Windows 8.1 and Windows Server 2012 R2 privacy statement

Javascript is disabled

{{search404Captions.content404Title}}
WER can be controlled by using command-line methods only. If you choose to customize settings, you can control CEIP by selecting Participate in the Customer Experience Improvement Program to help improve Microsoft software and services under Send Microsoft info to help make Windows and apps better. Microsoft doesn't use the information to contact individual consumers. If the problem persists in safe mode, you may have to visit the service center to check and repair. Sign in with a Microsoft account. Windows Tap and Send makes it easy to share selected information with a friend standing next to you or with another one of your devices such as a mobile phone.

Cookies are disabled

Additional FAQ

You can view the information contained in the report before choosing whether to send it. Microsoft uses this information to help improve the installation experience and to create solutions to common installation problems. The report generally includes information about your installation experience, such as the date of installation, the time it took for each installation phase to complete, whether the installation was an upgrade or a new installation of the product, version details, operating system language, media type, PC configuration, and success or failure status, along with any error codes.

If you choose to participate in the Installation Improvement Program, the report is sent to Microsoft when you're connected to the Internet. The GUID lets us determine which data is sent from a particular computer over time. The GUID doesn't contain any personal information and isn't used to identify you. Microsoft and our partners use the report to help improve our products and services. When you print using this feature, you must first connect and authenticate yourself to an Internet print server.

The information that you'll need to submit to the print server will vary depending on the level of security that the print server supports for example, you might be asked to provide a user name and password. The information collected enables you to print using remote printers.

If you send information to a third-party print server, use of the information will be subject to the third party's privacy practices.

You can enable or disable Internet printing by opening Programs and Features in Control Panel, and then selecting Turn Windows features on or off. Apps and websites appear in the first language available in that list. When you visit websites and install apps on your PC, your list of preferred languages is sent to the websites you visit and is available to the apps you use so they can provide content in your preferred languages.

Microsoft doesn't use any language information to identify or contact you. Language information sent or used by third-party websites and apps is subject to the privacy practices of the third-party website or app publisher. Your list of preferred languages is available to the apps you install and websites you visit. You can add or remove languages from this list in Language preferences in Control Panel.

On PCs running Windows, "location services" refers to the Windows software and Microsoft online service that are used to determine the approximate physical location of your PC, which is provided to apps or websites that you allow to access it.

For example, you can install devices such as a GPS receiver that might send location information directly to an app and entirely bypass the platform. Apps that are authorized to use the platform to determine your location could also transmit or store that information. If you enable the Windows Location Platform, authorized apps will be able to access your location and use it to give you personalized content.

If you choose to customize settings, you can control the Windows Location Platform by selecting Turn on Windows Location Platform so apps can ask users for their location under Share info with apps. Each user can control their own location settings for all apps in Privacy in PC settings.

In addition, administrators can choose to turn off the Windows Location Platform for all users in Location in Control Panel. The Windows Location Provider will first check to see if it has a list of Wi—Fi access points stored from a prior request by a location-aware app.

If there isn't already a list of nearby Wi—Fi access points, or if the list is out of date, the provider sends information about nearby Wi—Fi access points and GPS information if available to the Microsoft Location Service. Windows Location Provider may also update its stored list of Wi—Fi access points.

This list of access points is encrypted when stored on disk so that apps can't directly access it. The GPS information includes observed latitude, longitude, direction, speed, and altitude. The information is used by the Windows Location Provider to give Windows Location Platform the approximate location of your PC when an authorized app requests it. For more information about how to control whether apps can request your PC's location, see the Windows Location Platform section.

If you authorize apps to request your PC's location, the cached list of nearby Wi-Fi access point locations that are encrypted and stored by the Windows Location Provider will be deleted and replaced periodically. If you choose express settings while setting up Windows, you choose to help improve the Microsoft Location Service. If you choose to customize settings, you can control whether to help improve the Microsoft Location Service by selecting Help improve Microsoft services by sending some location data when location-aware apps are used under Send Microsoft info to help make Windows and apps better.

To provide personalized content, apps can request your name and account picture from Windows. Your name and account picture are displayed under Your account in Users in PC settings.

If you sign in to Windows with a Microsoft account, Windows will use the name and account picture associated with that account. If you allow apps to access your name and account picture, Windows will provide that information to all apps that request it. Apps might store or transmit this information. If you sign in to Windows with a domain account, and you choose to allow apps to use your name and account picture, apps that can use your Windows credentials will be allowed to access certain other forms of your domain account information.

This information includes, for example, your user principal name like jack contoso. If you sign in to Windows with a Microsoft account, or if you sign in to Windows with a domain account connected to a Microsoft account, Windows can automatically sync your account picture on your PC with your Microsoft account picture.

If you choose express settings while setting up Windows, Windows will allow apps to access your name and account picture. If you choose to customize settings, you can control access to your name and account picture by selecting Let apps use my name and account picture under Share info with apps.

After setting up Windows, you can change this setting in Privacy in PC settings. You can change your account picture in Personalize in PC settings. You can also choose to allow certain apps to change your account picture. If you have a subscription plan for network access for example, via a mobile broadband connection , this feature provides information about your subscription plan to apps and Windows features on your PC. Windows features and apps can use this information to optimize their behavior.

This feature also provides information about your network connection, such as signal strength and whether your PC is connected to the Internet. This feature collects Internet and intranet network connectivity information, such as the Domain Name Service DNS suffix of your PC, network name, and gateway address of the networks that your PC connects to.

This feature also receives subscription plan information such as the amount of data remaining in the plan. Network connectivity profiles can include a history of all networks visited and the date and time of the last connection.

This feature can attempt to connect to a Microsoft server to determine whether you're connected to the Internet. The only data sent to Microsoft during network connectivity checks is standard PC information. If data is sent to Microsoft, it is only used to provide network connectivity status.

Network connectivity status is made available to apps and features on your PC that request network connectivity information. If you use a third-party app, use of the information collected will be subject to the third party's privacy practices. Network Awareness is on by default. Disabling this feature isn't recommended because it will prevent some Windows features from functioning properly.

Windows Store apps can automatically receive content and display notifications in several ways. They can, for example, receive notifications that are displayed briefly in the corner of the screen or on app tiles if those tiles are pinned to Start. The lock screen can display detailed or brief status for certain apps as well.

App publishers can send content to your Windows Store apps through the Windows Push Notification Service running on Microsoft servers, or the apps can download information directly from third-party servers. Windows Store apps can deliver periodic or real-time information to you that will be displayed briefly as notifications in the corner of the screen. Apps can display text, images, or both in notifications.

The contents of notifications can be provided locally by the app for example, an alarm from a clock app. Notifications can also be sent from an app's online service through the Windows Push Notification Service for example, a social network update. Images displayed in notifications may be downloaded directly from a server specified by the app publisher; when that happens, standard computer information will be sent to that server. Microsoft only uses notification information to deliver notifications from your apps to you.

You can turn off notifications for all apps or for individual apps in Notifications in PC settings. Some apps can display status and notifications on the screen when your PC is locked. Lock screen apps could also transmit or process other information unrelated to notifications and updates. Windows uses the status and notification information provided by the lock screen apps to update the lock screen. After you set up Windows, the Mail, Calendar, and Messaging apps are automatically set as lock screen apps.

You can add or remove these or other apps from the lock screen in Personalize in PC Settings. You can also choose one app to persistently display detailed status for example, details for the next appointment on your calendar on the lock screen. You can control whether lock screen apps can display notifications on the lock screen in Notifications in PC settings.

