How to Fix Error Code 0x0 0x0 In Windows 11

How to Fix Error Code 0x0 0x0 In Windows 11

Windows are full of errors and definitely, and it’s really frustrating to go through errors when you are in the middle of something important. In this post, we will discuss one particular issue on Windows 11. We are doing to discuss Error Code 0x0 0x0 In Windows 11 and its reason and also the solution for it.

How to Fix Error Code 0x0 0x0 In Windows 11

There are multiple reasons behind the error code 0x0 0x0 In Windows 11. Sometimes you might come across this error because of corrupted or missing system files in Windows, sometimes outdated device drivers might be causing this error and sometimes the external virus can be the reason for it.

No matter what can be the reason, In this post, we have a solution for “Error Code 0x0 0x0 In Windows 11“.

Solution 1:
Perform a Clean Boot:

A clean boot helps you to start your Windows 11 without any error as in this process, the system will avoid any third-party apps or software that might be creating issues during startup. Performing a clean boot can help to eliminate any third-party software interference and it also helps you to identify the source of the problem.

Go through the following steps to perform a clean boot on Windows 11.

  1. Press Win + R to open the Run command window or you can search Run from the search option in Windows 11.
  2. Type “msconfig” in the Run window and hit Enter.
  3. Once, msconfig window is open, you need to switch to the Services tab and enable Hide all Microsoft services at the bottom.
  4. Click on the Disable all button and then switch to the Startup tab. Select Open Task Manager and select each startup item one by one.
  5. Disable each and every app that starts during the startup of the system, close Task Manager, save changes, and restart your computer.
  6. If you are able to solve your problem, you can re-enable the Microsoft services and start enabling each startup item one by one to figure out the services or apps that might be causing the problem.

Solution 2:
Update Drivers:

Sometimes outdated drivers can be the reason behind error 0x0 0x0 on Windows 11. So, In this step, we will check our drive status. Open the device manager by going through the following steps:

  1. Right-click on the Start button and select the Device Manager option from the menu.
  2. You will see the different hardware and the required drivers installed in your system. In this section, you can also see the drivers having an issue with the yellow exclamation mark on it.
  3. Right-click on each driver and select Update driver from the menu.

Solution 3
Disable or Rollback Windows Update:

If you came across the error 0x0 0x0 after a recent Windows update then there might be conflicts with the latest updates and your system.  To fix this, you need to disable or roll back the update.

  1. Press Win + I to open Settings.
  2. Switch to the Windows Update tab and select the Update history option.
  3. Under the “Update history” Window, click on the Uninstall updates option.
  4. Here, you need to see the recent Windows updates and click Uninstall link to uninstall updates.
  5. Restart your computer and see whether you are able to solve your issue or not.

Solution 4:
End Simultaneously Running Programs:

In Windows, you might come across a strange situation while running two or more applications at the same time and this can be one of the reasons behind error 0x0 0x0 cause this error. Let’s try to fix this by ending all the applications running simultaneously. You can easily do it through the task manager.

  1. Press Ctr + Alt + Delete, and then select Task Manager from the menu or you can also select Task manager from the start menu ( You need to right-click on the start menu icon)
  2. Go to the “Processes” tab and select the program you want to end. Right-click on the process and select “End Task” to end the program.

How to Enable Minimize button in Elementary OS 7 App Windows

Elementary OS 7 is finally released! Here’s how to enable the “Minimize” title-bar button in its app windows.

Elementary OS 7 is based on Ubuntu 22.04 LTS. It was released on Tuesday with many improvements on its core applications as well as desktop experience.

Like Fedora workstation, this Linux Distro does not has a ‘Minimize’ button out-of-the-box. But changing the button-layout key via either dconf-editor or gsettings does not function.

Step 1: Install Pantheon Tweaks

Pantheon Tweaks is simple configuration tool adds more options to configure Elementary OS’ Pantheon desktop appearance.

1. First, search for and open a terminal window from top-left ‘Application’ menu.

2. When terminal opens, run command to install the package for the ability to add PPA repositories:

sudo apt install software-properties-common

Run sudo apt update first on a fresh OS to update package index.

