100 Percent Disk Usage – Windows 10

In this article we’ll be talking about some things that cause 100 Percent Disk Usage and how to fix them

Windows Search

Windows Search is the back-end system that allows you to find your files faster on your Computer. It works by constantly indexing every single file on your computer.

  • Open a Command Prompt as Administrator
  • Enter the following
net.exe stop “Windows search”

Click Enter
To turn it off permanently:

Press Windows key + R and type

services.msc
  • Click OK
  • Scroll down the list of services and double-click Windows Search
  • Click the General tab
  • Set the Startup type to Disabled
  • Click OK

SuperFetch

SuperFetch is a feature that helps decrease boot time by making apps load more efficiently. However, it can cause usage problems with your drive.

  • In Command Prompt, type
net.exe stop superfetch
  • Click Enter

To disable it permanently

In services.msc, disable Windows SuperFetch

Skype

  • Go to C:\Program Files (x86)\Skype\Phone and right-click on Skype.exe
  • Select Properties
  • Click the Security tab
  • Click the Edit button
  • Make sure All Application Packages is highlighted
  • Check Allow for Write Permissions
  • Click OK
Advertisements

Deleting an EFI System Partition on Windows

The EFI system partition (ESP) is a partition on a data storage device (usually a hard disk drive or solid-state drive) that is used by computers adhering to the Unified Extensible Firmware Interface (UEFI).

An ESP contains the boot loaders or kernel images for all installed operating systems (which are contained in other partitions), device driver files for hardware devices present in a computer and used by the firmware at boot time, system utility programs that are intended to be run before an operating system is booted, and data files such as error logs ref. An EFI system partition is usually protected and locked by the Windows operating systems to prevent and avoid accidental deletion of these partitions. That’s why you can’t delete EFI partition using Disk Management tool.
Continue reading Deleting an EFI System Partition on Windows

Completely Uninstall Office 2016 for Mac

Important:

To completely uninstall Office 2016 for Mac you must remove the applications, supporting files, and keychain entries, plus any icons you’ve added to the Dock. Once you’ve removed everything, empty the Trash and restart your Mac to complete the process.

You must be signed in as an administrator or provide an administrator name and password to complete these steps.

There are several things to remove. This article steps you through each one.

Continue reading Completely Uninstall Office 2016 for Mac

Minecraft Is Getting Cross-Play On Multiple Platforms

With the upcoming release of the Better Together this summer, Mojang will unify the Nintendo Switch and Xbox One with mobile and Windows 10 PC versions of the game under the Bedrock Engine family. (excluding Java Minecraft which will continue to be supported as an independent version)
Continue reading Minecraft Is Getting Cross-Play On Multiple Platforms

New Attack Method Delivers Malware Via Mouse Hover

Mouseover’ technique relies on users hovering over hyperlinked text and images in Microsoft PowerPoint files to drop Trojan.

Researchers have found a new form of attack that abuses the action of hovering over hyperlinked text and images in a Microsoft PowerPoint presentation.

Trend Micro researchers discovered the “mouseover” technique, used by a Trojan downloader also found in a spam campaign hitting EMEA businesses in the manufacturing, education, pyrotechnics, logistics, and device fabrication industries. The downloader they analyzed delivers a version of the OTLARD banking Trojan, also known as GootKit.

“This is the first occurrence of malware using the ‘hover’ method to initiate a download that we know of,” says Mark Nunnikhoven, Trend Micro’s VP of cloud security.

“While GootKit is known malware, businesses should be more concerned about this latest technique as it shows none of the usual indicators of an infected document,” he explains. This is novel because it abuses the previously safe user practice of hovering over a link before clicking.
Continue reading New Attack Method Delivers Malware Via Mouse Hover

Google Chrome – Your Preferences cannot be read

Logged into my Linux computer today and got this error as I tried to start Chrome. Tried the basics and it did not work, searched Google and saw many others having this same issue so I decided to document the process of fixing this issue here. I’ll start with the basic stuff first then will get into the more detailed steps.
Continue reading Google Chrome – Your Preferences cannot be read

Monitoring an Outlook Web Access site with Nagios

This is actually a really old post that I had done on another site and wanted to share it here in case it would help anyone. We have the code on GitHub should you want to fork it or collaborate to keep it updated to more recent versions of Nagios and Exchange.

I was tasked at work to devise a way to make our Exchange OWA site be monitored by our Nagios-3 servers. After several days and some hours of research, hoping that someone had already done it in hopes of making my life easier; I ended up with one script that basically combined php and curl. Being new to scripting it was most confusing and I ended up taking on the task to introduce myself to it.

Continue reading Monitoring an Outlook Web Access site with Nagios