Store apps that are pinned to Start can update their tiles with text, images, or both. If tile content is downloaded directly from a server specified by the app publisher, standard computer information will be sent to that server. Microsoft only uses tile information to deliver tile updates from your apps to you. To clear the current updates displayed on your Start tiles, swipe from the right side or point to the upper right corner of Start, tap or click Settings , and then tap or click Tiles.

Tap or click the Clear button under Clear personal info from my tiles. Tile updates delivered after you clear the current updates will continue to appear. Order Prints enables you to send digital pictures stored on your PC or a network drive to an online photo printing service of your choice. Depending on the service, you can have your pictures printed and then delivered using postal mail or you can pick up the prints at a local store.

If you decide to place an order with an online photo printing service, your digital photos are sent over the Internet to the service that you selected.

The file path to the digital pictures that you select which might include your user name might be sent to the service in order to allow the service to display and upload the images.

Digital picture files might contain data about the image that was stored with the file by the camera, such as the date and time that the picture was taken or the location where the picture was taken if your camera has GPS capabilities. The files might also contain personal information such as captions that might have been associated with the file through the use of digital picture management apps and Windows Explorer.

For more information, see the Properties section below. Information you enter on the online photo printing services website is transmitted to the service. The information stored in the digital picture files by the camera might be used by the online photo printing service during the printing process, for example, to adjust the color or sharpness of the image before it is printed.

Information stored by digital picture management apps might be used by the online photo printing service to print as captions on the front or back of the print copy. You can use Order Prints to choose which pictures to send and which service to use to print your pictures. Some picture management apps might be able to help you remove stored personal information before sending pictures to be printed. You might also be able to edit the properties of the file to remove stored personal information.

If an incompatibility problem is found with an app that you try to run, Program Compatibility Assistant will try to help you resolve it. If an incompatibility problem is found with an app you attempt to run, a report is generated that includes information such as the app name, app version, the needed compatibility settings, and your actions with the app so far.

Error reports are used to provide you with responses to problems that you report for your apps. Responses contain links when available to the app publisher's website so you can learn more about possible solutions. Error reports created due to app failures are used to try to determine which setting to adjust when you encounter compatibility problems for the apps that you're running on this version of Windows.

Information reported through CEIP is used to identify app compatibility problems. For problems reported through Windows Error Reporting, an error report is created only when you select the option to check online for a solution. Unless you have previously consented to report problems automatically so you can check for solutions, you're asked if you want to send the error report.

For more information, see the Windows Error Reporting section. Properties are file information that allow you to quickly search and organize your files. Some properties are intrinsic to the file for example, the size of the file while others might be specific to an app or device for example, the settings of your camera when you took a photo or the location data recorded by the camera for the photo.

The type of information stored will depend upon the type of file and the apps that use it. Examples of properties include file name, date modified, file size, author, keywords, and comments. Properties are stored in the file, and they move with the file if it is moved or copied to another location, such as a file share, or sent as an email attachment. Properties can help you more quickly search and organize your files. They can also be used by apps to perform app-specific tasks.

You can edit or remove some properties for a file by selecting the file in Windows Explorer and clicking Properties. For app-specific properties, you can edit or remove them only if the app used to generate the file supports these features. If your PC has near-field communication NFC hardware, you can physically tap it against another device with NFC hardware to share links, files, and other information. There are two types of proximity connections: Tap and Do and Tap and Hold.

With Tap and Hold, the connection is active only as long as the devices are held next to each other. When you tap proximity enabled devices together, they exchange information to establish a connection with each other. Depending on the way the devices are configured, this data can include Bluetooth and Wi—Fi network addresses, and the name of your PC. Windows can send files, links, and other information between devices using a proximity connection.

Apps that use proximity can send and receive any information they have access to. This information might be sent through your network or Internet connection, or directly through a device-to-device wireless connection.

Network and PC information exchanged over a proximity connection is used to establish a network connection, and to identify the devices connecting to each other. Data transferred through a proximity connection initiated within an app can be used by that app in any way.

Near field proximity service is on by default. An administrator can disable it using the options provided in Devices and Printers in Control Panel. Windows Tap and Send makes it easy to share selected information with a friend standing next to you or with another one of your devices such as a mobile phone.

The next device you tap will receive a link to the webpage currently being displayed. This also works with any app that supports sharing information, such as pictures, text, or files.

Tap and Send uses the information you're sharing and the information described in the Near field proximity service section above. This information is only used to create the connection between the two devices. If Near field proximity service is enabled, Tap and Send is also enabled. For more information, see the Near field proximity service section. VPN technologies allow users to connect to a private network, such as a corporate network, over the Internet.

A Remote Access connections component, Dial-up Networking, allows you to access the Internet using a dial-up modem or broadband technology such as a cable modem or a digital subscriber line DSL. The dialer components collect information from your PC such as your user name, password, and domain name. This information is sent to the system that you're attempting to connect with. To help protect your privacy and the security of your PC, security-related information such as your user name and password are encrypted and stored on your PC.

Dialer information is used to help your PC connect to the Internet. A remote access server might keep the user name and IP address information for accounting and compliance purposes, but no information is sent to Microsoft. For non-command-line dialers, you can choose to save your password by selecting Save this user name and password. You can clear that option at any time to delete the previously saved password from the dialer.

Because this option is turned off by default, you might be prompted to provide your password to connect to the Internet or a network. For command-line dialers like rasdial, there is no option to save your password.

RemoteApp and Desktop Connections let you access apps and desktops on remote PCs that have been made available online for remote access. When you enable a connection, configuration files are downloaded to your PC from the remote URL you specify.

These configuration files link apps and desktops on remote PCs so that you can run them from your PC. Your PC will automatically check for and download updates to these configuration files periodically. These apps run on remote PCs, and information you enter into the apps is transmitted across the network to the remote PCs you chose to connect with.

Updates to configuration files might include settings changes including providing you with access to new apps; however, new apps will run only if you choose to run them. This feature also sends information to the remote PCs on which the remote apps run. You can choose whether you want to use RemoteApp and Desktop Connections. You can also use your email address to retrieve the Connection URL. You can remove a connection and its connection files by clicking Remove on the connections description dialog box.

If you disconnect a connection without closing all open apps, these apps will remain open on the remote PC. Remote Desktop connection provides a way for you to establish a remote connection with a host PC that is running Remote Desktop Services. These settings include the name of your domain and connection configuration settings, such as remote PC name, user name, display information, local device information, audio information, clipboard, connection settings, remote app names, and session icon or thumbnail.

Credentials for these connections, Remote Desktop Gateway credentials, and a list of trusted Remote Desktop Gateway server names are stored locally on your PC. This list is stored permanently unless it is deleted by an administrator. Information collected by Remote Desktop connection allows you to connect to host PCs running Remote Desktop Services using your preferred settings.

User name, password, and domain information are collected to allow you to save your connection settings and to enable you to double-click an RDP file or click a favorite to launch a connection without having to re-enter this information. You can choose if you want to use Remote Desktop connection. If you use it, your RDP files and Remote Desktop connection favorites contain information required to connect to a remote PC, including the options and settings that were configured when the connection was automatically saved.

You can customize RDP files and favorites, including files for connecting to the same PC with different settings. A Microsoft account formerly known as Windows Live ID is a single email address and password you can use as your sign-in info to sign in to apps, sites, and services from Microsoft and select Microsoft partners. You can sign up for a Microsoft account in Windows or on Microsoft websites that require you to sign in with a Microsoft account.

You can choose to sign in to Windows with a Microsoft account or choose to connect your local or domain account to a Microsoft account. If you do this, Windows can help make your PCs look and feel the same by automatically syncing settings and info in Windows and Microsoft apps.