3. Next, run command to add the Ubuntu PPA that contains the Pantheon Tweaks package:

sudo add-apt-repository ppa:philip.scott/pantheon-tweaks

4. After adding PPA, install the tool by running command:

sudo apt install pantheon-tweaks

Step 2: Enable Minimize button

After installing Pantheon Tweaks, open or re-open System Settings from the bottom dock launcher. When it opens, you’ll see a new “Tweaks” option under ‘Personal’.

Click on it to open the settings page. There’s a drop-down box for selecting layout of “Window Controls”. Just choose Windows, Ubuntu, macOS, add minimize, or whatever option that you prefer.

The title-bar button layout will change immediately! Done.

This Extension Can Save & Restore All Open App Windows in Ubuntu 22.04

I don’t remember when’s the last time auto-save session feature works correctly in my Ubuntu machine. While, enabling hibernation could be the best choice now to save and restore all open app windows in Ubuntu.

But for those who really like the auto-save session feature, here’s an Gnome Shell extension can do the job partially.

It’s ‘Another Window Session Manager’, an extension which adds an indicator icon on top panel system tray area. It provides an option to manually save all open windows, then allows to restore either manually via menu button or automatically at login.

Save open windows

Not only for classic Xorg, but it also supports Wayland session. Also, it remembers window size, position, and workspace. The downsides are that it does not restore the window workspace correctly sometimes, and restores some apps in empty window rather than last open files or URLs.

The extension is not perfect so far, but anyhow it’s better than nothing!

How to Install this session restore extension:

The extension so far support for Gnome 40, 41, 42 and 43. Meaning not only for Ubuntu 22.04, Ubuntu 22.10, it also works in Fedora 35/36/37 workstation, Rocky Linux 9, Arch, and other Linux with recent GNOME desktop.

For Ubuntu 22.04+, first search for and install “Extension Manager” app from Ubuntu Software.

Install Extension Manager in Ubuntu 22.04+

Then, use the tool to search and install “Another Window Session Manager” under Browse tab.

For Fedora 35/36/37 and other Linux with GNOME, visit the extension web page and use ON/OFF switch to install it.

Enable Restore open windows at login

The feature to restore all open app windows on startup after user login is not enabled by default.

You can need to do following steps one by one to enable the function:

    1. First, go to ‘Installed’ tab in Extension Manager. Then open the configuration dialog for the extension, by clicking on the gear button. (or install Gnome Extensions app and use the tool to open the settings).
    2. Next, navigate to “Restore Sessions” tab and:
      • enable ‘Restore at startup’ toggle option.
      • enable ‘Restore at startup without asking’ to skip the confirm dialog on each login (optional)

Finally, open the indicator menu, and turn on the ON/OFF switch for your saved session, so it will restore automatically at next login.

That’s all. Enjoy!

How To Add Or Remove Ubuntu Linux Folder On File Explorer Navigation Pane In Windows 11

Tutorial To Add Or Remove Ubuntu Linux Folder On File Explorer Navigation Pane In Windows 11

In this Ubuntu tutorial post, we will show you the methods to add or remove the Ubuntu Linux folder on the file explorer navigation pane in Windows 11. This one is useful if you are using dual boot on your Laptop or desktop. The Ubuntu folder is automatically added to the navigation pane in the File Explorer navigation pane by default when you enable the Windows Subsystem for Linux and installed Ubuntu.

How To Add Or Remove Ubuntu Linux Folder On File Explorer Navigation Pane In Windows 11

This is quite an easy process to add or remove the Ubuntu Linux folder on the file explorer navigation pane in Windows 11. Go through the following steps to configure it:

  1. Open File Explorer by clicking on the folder icon in the taskbar or by pressing the Windows key + E.
  2. Click on the “View” tab in the ribbon at the top of the window.
  3. In the “Layout” group, click on the “Navigation pane” button.
  4. In the navigation pane options menu, select or deselect the “Show libraries” option. If you want to show the Ubuntu Linux folder, make sure the option is selected. If you want to hide the Ubuntu Linux folder, make sure the option is deselected.
  5. Close the navigation pane options menu by clicking on the “X” in the top right corner of the menu or by clicking outside of the menu.

