log On.”
  • If you want to get an email alert when any user logs in to your PC, choose “Any User.” To only get an alert when someone logs in to a specific user account, enable “Specific User.” Then, click “Change User” and select the account.
  • Open the “Actions” tab and click “New” to add a new action.
  • Select the “Action” drop-down menu and choose “Start a Program”
  • Select the “Program/Script” field and type powershell.exe.
  • In the “Add Arguments (Optional)” field, type the following. Make sure to replace the script path with the path to the script you created earlier.
-ExecutionPolicy Bypass -File "C:\Scripts\SendLoginEmail.ps1"
  • Select “OK,” enter your admin password, and save the task.

From now on, Windows 11 will automatically send you an email when someone logs in to your PC. In the future, if you don’t want to receive these alerts, right-click your task in Task Scheduler and choose “Delete”. To quickly find these emails in your inbox, you can set up a label. The script above uses “Login Alert on” as the subject line, which you can use to filter all these emails.

Hide the PowerShell Window on Startup

To send you an email alert when someone logs in to your PC, Windows 11 launches PowerShell for a brief moment. This means anyone logging in to your PC will see that window. If you’d like to hide the window, do the following.

Open Notepad and type the following. Make sure to replace the script path with your script’s path.

Set objShell = CreateObject("Wscript.Shell")
objShell.Run "powershell.exe -ExecutionPolicy Bypass -File ""C:\Scripts\SendLoginEmail.ps1""", 0, False

From Notepad’s menu bar, select File > Save As. Select the folder in which you want to save the script. Click the “Save as Type” drop-down menu and choose “All Files.” Click the “File Name” field and type SendLoginEmail.vbs. Then, choose “Save.”

Open Task Scheduler and edit your task. For the action, change “Program/Script” to wscript.exe. In the “Add Arguments (Optional)” field, type the following, replacing the path with your script’s path.

"C:\Scripts\SendLoginEmail.vbs"
[mai mult...]
  • 1
  • 2
  • Next

Statistici Autor

20 Solutii Create

3770 Vizualizari solutii

34 Like-uri solutii

© Askit.ro, 2014 - 2026. All rights reserved. Done by Class IT