If you go to the sign-in page of those websites, it will also automatically sign you in to websites that use Microsoft accounts to sign in. If you already use that email address as a Microsoft account, you can use it and the password for the Microsoft account to sign in to Windows. When you are signed in to Windows with your Microsoft account or with a domain account connected to your Microsoft account:.

Certain Windows settings will sync between the PCs that you sign in to with a Microsoft account. For more information about what settings are synced and how to control them, see the Sync your settings section.

Microsoft apps that use a Microsoft account for authentication like Mail, Calendar, Photos, People, Messaging, OneDrive, Microsoft Office, and other apps can automatically begin downloading your info for example, the Mail app will automatically download the messages sent to your Outlook. Web browsers can automatically sign you in to websites that you sign in to with your Microsoft account for example, if you visit OneDrive.

Windows will ask your permission before allowing third-party apps to use profile information or other personal information associated with your Microsoft account.

Because domain administrators are able to access any information on your PC, they will also be able to access any settings and info you have chosen to sync with other PCs through your Microsoft account. This can include settings such as name, account picture, and browser history.

When you create a new Microsoft account in Windows, we use the information you provide to create and help secure the account. To learn more about the privacy impact of having a Microsoft account, read the privacy statement displayed when you choose Sign up for a new email address. When you sign in to Windows with a Microsoft account, some settings are synced automatically. To learn how to change which Windows settings are synced or to stop syncing, see the Sync your settings section. To learn more about the data collected by Microsoft apps that use a Microsoft account for authentication, read their privacy statements.

You can switch to a local account or Microsoft account at any time in Users in PC settings. If you sign in to Windows with a domain account, you can connect or disconnect your Microsoft account at any time in Users in PC settings.

When you sign in to Windows with a Microsoft account, Windows syncs some of your settings and info with Microsoft servers to make it easier to have personalized experiences across multiple PCs.

Settings you choose to sync will automatically update on Microsoft servers and your other PCs as you use them. If you choose to sign in to Windows with a Microsoft account, Windows syncs certain settings with Microsoft servers.

Personalization settings such as your account picture, lock screen image, background, and mouse settings.

To help protect your privacy, all synced settings are sent encrypted via SSL. If you sign in to Windows with a domain account connected to a Microsoft account, settings and info you have chosen will sync to your domain account.

Passwords that you save while signed into Windows with a domain account connected to a Microsoft account will never be synced.

Because domain administrators are able to access any information on your PC, they will also be able to access any settings and info, including your browsing history, that you have chosen to sync with other PCs through your Microsoft account. Windows 8 uses these settings and info to provide the syncing service. Microsoft doesn't use your synced settings and info to identify, contact, or target advertising to you. When you sign in to Windows with a Microsoft account, Sync your settings will be turned on.

You can choose to sync your settings, and control what is synced, by going to Sync your settings in PC settings. If you sign in to Windows with a domain account and you choose to connect that account to a Microsoft account, Windows will ask which settings you want to sync before connecting your Microsoft account. Teredo Technology Teredo allows PCs and networks to communicate over multiple networking protocols. If you use an app that requires Teredo to use IPv6 connectivity, or if you configure your firewall to always enable IPv6 connectivity, then Teredo will periodically contact the Microsoft Teredo service over the Internet.

The only information sent to Microsoft is standard PC information and the name of the service requested for example, teredo. Once the service is located, information is sent to maintain a connection with the IPv6 service. Using the netsh command line tool, you can change the query that the service sends over the Internet to use non-Microsoft servers instead, or you can turn it off.

Limited authorization values are created to perform typical administrative actions and standard user actions and are managed by Windows.

The file also contains the PC name, operating system version, creation user, and creation date information to assist you in recognizing the file. The private portion of the Endorsement Key is never exposed outside of the TPM, and once it has been created, it usually can't be reset. Windows does provide an interface for third-party apps like antimalware software to use the Endorsement Key for certain TPM scenarios, such as Measured Boot with Attestation.

For antimalware software the endorsement key and the endorsement key certificate are useful to confirm boot measurements are provided by a TPM from a specific manufacturer. By default, only administrators or apps with administrative rights can use the TPM endorsement key. You can choose to clear the TPM and reset it to factory defaults.

Clearing the TPM removes owner information, and with the exception of the endorsement key, all TPM-based keys or cryptographic information that apps might have created when the TPM was in use. Certificates are used primarily to verify the identity of a person or device, authenticate a service, or encrypt files.

Trusted root certification authorities are the organizations that issue certificates. Update Root Certificates contacts the online Windows Update service to see if Microsoft has added a certification authority to its list of trusted authorities, but only when an app is presented with a certificate issued by a certification authority that isn't directly trusted a certificate that isn't stored in a list of trusted certificates on your PC.

If the certification authority has been added to the Microsoft list of trusted authorities, its certificate will automatically be added to the list of trusted certificates on your PC. Update Root Certificates sends a request to the online Windows Update service that asks for the current list of root certification authorities in the Microsoft Root Certificate Program.

If the untrusted certificate is on the list, Update Root Certificates obtains that certificate from Windows Update and places it in the trusted certificate store on your PC. The information transferred includes the names and cryptographic hashes of root certificates. The information is used by Microsoft to update the list of trusted certificates on your PC. Update Root Certificates is enabled by default.

Windows Update is a service that provides you with software updates for Windows software and other supporting software, such as drivers supplied by device manufacturers.

Microsoft Update is a service that provides you with software updates for Windows software, as well as other Microsoft software such as Microsoft Office.

If the software runs, it will remove the malware listed on the Microsoft Support website. During a Malware check, a report will be sent to Microsoft with specific information about malware detected, errors, and other information about your PC. To learn what other information Update Services collects, see the Update Services privacy statement. This MSRT information is used to help improve our antimalware and other security products and services. No information in the MSRT reports will be used to identify or contact you.

To learn how Update Services uses other information, see the Update Services privacy statement. If you choose express settings while setting up Windows, you turn on the Update Services and set Windows Update to install updates automatically. For more information, see the Update Services privacy statement.

It can also collect information about performance and reliability problems that might occur. If you choose to participate in Windows CEIP, Windows will send this data to Microsoft, and will also periodically download a file to collect more relevant information about how you use Windows and apps.

CEIP reports are sent to Microsoft to help improve the features our customers use most often, and to create solutions to common problems. Performance and reliability information, including information such as how quickly an app responds when you click a button, how many problems you experience with an app or a device, and how quickly information is sent or received over a network connection.

App use information, including information about the features you use most often, such as how frequently you open apps, how often you use Windows Help and Support, which services you use to sign in to apps, and how many folders you typically create on your desktop.

Since most users decide to participate in CEIP within several days of setting up Windows, Microsoft uses this information to analyze and improve the Windows setup experience. This information is sent to Microsoft when you're connected to the Internet. Microsoft filters the information contained in CEIP reports to try to remove any individual identifiers that they might contain. The pre-installed Microsoft apps licensed with Windows may create their own unique identifiers for use with CEIP, which could be based on information from your Microsoft account.

CEIP will also periodically download a file to collect more relevant information about the way you useWindows and apps. This file helps Windows collect additional information to help Microsoft create solutions for common problems and better understand usage patterns of Windows and apps. Microsoft uses CEIP information to improve our products and services, as well as third-party software and hardware designed for use with these products and services. We use the GUID to distinguish how widespread the feedback we receive is and how to prioritize it.

For example, the GUID allows Microsoft to distinguish between one customer experiencing a problem one hundred times and one hundred customers experiencing the same problem once. If you choose to customize settings, you can control CEIP by selecting Participate in the Customer Experience Improvement Program to help improve Microsoft software and services under Send Microsoft info to help make Windows and apps better. For more information, see the CEIP frequently asked questions online.