Note: If you do not see the “View” tab or the “Navigation pane” button, you may need to enable the ribbon in File Explorer. To do this, click on the “File” tab in the ribbon and then click on the “Options” button in the “General” group. In the “Folder Options” window, go to the “View” tab and under “Advanced settings”, check the box next to “Show the ribbon”. Click “OK” to save the changes.

Let us know if this step works for you or not and don’t forget to share our blog post to your friend who is in need of this tutorial.

Inkscape 1.2.2 is out! OpenClipart import works in AppImage & Windows

The free open-source Inkscape vector graphics editor got a new maintenance release for the 1.2 series.

The is the second update for Inkscape 1.2, which finally makes OpenClipart import available for Windows and Linux user using AppImage. And, Color extensions works on patterns again.

For macOS, spellchecking finally works and undo/redo options are back in the menu. For Linux, the snap package is no longer possible to install with --classic option. Meaning the snap won’t be able to access data outside of user’s home directory.

Other changes in Inkscape 1.2.2 include:

  • no longer freezes when rotating objects with snapping activated under certain conditions
  • Dithering now disabled by default due to performance loss.
  • Several fixes to the DXF14 export
  • TIFF export now supports transparency
  • DPI attribute is preserved for JPG and TIFF raster export
  • Correct PNG file permission in Linux.
  • Measure tool now indicates correct positions and sizes for shapes

There are as well various other bug-fixes and improvements, see the release note for details.

How to Install Inkscape 1.2.2 in Ubuntu & other Linux

Inkscape website offers official Windows, macOS, Linux, and source tarball, available to download at the link below:

For Linux, it’s available to install via AppImage, Snap, and deb (through PPA), and Flatpak.

Option 1: Snap

Snap is an universal package that runs in sandbox. Ubuntu 20.04 and higher can simply search for and install Inkscape as Snap from Ubuntu Software:

Install inkscape as Snap from Ubuntu Software

Option 2: AppImage

AppImage is a portable package works in most Linux. No installation required, just grab the package (via link above), enable ‘Allow executing file as program‘ in file Properties dialog. Finally, click Run the package to launch the editor.

Option 3: Ubuntu PPA

For the native .deb package, it has an official stable PPA contains the latest package for Ubuntu 20.04, Ubuntu 22.04, and Ubuntu 22.10.  Not only for modern 64-bit OS, the PPA now also supports for arm64/armhf architecture types.

1. First, press Ctrl+Alt+T on keyboard to open terminal. When it opens, run command to add the PPA:

sudo add-apt-repository

Type user password (no asterisk feedback) when it asks and hit Enter to continue.

2. Then either install the image editor as native .deb package via:

sudo apt install inkscape

NOTE: Linux Mint user need to refresh package cache via sudo apt update first.

Or use ‘Software Updater’ to upgrade from an old version:

Option 4: Flatpak

Flatpak is another universal package format that runs in sandbox. Different to previous package formats, Inkscape as Flatpak is maintained by the open-source community.

Ubuntu 20.04 and higher and follow the steps below to install Inkscape as Flatpak package:

  • 1. First, open terminal and install Flatpak daemon via command:
    sudo apt install flatpak
  • 2. Then install Inkscape as Flatpak using command:
    flatpak install

Uninstall Inkscape:

Depends on which package you installed, choose from the methods below:

  • For Snap package, remove it from Ubuntu Software.
  • For AppImage, just remove the package file.
  • To remove the Inkscape PPA, open terminal and run command:
    sudo add-apt-repository --remove

    Also remove the editor if you want via command:

    sudo apt remove --autoremove inkscape
  • For the Flatpak package, use command:
    flatpak uninstall --delete-data org.inkscape.Inkscape

    And run flatpak uninstall –unused to remove useless runtime libraries.