Windows Defender looks for malware and other potentially unwanted software on your PC. Through MAPS, users can send information about malware and other potentially unwanted software to Microsoft in a report. MAPS can help protect your PC by automatically downloading new signatures for newly-detected malware.

MAPS reports include information about potential malware files, such as file names, cryptographic hash, software publisher, size, and date stamps. These URLs might occasionally contain personal information such as search terms or data entered in forms. Reports might also include the actions you took when Windows Defender notified you that the potentially unwanted software was detected.

MAPS includes this information to help Microsoft gauge how effectively Windows Defender can detect and remove malware and potentially unwanted software, and to attempt to identify new malware. Windows Defender detects changes to your PC by software that hasn't been analyzed for risks yet. Windows Defender takes action on malware upon detection as part of its automatic remediation. Windows Defender completes a scheduled scan and automatically takes action on software that it detects based on your settings.

You can join MAPS with a basic or an advanced membership. Basic membership reports contain the information described in this section. Advanced membership reports are more comprehensive and might occasionally contain personal information from, for example, file paths and partial memory dumps.

These reports, along with reports from other Windows Defender users who are participating in MAPS, help our researchers discover new threats more rapidly. Malware definitions are then created, and then these updated definitions are made available to all users through Windows Update.

Microsoft might request a sample submission report. This report contains specific files from your PC that Microsoft suspects might be potentially unwanted software. The sample report is used for further analysis. You'll be asked each time if you want to send this sample submission report to Microsoft. If Windows Update has not been able to obtain updated signatures for Windows Defender for a period of time, Windows Defender will attempt to use MAPS to download signatures from an alternate download location.

The reports might also be used for statistical, testing, or analytical purposes, and for generating definitions. The History feature provides a list of all apps on your PC that Windows Defender detects and the actions that were taken when the apps were detected.

You can also view apps that Windows Defender prevents from running until you choose to remove them or allow them to run again these are called quarantined items.

The list of software that Windows Defender detects, the actions that you and other users take, and the actions that Windows Defender takes automatically are stored on your PC.

Keep up the hard work. Perhaps one way to do this would be if someone could get together a whole bunch of Windows freeware apps and use them as a test suite for anti-virus false positives.

Then publish it — show the world which AV software vendors have the highest number of false positives. I think you are right! I am using an antivirus called VIPRE which is claimed by most organizations as the best antivirus software available. Now, when I downloaded your software to find passwords for nothing but good causes, the antivirus classified it as a trojan with high risk!!! Right now, I have sent the file for analysis!!! And I am going to contact them too!!! Those who are trying to use your tools are most likely aware that these tools deal with sensitive computer operations.

Whom are we kidding? How else does anyone expect a security program to react to such processes? I love your tools dude. They also very simply think that every packed file has a dangerous payload. Not everyone wearing a balaclava is necessarily a thief. One should consider the source where they get a file. No need to be paranoid. A minimum of trust is necessary. AVG is allowing me to choose to ignore the threat, but it still stops me from extracting the files.

While I can disable the resident shield, soethign else blocks the extraciton which i cannot disable. I still got the warning message but was able to add files to the exceptions list. I want to thank the creator, or creators of NirSoft. I had several days trying to get back the password of MySpaceIM, and surprise. MessenPass did the dirty job. Last week, a technician came to see me. The whole site was flagged by siteadvisor a McAfee emanation as a spyware provider… A spyware fix named Combofix.

Yesterday, I was at at a public library using their high-speed internet on one of their public access computer systems and I downloaded the new 1. Nothing on the library system decided to pop up and complain about the file during its download, or once the download was completed. Anyway, I thought I would mention my frustration with NIS in this situation after reading your blogs about most of the major antivirus companies finding false positives for viruses in a lot of programs.

Winrar for example has had at least one of their recent beta releases flagged by NIS as having a virus. In that case, it may have been a legitimate virus removal since it was the virus that got put into a LOT of programs worldwide that were using Visual Basic if I remember correctly.

As for the adware stuff, I wish every single system utility program maker was as nice as you are about letting people opt out of the crap they add. Some of them just install the adware without permission and that is really irritating. That happens a lot with Ask Toolbar. Thank you for making Unlocker. But once Unlocker gets sicced on the bad boy files, they get their comeuppance really fast!

Suggestion, for False Positives. I run Norton AV Twice I tried to run SearchMyFiles. The first time nothing happened. On closer examination, I noticed that Windows Task Manager listed it as a running process. Your computer is secure. Then I noticed that the program file was deleted. Same thing happened again. I encountered with this prolblem a lot.

I complaint to the IT department. Wish they can help ask McAfee to stop false positives. As an example, http: Since av-vendors cooperate when it comes to virus sigantures, i dont see no reason they cant cooperate in fp-sinatures part as well both to verify their heuristics in testing and to step off software authors tails once reported … all we need to do is to make it pricey for them not to do it … somehow.

Thanks for nirsoft cache of quality software … been saver on many occasions and indispensible tool in others. I am glad that I found this blog! I am an independent game developer, and the installation file of my latest game has been detected as malware by many anti-virus programs! I am currently dealing with a number of unhappy customers, and I feel completely helpless to fix the situation. I am both relieved and saddened to find that I am not alone in this issue. I have linked to this blog on my site.

Thank you for making us aware of the situation! Antivirus software does not ONLY scan for known viruses. And then, the antivirus software detects the function in your software that reads passwords, and then it thinks it is some sort of evil password-stealer software, and then it classifies it as a generic trojan or something like that.

About Christophers case, it can be some code in either the installation packager, which tries to modify a vital system file to install game drivers or something like that that the AV survelliances on, or it can be code which detect keypresses in game via hooks, which the AV thinks is a keylogger. Instead try to do it via the built-in safe functions, like DirectX and such.

This will not cause antiviruses to complain, since such built-in safe functions does have safeguards which prevents malware to use the functions in a feasible way, both in AVs and in the functions itself. For example a function will only allow to run while a fullscreen app is loaded.

And AV software could have exceptions that for example a game is allowed to hook keyboard via DirectX while its running fullscreen or has focus. When focus are removed or game exited, it must remove the hooks. And when you report a False positive, what AV companies has to do is to either create a whitelist-signature which excepts the software from detection, rewrite the detecting signature not always easy to do or add the hash of the false positive to a exception list. And here comes a security problem too: The problem is that a AV developer cannot whitelist too much, since then virus developer can write their virus in a way so it will fit a whitelist signature and skip detection.

And the AV developer cannot put too much whitelists, since it will be huge for users to download, especially if the user comes home from a long holyday and should apply a update while their last update is 1 month old. This means AV developer has to priority what to put in whitelist and not put in whitelist. Like you have to deal with the police if you engage in suspect activities even if the activities are legal. I had this problem with Norton AV. First time it destroyed all your programs.

Next time I put all your programs to exclusion list. Since that everything was OK. So to be realistic I propose just to put the warning to readme files. Normal users will manage antivir progs. Anyway your programs are fantastic!!! I am programming myself using VB6, but since for example Avira updated to 8,9,10, almost ALL of my programs cause it to lie about it being a virus. This is the reason what caused me to switch to Kaspersky, but wait:. My exception list is long enough — and that mainly because of the games, which are listed sometimes up to 4 times.

On the other hand: Same counts for the older kaspersky 6. I hope they fixed that. This was done in response to malware authors running their code through the engines in order to obfuscate more effectively. Detailed in this article:. But how am I to know? Install it and face the possible consequences?

How are we supposed to tell the difference? Run the program and if all goes well, congratulate myself on my brilliance in not being stampeded into a virus panic? While I was reporting the problem to Microsoft, I noticed this page on their web site, which I thought might be of interest to you, as it is specifically for software vendors to report false positives:.

False Positive Report Form http: Kaspersky always asks what to do, so if there is ever a false positive I can stop it from removing the application. Not that wrong, but it would scare the average user more than necessary, thus possibly overreacting. Quite annoying as the original is nowhere to be found anymore. AVs not only bothering developers but their customers tooo! Mcafee recently released a pattern update which flags svchost. And apart from flagging, it deletes svchost. And for this mistake Mcafee offered a rescue boot disk to fix the PC and as compensation, it offered another freebie to the customer!

Similarly some years ago Norton implemented some tough activation measures to lock down pirate copies. The so called activation software had a vulnerability using which many systems where hacked! In the end, it is like going to a doctor for a medical check up and getting infected during the process of the medical checkup! Why the hell is the check up for in this case? In some cases impact is mild a few mins of productivity lost but in many cases impact is serious many hours of productivity lost and requiring more man power to solve the mess!

I think the solution can be simple and cost effective. Hope you understand my English and the whole idea. Congratulation for making so useful programs!!! You get why I use this one? I am the creator of webDOMinator and two of the main helper utility programs that I use wdbrowse. Since they are included in my installer program in compressed format, they make the entire installer considered a virus.

There are false positives all across the board. Trying to guess what these companies are using in their guessing algorithms that make their software consider my software a virus is mind-wreckingly insane. I have even got my website reported and had to fight to get my website back up because my web site server company suspended my account. This heuristic guessing stuff causes not only a bad reputation for software developers, but causes more work to have to be done to try and figure the logic of some of these companies.

I think someone else already mentioned that most anti-virus companies would benefit from doing this because it would make it seem to the clueless end consumer that the internet is much more filled with viruses than it really is, thus causing more conversions on their end at the cost to the small software developers.

As a security professional, I understand the issues that non-security minded individuals face. Is there something that can be done to mask those great tools from being blocked by the anti-virus scanners.

As a forensic examiner, in dealing with live systems, I need to grab critical evidence without the need for av scanners to get in the way. I am one of those people that constantly forgets their password because for security reasons i have a different one for all my accounts and your programs have really helped me, so thank you and if people think your programs are viruses then they need to learn A LOT about computers.

Because I could easy and with a little. Net programming transform this app in a deadly IM password stealer. I think that considering thses tools as Riskware is appropriate since is so easy to hackers to use them to bad porpuses. If internally we simple use an API example: TerminateProcess several antivirus list our exe as virus, that is stupid!. I will try to make noise about this problem.

This file is engaged in theft of passwords. We were developing a update down loader for our software. After we finished building the application we went to test it, Works great and very reliable and stable. So I sent them both an email to see why they are detecting an application made by a developer as a virus?

I can see their point,using this app for ruthless scams. But we do not even get involved in crap like that. The problem is, the definitions are so broad that it detects anything remotely close to the definition. For anyone that does not quite follow that line. I build a virus detection application that detects the letters A,E,I,O, and U well now it is going to detect and words that contain any of these letters. So all words are going to be detected as a virus. We need to demand that they be more precise and specific in their definitions.

Right now they have us over a barrel because of this. The fact remains that when it comes down to us or them. The customer will take the side of the anti virus over us. It would seem to me that virus companies would have a developer submit area.

Then they could check the file and add it to the definition list of as acceptable. Right now all they have is the broad list of what they look for. If an app is detected as a virus by some piece of crap anti virus program, it is easy to tell the customer their program is faulty. I have used your software on several occasions.. I use Trend Micro.. I receive no reply so I have no idea how they handle that,it has even gone so far as to block your website.

It does detect your pass software with virus.. I just scanned NirLauncher 1. AVG instantly computes and shows MD5 and saves it for further monitoring so you can compare it without another tool neede. Hello, I must admit that my software suffered with this issue for many years until I finally bit the bullet and got a certificate to allow me to CodeSign my apps.

However, since I made the choice and filled in the forms my false positives have almost reduced to nil. It appears the AV producers take note of the Code Signing! Just a thought for us small guys.

It is a lot cheaper than having a staff member trying to stop the false positives and it really only add one tiny process after the build. I personally chose to go with Comodo as their pricing was one of the best.

However, if you are a small developer like me then please press your request with all such groups they do not give them away easily! As an example I downloaded your PasswordFox app to try and get my passwords out quickly. I expected my AV program to refuce to run it!

No matter what I did no go. So I signed the app myself! Lo and behold it ran first time. Is there not a way to attach a simple code to the program that can be recognized easily by the other major companies? They at least should be looking into this problem.

I mean, what can I do? Is there a website I can make comments on? Or some other place to broadcast my displeasure at what these major companies are doing? And that makes me furious. I scanned it with Avira before opening and it was virus free. SuperAntiSpyware must be false positive. Yes, false positives are a major problem. One reason that I do not have an AV program running all the time.

In fact, I run instead the excellent freeware anti-malware app malwarebytes. It has saved my computer before, and has very few false positives. Well, the on-demand scanner is free. To buy the background scanner, there is a one time smal fee, for life.

I sometimes do an online on-demand virus scan. I just did with the one at Eset. I am very glad I had set it to only detect and report, not delete or quarantine anything. It showed seven infections, which got me worried. On closer view though, all were your utilities.

That was what brought me here. It would be good if the problem was publicized in the general press. If more people were aware of the problem, and demanded a fix from the av industry, and refused to buy the products if not fixed, there would be a change.

He wrote above that he makes a keylogger, which he sells. Are you really that naive? Do you really think that a note in your documentation saying not to use it for bad purposes, will make the crooks go clean, and not use it for bad purposes?

Hi, Thanks, your program saved me alot of time. After moving to a new house I discovered that my password was written on the back of my wifi router that I sent back my internet provider. Thanks again Nir, for your great program, keep up the good work! Why not make your tools open source? People will still donate, maybe even more if they truly Believe you that your programs does not incluse spyware.

And only way they can be sure is if source is available and they themselves are able to duplicate building binary from your source. And MANY sites of many security tools is saying that it is spyware.

And you can not fight it, unless you are not OpenSource. It is That simple. There are open source licenses that will retain your ability ro control the code and even OWN any code modifications if you wat to, etc. I have several false-positives with my software. Even if tools are no longer detected after submitting, the next release is probably a false-positive again.

It would be still detected by the AV software, and the user will not spend years analysing the source code to come to the conclusion its no maleware, trojan or anything alike. But maybe recording from the soundcard compromises privacy, even so it can never leave the dll except a program calls the exported API — which itself only returns the spectrum from the recorded waveform. I am a Windows XP user and have not run any antivirus program for years. They all caused more trouble than they were worth.

How can people run these antivirus and not know this? I simply have ZoneAlarm firewall installed. I have no idea whether it is working or not, except it claims to scan any files I download. I am a IT consultant and find very useful most of your utils, especially mailpv. I know very well the problem and think that any antivirus marks at least a potential risk and tries to block it, but I suggest and own just the smart ones that let the user eventually choose what to do, or that can be disabled temporarily I prefer Avira pro which has many false positives but can deal with them and is very light on the PC.

Congratulation for your job that helps a lot to keep easier our job!! It seems to me, that in some cases some people, preparing packets of programs for distribution, may include virus in ProduKey. For instance Russian program anti-virus drWeb finds virus Tool.

But…the same anti-virus drWeb finds nothing in ProduKey v1. Avira Personal Free Antivirus — Avira happens to be the second most effective one among free antivirus applications. For getting covered against spyware, consider getting something similar to SuperAntiSpyware as this one has its free version too. Below you can find the results for each file. The final verdict on the file is either a correct detection or a false positive detection. Further information about the verdicts are available at our website: Thoughtful chaps and chapesses:.