Zorin OS 16.2 Released: Windows 11 Alternative

Zorin OS 16.2 Released: Windows 11 Alternative

Zorin OS 16.2 is now available for download as the second major update to the Zorin OS 16 series. Zorin OS 16.2 looks much more similar to Windows 11 as users can now launch the “Windows App Support” app straight from the Zorin Menu. Now, You can easily install Windows apps and games with just a few clicks. You can download Zorin OS 16.2 from the official website.

The Zorin OS 16 release series will get software and security updates until April 2025.

Zorin OS 16.2 Released: Windows 11 Alternative

Let’s have a look at the new features and improvements that you can find on Zorin OS 16.2:

  1. Improvements to Zorin Connect
  2. Framework Laptop with 12th Generation Intel Processors
  3. Xbox One Controller
  4. GNOME Software 3.36.1
  5. GIMP 2.10.18
  6. Rhythmbox 3.4.4
  7. GNOME Maps 3.38.2
  8. GNOME Calendar 3.38.2
  9. Firefox 106
  10. NVIDIA graphics cards, including the GeForce RTX 4090
  11. AMD Radeon and Intel graphics cards
  12. Apple Magic Mouse
  13. USB4

How to Upgrade to Zorin OS 16.2?

You can easily upgrade to the latest version of Zorin OS. If you’re already running Zorin OS 16, you can upgrade to Zorin OS 16.2 by installing the latest updates from the Software Updater.

Zorin OS is available in two editions and which are free, and pro editions. Zorin OS 16.2 Pro will cost from £39

Microsoft Latest Patch Fixes New Windows Zero-Day With No Patch for Exchange Server Bugs

Recent news reports show that Microsoft’s Patch Tuesday update for the month of October has addressed a total of 85 security vulnerabilities, including fixes for an actively exploited zero-day flaw in the wild.

It appears that out of the 85 bugs, 15 are rated Critical, 69 are rated Important, and one is rated Moderate in severity. The update, however, does not include mitigations for the actively exploited ProxyNotShell flaws in Exchange Server.

Notably, the patches come alongside updates to resolve 12 other flaws in the Chromium-based Edge browser that have been released since the beginning of the month.

Microsoft’s latest patch has topped the list of this month’s patches is CVE-2022-41033 (CVSS score: 7.8), a privilege escalation vulnerability in Windows COM+ Event System Service. An anonymous researcher has been credited with reporting the issue.

“An attacker who successfully exploited this vulnerability could gain SYSTEM privileges,” the company said in an advisory, cautioning that the shortcoming is being actively weaponized in real-world attacks.

Observations show the nature of the flaw also means that the issue is likely chained with other flaws to escalate privilege and carry out malicious actions on the infected host.

“This specific vulnerability is a local privilege escalation, which means that an attacker would already need to have code execution on a host to use this exploit,” Kev Breen, director of cyber threat research at Immersive Labs, said.

In addition, three other elevation of privilege vulnerabilities of note relate to Windows Hyper-V (CVE-2022-37979, CVSS score: 7.8), Active Directory Certificate Services (CVE-2022-37976, CVSS score: 8.8), and Azure Arc-enabled Kubernetes cluster Connect (CVE-2022-37968, CVSS score: 10.0).

Even with the “Exploitation Less Likely” tag for CVE-2022-37968, Microsoft noted that a successful exploitation of the flaw could permit an “unauthenticated user to elevate their privileges as cluster admins and potentially gain control over the Kubernetes cluster.”

Patch update CVE-2022-41043 (CVSS score: 3.3) – an information disclosure vulnerability in Microsoft Office – is listed as publicly known at the time of release. It could be exploited to leak user tokens and other potentially sensitive information, Microsoft said.

Additionally fixed by Redmond are eight privilege escalation flaws in Windows Kernel, 11 remote code execution bugs in Windows Point-to-Point Tunneling Protocol and SharePoint Server, and yet another elevation of privilege vulnerability in the Print Spooler module (CVE-2022-38028, CVSS score: 7.8).

In conclusion, the Patch Tuesday update further addresses two more privilege escalation flaws in Windows Workstation Service (CVE-2022-38034, CVSS score: 4.3) and Server Service Remote Protocol (CVE-2022-38045, CVSS score: 8.8).