Here is a description of these results, and information how to proceed further. In case the file is detected correctly, it will not be removed from the AVG detection. If you decide to keep the file and use it with the risk of possible payload it may carry, you can restore it from the AVG Virus Vault, and manually exclude it from the AVG detection:.

I am a small shareware developer of different utilities. One of my utilities is a monitoring tool for parents. My website had a problem of constantly being added to a different black lists just because of false positives, so I was forced to REMOVE all downloads from the website and move them to another domain just to prevent my website from being blacklisted. The idea of contacting the AV vendors regarding the false detection is not very good, cause: So these tools destroy my reputation and frustrate my customers, also the download sites are flooded with a comments that my software contain trojans.

I even think to go aways from windows utilities development and go to Mac, since Mac is not that populated with antivirus crap yet. Recently I did read an article, where Kaspersky prepared a harmless file, marked it as a virus in their database and uploaded to VirusTotal. The things are getting worse every year, cause antivirus companies are using more and more aggressive ways of detection and obviosuly become more virus and spyware-like themselves!

Including websites visited and apps opened. Some apps like Kaspersky Pure are so bloated and integrated into every hole of your system, that it looks like your PC is designed to run ONLY this antivirus software and nothing more. Yet the antivirus companies claim the malware makes it slow, not their apps. The association should be monied up with donation, so we can SUE the AV vendors and get paid for the reputation and money loss! Internet IS used to spread viruses!

Also, the funny thing is you are forced to pay them for the lack of security in Microsoft software! Thus you are paying for Windows not just once, but regularly! Insurance companies are paying. What is the difference? This criminal business should be stopped! If I download from download. I downloaded it several days ago from Nirsoft. Microsoft Windows Security Essentials, which I was using at the time, did not object to it.

I only installed the Norton free trial the other day. The first install did not go in properly and I had to uninstall and then reinstall it! Would it be that hard for you to start digitally signing your applications and installers using an Authtenticode key obtained from a provider such as Thawte?

At least that way users could be reassured that the products you provide have not been tampered with since you built them. That would go a long way towards reassuring users that you are a legitimate developer. Problem i see many antivirus companies get it wrong is because the way the file is packed or similar.

If all anti virus, malware, trojan, adware detectors had a shared vast databased for uncompressing all archives including dos files and files from old computers. Then there would be very little positives and false positives. Yet then those companies who make the anti virus, malware, trojan, adware ect softwares would have little or nothing to do.

They say this is what they would like most of all, i doubt it since they are all money orientated. If there were less do you think xyz protection software would still be free for home users. What of the companies that think there exclusive package should not be available for anti virus, malware, trojan, adware checking softwares.

The way i see it if i cannot unpack it with tools like universal extractor then i never use them. I have them just not yet got round to trying them. Someday maybe site in a virtual windows os using snapshots to try them. The way i think of those softwares why hide for anti virus, malware, trojan, adware softwares. And then by hiding from them tey must have bad code in them, wonder if the companies ever thought we think of that.

Of course i do know nirsoft softwares that are downloaded rom nirsoft are safe. And yes anti virus, malware, trojan, adware do compalin but still i use them. Its the way it is now for many user and software nirsoft or not. I am well aware of the problem of false positives, so when I downloaded SocketSniff and it was blocked at start up, I went back to the download page to see if there was any warning that this might occur with some AV programs.

So I downloaded the package from another site, and it did the same thing. With AutoHotKey you quickly find lots of agreement from users on the fact that it is a false positive. Not so with SocketSniff. All the sites I looked at said previously existing malware on the PC will hijack SocketSniff and use it for their own purposes. There was no mention of false positives.

Under the circumstances, the wise user will not use the tool. What I suggest you do is: You could even list the AV programs that you know do report it. The content could be just a copy of this page, but the more specific the better. Be open and honest about the situation up front, instead of hiding the possibility and having to deal with unhappy users afterwards. I have verified is virus free but it still does not work. Good luck and I wish you success!

We had this exact problem happen to us twice. We have developed 2 small windows applications using the. NET framework and they both keep triggering false positives. It took us a while to figure out a way around it. Antivirus companies have gone too far. I had the exact same problem with Forefront Client Security. It also scans quickly every page that you attempt to access, so I think it has performed well so far. Microsoft security essentals gave this warning. I am now uninstalling that software..

One of the rare cases where false positive affect the antivirus company rather than the developer. I got this with IEpassview. I write perl scripts and turn them into executable files with perlapp. For a long time, the compression with perlapp was frankly terrible. I used upx to get a much smaller file until, you guessed it, AV companies started flagging the file as a virus.

If I change the method of compression to use perlapp instead of using upx, the message went away. I reported it, of course, but it keeps coming back. All I can say is, I have had enough of all these False Positives. I have been developing applications for over 25 years now, ranging from web apps to desktops, and I have had to stoop, yes stoop to levels I never dreamt possible, just to get my applications to run.

If anything AV companies are making us into hackers! Get real, no one is going to spend that amount of time developing a virus, there is no money to be made!

One possible solution might be if we can identify a what I call Honest anti malware company. One that calls a spade a spade. So, does anybody know of or have experience with a antimalware program that is honest according to my definition?

If so I say we drop the programs we use and buy it and use it. The developers will get the message if their income drops.

Strangely enough, one of them was Emisoft Anti Malware. It tagged a few viruses and identified a couple of my creative tools as potentially harmful and it tagged the real threats for quarantine and left the others untagged with a low danger rating. I almost fell off my chair.

Anyway I would love to know which antimalware programs provide honest disclosure. John,Yo, i think you got AVG antivirus http: It is only when Avast V6.

Fortunately I had a backup on external hard drive! TL is a cool tool though, as it helps keep you safe when visiting any site. Think about it, why would they distribute viruses? Sometimes they even use third parties to distribute their rubbish on the internet and suddenly yeahhh They have the solution. Today I downloaded the zip file of WinVideoCap and right after I extracted all the files, the folder was quarantined by Immunet 3.

It said WebVideoCap is malicious. I opened Immunet and changed the quarantine option from automatic to ask me. Then I copied the files inside the zip folder and put them into another folder. Now I can use the software like normal.

I have been selling shareware screen savers for over 10 years, and every now and I then I get an email from a customer telling me that their antivirus program has detected Trojan XYZ in my screen saver and deleted it from their system! The customer then comes to me for help. I used to use a packer ironically to make it a little harder for people to steal my software , but got even more false positive reports from various antivirus tools, so had to unpack my installers.

I find it is not always a good idea to set the automatic handling of an action in any security software. I tried many of know anti-viruses.

But almost all of my programs was identified as virus. This is why Open Source Anti-viruses are the best. A quote from the website clamwin. You need to manually scan a file in order to detect a virus or spyware. If Anti-Virus mistake — and they do! Finally, reputation helps, and Nirsoft has the reputation of quality and healthy applications. This is where I stand, when in doubt: Hello, I use Kaspersky Internet Security After the Download is complete, Kaspersky searches the File and detects niffpass.

The result is the following: This makes the complete Launcher App useless. OMG, Your article is as pertinent today as ever. Kapersky was just installed on my machine, and before I knew it ….. Well, I tryed today to download ShellMenuView v1. I have a friend who owned a computer-communication services company. I tried to load a Microsoft downloaded math module into it, got to the program point where it said insert the CD. This may happen when there is no signal.

When you see this symbol, you can swipe from the status bar top of the screen with two fingers, you can see the actual network under the mobile signal icon.

Now no emergency symbol.. But still not getting network.. Just the network symbol is empty…. That means signal is not good. You may go downstairs to see whether the signal is better. Can u explain this……. You may read this guide on screen mirroring with Chromecast and supported devices: You need 2 items: You can follow this guide to install ES File Explorer: I am trying to use Wifi Direct featuter.

It does not throw any error but file sending failed will be msg. You may try to use some apps, e. Is this any app misbehave…pls tell me how to solve this.???

You may try some different apps to open it. Google spreadsheet or kingsoft office should have no problems to open most excel files. If you are use the self — trimmed card, you may check with the phone company to get the official micro sim card.

You may check with your phone company. The number is pre-configured by your phone company and saved in the SIM card. Moto E does not provide any utility to manage it. You can try the sim card in other phones to check the number.

For example, most Samsung phones even allow you to change it. Anyway, you can call the phone company. They will normally send you a message with all settings. Apply the settings in the message should give you correct settings. Please note, some websites may not allow you to save pictures. Normally, if you can save the picture from a PC, you should be able to save it from your Moto E. You can also request desktop site in Chrome.

I tried that what you have told. After tap and hold the picture it is showing options like save image and more. But after I select save image option that page is idle. Please help me on this issue. In your chrome browser, you can check settings — bandwidth management, turn off reduce data usage. Yeah I have tried for multiple sites, But same problem for all sites. And as well i checked chrome browser settings also.

While exit from some app….. Can u give solution…. Does this cause battery issue for you? I seldom recommend task manager or similar apps because they most of the time create problems, instead of solving problems. As mentioned, you can try Greenify https: If the download is interrupted, it is due to your mobile data connection. You then have no choice, but to try it later. By using phone dialer in second sim after finished dialing and then exit from that dialer on that time only previously opened apps automatically opened and close itself….

If it always happens, you can try to reboot the phone to see whether it solves the issue. As per ur request I reboot even factory reset but still facing same problem…..

What is the settings for direct download any file to Memory card? Because If i want to download a 1. SMS is always saved in internal storage. You can backup them and save a backup copy in the SD, or your PC, then delete some. You need use some apps that may allow you to set the default locations. Chrome for Android does not allow you to set default download location.

You can try other brosers, e. Both of them allow you to set the default download location. Facing problems with the sound system within a month music system becomes mute regardless of playing music. Even while dialling or receiving the call we are not getting the sound.. You may also reboot the phone to see whether the sound comes back. Factory data reset is the last option. I have done all these things… but same problem persists..

Volume working fine by using earphone.. Muted while playing in speaker.. Also media automatically pauses.. If factory data reset you should back up your data first does not solve the problem, you probably have to visit the local service centre. Your phone should still be under warranty, so you should go to the authorized service centres for any check or repair. Is there any way to change the notification light colour of Moto e. Tried all the app not working. The Moto E notification color is white only.

No apps can change it because it is limited by the hardware. You cannot disable the ascending ringtone in Moto E. Hi Simon, Is there any way to remove the Google search bar from the Home screen. The bar with microphone icon. I want to remove it. Moto E uses the stock Google launcher, so the Google search bar is hard-coded, and you cannot remove it. Could anyone pleas assist me to how to proceed further to connect Internet on my Laptop.

I assume you want to share your mobile data connection with the laptop, which has no internet connection. Then your laptop can connect to the hotspot. You may try to use it as in your desktop. In Chrome, you can request desktop site so that it will look similar to that in your PC. Kindly give a quick reply. Can i install the flash transfer from another mobile and then sending apps from that to my phone moto e? The only official way to access the default ringtones is using the media storage.

These files are saved in a different partition from normal files. I clicked settings and then clicked phone ringtones then it is directily going to file manager without asking the menu earlier it is asking file manger or media storage under that always or just once every time I am clicking the just once going forward and doing by oversightly I clicked always now I am not getting default ringtones kindly guide me with the path. You can clear the default settings at Settings—Apps—ES file explorer.

Media storage only check the pre-installed ringtones and audio files you put in the ringtones folder. ES File explorer can check all audio files except the pre-installed ones.

So, they complement each other. You should use just once, not always unless you are going to use one of them. Moto E b has a proximity sensor. Some apps can use it to unlock the phone. This was discussed in other comments. You may try smart screen or wave to unlock. You need test which one works best with your flip cover. Please note all these apps consume considerable battery as they must run in background all the time. Unfortunately I deleted some photos in my memory card.

How can I recovery that? And which app is best for recovery in moto E? I would not recommend any tools for this. If they are very important, you may try some professional data recovery services. Nobody can guarantee how much can be recovered. In my friend moto e two option show while edit photos on contact but in my moto e not show any option I can not edit photos on contact error unable to save photo edits.

Anyway, you can go to settings—apps, tap the menu key 3 vertical dots , tap reset app preferences. After this, you can try again, When it ask you to select an app to crop the picture, you should select gallery just once. I have buy moto e e few days ago i have a problem with it internal storage is already full what I should do to run apps. You can move some apps to SD card. This is the guide http: This setting is normally controlled by your phone company the voicemail provider not on the phone.

You can check with them and they may allow you to have different settings. Why it show like that? It just means the app crashed. There are many possible causes. Most of the time, you can ignore it. Hello, In my moto e, every dailed number appears in my speed dail after I am disconnecting the cal.

Hi, By mistake I have disabled the touch screen button it is now on voice…. The phone came with android version 4. Raised the issues and Flipkart replace it.

But this is not a solution. Why only when you have 4. Is there a solution available? Very likely, the SIM card slot may have some problems.

Normally, SIM card detection and registration is automatic without any intervention. There are many other apps add well. I think you mean the speed dial in your phone app. That area lists your favorite contacts you tapped the star in the people app , and numbers you talk with often. It cannot be customized. The actual replacement for speed dial is a widget named direct call. With direct call widget, it is not necessary to open phone app first.

Each speed dial contact have an icon in your home screen just like apps. Tap the icon to make calls. You can also disable background data to limit the battery drain. But some apps may be affected. So, test it first for a few days. You can try to install Greenify to force inactive apps to sleep. There are many similar apps for this. Wps office can also handle it, but with limited features.

You need install the USB driver: You can try ES File Explorer: You may also try SuperBeam: Sometimes, it is due to large media downloading from WhatsApp. Uncheck all items under When using mobile data, when using wifi and when roaming. Why is it happening?? Is there some way to access files in download manager?? You should install a file manager,e. It says media not found..

For phone call recording in Moto E , most apps can only record voice from your side. This is true for other phones as well. What themes are you referring to? This is very likely due to some apps you installed. You may check whether you get some notification in the notification area swipe down from the top of the screen with one finger. You probably need check with the carrier. It can be due to poor signal or congested connections.

The stock messaging app does not support filters. So, you have ask your carrier to block spam messages. Then you can manually set date and time. If you trim the sim card yourself, you may try to get the correct size micro from your phone company. How to make songs play one after another in Moto E? In my phone it repeatedly plays the same song. Very difficult to change the manually to next song. Even then it plays same song repeatedly. I am using inbuilt music player. Should I download new one?

When you open Play music, there is always a shuffle all button. This will play all music files in your phone randomly. Please do NOT tap individual songs. You can add the individual song to the playlist or add to the queue. Once you open the playlist, tap the menu key 3 vertical dots in the right side of the playlist, choose Shuffle. Unable to install apps taken from other phone…. I have tried by clicking settings-data usage-mobile data on. You need make sure your mobile plan includes mobile data.

And be careful with the mobile data usage because the charge can be very high of you exceed the bundled data. If WiFi is on, Moto E will try to use wifi. But if it cannot connect to any wireless router, mobile data will be used automatically. By default, mobile data is enabled. You can enable or disable it in quick settings swipe down from the status bar,top of the screen, with two fingers. If you are using dual sim, you need specify one and only one SIM card for mobile data.