Lastly, web security company Akamai, which discovered the two shortcomings, said they “take advantage of a design flaw that allows the bypass of [Microsoft Remote Procedure Call] security callbacks through caching.”

Software Patches from Other Vendors

As well as Microsoft, security updates have also been released by several vendors to rectify dozens of vulnerabilities, including —

The post Microsoft Latest Patch Fixes New Windows Zero-Day With No Patch for Exchange Server Bugs appeared first on IT Security Guru.

unlockR – Stupid Simple App to Remove PDF Password in Linux & Windows

For those want to unlock / decrypt PDF files, there’s now a stupid simple graphical tool to do the job in Linux.

It’s easy to encrypt you PDF files in Ubuntu Linux since the built-in LibreOffice office suite has the option on ‘Export as PDF’ dialog. However, there seems no easy way to remove password for PDF file, other than using qpdf command:

qpdf --decrypt --password=<PASSWORD> input.pdf output.pdf

unlockR is a new GTK4 application that use Libadwaita to provide a modern simple user interface to decrypt your PDF files.

It’s so simple that you just need to click ‘Open a File‘ to select your PDF, then type the password, and finally hit ‘Decrypt’. It doesn’t change the original file, but generates a new PDF without password protect.

As the picture shows, it has both light and dark mode that switches automatically according your system color scheme.

NOTE: This app is NOT about to crack password on a PDF file. You need the password to be able to decrypt it.

How to Install unlockR

It is a free open-software software works on both Linux and Windows. For Windows package, just grab the zip from github releases page:

For Linux, it offers the binary package via universal Flatpak. Ubuntu user need to first press Ctrl+Alt+T on keyboard to open terminal, and run command to install the Flatpak daemon:

sudo apt install flatpak

Next, install the app package via command:

flatpak install

Like normal applications, search for and open it from ‘Activities’ overview (or start menu) after installation.


To remove the Flatpak package, open terminal and run command:

flatpak uninstall --delete-data com.github.jkotra.unlockr

You may also clear useless runtime libraries via flatpak uninstall --unused.

Microsoft Patches Zero-Day Bug That Allowed Remote Execution on Windows Machines

In Microsoft’s latest Patch Tuesday update this week, Microsoft patched a zero-day bug that allowed remote execution on Windows machines and which is already being exploited in the wild.

CVE-2022-22047 is an elevation of privilege vulnerability in the Windows Client/Server Runtime Subsystem (CSRSS), which is responsible for Windows features, including the shutdown process. Details on how to exploit the bug have not been publicly disclosed. An attack that succeeds could, however, gain access to SYSTEM privileges in Windows.

The bug was ranked as important by Microsoft. This could cause some customers to miss it. As it is being exploited in the wild, it is crucial that organisations patch it as soon as possible.

Additionally, CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) list and has given federal agencies three weeks to patch it. Under Binding Operational Directive 22-01, issued in November, these patches are mandatory and agencies must fix bugs in the KEV list.

Four critical bugs were patched in Microsoft’s patch Tuesday this week. Allowing remote code execution, CVE-2022-22029 and CVE-2022-22039 affect the Windows Network File System. They are exploitable with a maliciously crafted call to an NFS service.

Another critical bug, dubbed CVE-2022-22038, is a remote code execution vulnerability in the Windows RPC runtime. According to Microsoft, it can be exploited by attackers by sending “constant or intermittent data.”

CVE-2022-30221 was the final critical bug to be patched in the update. It’s a flaw in the Windows Graphics Component which also allows for remote code execution. Microsoft said, that to exploit this flaw, an attacker would need to target machines with RDP 8.0 or 8.1. They would need to convince a user to connect to a malicious RDP server that could then execute remote code on the victim’s systems.

Adobe also released updates for many of its programs on Tuesday, including Photoshop and Acrobat. The Reader and Acrobat updates fixed over 20 vulnerabilities, including some that allowed arbitrary code execution.

The post Microsoft Patches Zero-Day Bug That Allowed Remote Execution on Windows Machines appeared first on IT Security Guru.