You can add multiple recipients one by one. Each receipent will be counted as one message sent. So, if you send a message to 10 people, it will be counted as 10 sms. Some carriers may have a limit of maximum recipients to fight against spam. You can also create a group in people app, then send messages to the group. Please note, some carriers may not support group messaging.

Sir how to passwords for each app and a big problem that whenever I download an app from the store the app first gets stored in the phone memory and then I move it to the the SD card. Still then the phone memory do not increase. Very often, only app data can be moved to SD card. So, the space saving may be not large for some apps. Also, cache may take some more space when you checking the storage. You should clear cache and then check. I have bought moto e,and it have wifi direct feature, but I am not able to use it, how to use WiFi direct in moto e?

You need another device to use it. Also you should get a file transfer app that supports wifi direct. Please give me advise….. Anyway for password protected ms office files, you should remove the password before uploading them to Moto E. It depends on the router settings. In most scenarios, the default wifi setting should work and you only need provide the password. Can you open Google. What error messages did you get? How do I transfer the messages, please?

Except backups, sms messages is always saved in the internal storage. My head set is not working. What m I supposed to do?? My ear piece worked only for an month. I think your Moto E should be still under warranty. You may visit local Motorola service centre or authorized service centre to check and repair. You may explain in detail so that we can know what the problem you are facing is. In the accounting settings, you may choose less days to sync.

In Gmail app tap settings, tap account, change the default 30 days to 7 days for example. You can download your favourite apps from Google play store, for example, Google keep, Evernote. I downloaded asphalt 8 and now it is showing memory full please delete some files. So I thought to uninstall asphalt but I cannot see it on my menu or anywhere else in my phone but it is saying memory full.

Then you can copy and manage files in the pc. You can get the official Motorola USB driver here http: If the problem is just gmail, it is not necessary to remove the account because it may broke some installed app. You can go to Settings—Apps—Gmail, tap clear cache, and tap clear data.

This will reset your Gmail in the phone. No, but you need download again. By default, Gmail saves all emails on the cloud until you delete them explicitly.

Clearing data only remove your settings in this app and downloaded emails. After doing clear data.. And one more thing is can i reset my mobile to make the phone, like when i brought new?

Kindly help to improve the same. Clear data and clear cache for the YouTube in settings — apps. This will delete am settings related to YouTube including history. You can do a factory data reset to remove all your settings and files. If you are using sd card, you should also format your sd card. You cannot directly delete files there. Hi with ES I am able to delete or move the files to the required place.

If you moved the file to other folders, the list should update itself. If not, reboot your Moto E. I have re-booted Moto E by pressing the power switch a bit longer. Got safe mode prompt. Then rebooted once again. However, list neither does not update itself, nor does it get cleared. I can see all list from date I got the phone.

Can you help pls? I never heard anyone hit the limit. Swipe down with two fingers from the status bar top of the screen to access quick settings panel. You can follow the buttons to turn off mobile data or wifi connections. There is also a widget for you to quickly turn off wifi connections, gps and some other settings. To save mobile data or battery, the better way is to disable mobile data once you are not going to use it for more than one hour, NOT to disable background data.

You can also manual turn off sync for different apps based on your needs. How can i recover deleted files from Motorola E that were stored in internal memory????

Its very much important for me to recover those files. Try to find a reputable data recovery service provider in your local area.

You were probably using a different browser. Chrome tries to handle most files directly, including mp3 files. You may try opera mini. Please note, group messaging requires carrier support. I deleted all pics and video from Gallary and Download. How to empty that 1. By default, after you delete them, the space will be released. But the amount is so small that you probably will not see any difference in available storage space.

In addition, the storage is scanned periodically through a cron job in your Moto E, the reporting on storage usage is not real-time. Hi, I am getting an error while downloading whats app, viber …? Giving me an error while downloading whats app….. Go to Settings—Apps—Google Play store, tap clear cache, tap clear data, then try again. The error could also be caused by the internet connection.

If you want to delete all contacts, you can go to Settings—Apps-All, find Contacts storage, tap clear cache and clear data. Please note, you need disable sync contact with Google account at Settings—Google under accounts , tap your Google account, make sure contact sync is disabled.

I am not able to install apps from card or phone. The install button which appears when try to installing app is not working. Previous it was working but not now. Hi Simon, when I am calling someone and putting it on loudspeaker then after few seconds display light turns off so not able to view anything on the display.

If you tend to talk very long time, you can use power button to turn on the screen. But by default, the power button is for ending the call. You need make sure the power button is not set as ending calls.

Alternatively, before the screen is off, you can tap the home button the middle one in the bottom of the screen. This will push the phone calls to the background and you can use Other apps while talking. I have transferred some songs from another mobile through blue tooth. In play music i was hearing songs. Now i could not hear the those blue tooth transferred.

Only downloads songs i can hear via ES file and in play music. What could be the problem. You can try to download and install VLC for Android https: I have problem in my Moto E phone that is even i disable the mobile data also sometime internet is conencting automatically when i checked the mobile data status it is appearing as off only.

If you turn off mobile data, it should not connect. How do you know there is Internet connection? Not sure how it happens. But you can disable app auto update in Google play store app. Install a file manager for your Moto E. You may try es file explorer http: I checked gateway connections and unchecked poor internet connection. But it showing I am in offline.

Can other devices access the Internet through the same router? Why are you still using gateway machines? You can verify the status in settings -about device -status. I need to disable because of security reasons at workplace. Normally, they will remove your camera lens or use tapes to cover the lens.

The security department should give you the advise. There is no easy way to disable it. You can disable camera app at Settings—Apps—All-Camera.

But this probably is NOT what you want. Please removing the camera can be very expensive. So, if you are working in a sensitive environment, you should get a non camera phone. Chrome for Android tried to be consistent with the system language. The languages available for Chrome for Android are listed here: You should disable the disable background data when trying Google play.

You can individually disable the sync for individual apps. I tested my moto e, no sound as well. Samsung devices usually have a beep sound for it. Probably some settings were messed up. You may backup the phone and do a factory reset.

Then you try again. I wanted to know how to block one single contact from calling? For example — I receive call from one particular number of a call center. I do not want him to call me every single day and hence wish to block him forever. How should i block that number? However, in your Moto E, you can automatically reject the call by diverting the caller to the voice mail. In people app, open the contact, tap menu key, then you can even the voicemail option.

Sir, I know its gorilla glass. But I had a doubt whether prolonged expose in dust or sand particles can scratch it.

I want to know whether scratch card is needed or not? Please do not use such features unless it is absolutely necessary. It is NOT as safe as you thought. If you installed ES File explorer http: You can get the driver here: If you are using WiFi, you can also try Air Droid app. If I visit Service center i think they restore my phone. So please tell me can i save my phone memory data via USB.

You need download pictures from each message. The downloaded pictures are saved in download folder. Install ES File explorer following this guide: As I know, Moto E and Moto g do not require any special cables. Samsung cables work just nicely with Moto E. It happenes every day. My earphone jack is not right working means volume of audio and videos not decrease and when I call someone and try to convert into loudspeaker It not done and also main thing is FM radio start without connecting earphone.

When I try to listen music in earphone it not working , only volume remove from speaker.. Please give me solution fast. You can transfer the video to speaker,but the headset must be inserted for FM radio. Please try not to use the phone for games or heavy internet things. It is not good for your battery. Emergency mode means your SIM card can not be registered with any available mobile networks.

You need make sure 1. Please do not trim the card by yourself.

Your choices