Sometimes, user face issue in their computer “The Requested Resource is in use”. This error occurs when your computer is infected with Trojan. To solve this, you should uninstall malicious software from your computer or start your PC in Safe Mode. For more help, just navigate to www.office.com/setup. In this blog, you will read the solution to fix the issue if the Requested Resource is in Use.Method To Fix The Issue “The Requested Resource is in Use”:
1. Restart your computer in Safe Mode:
First, you should visit to the Windows search bar and then type msconfig. After this, you should open System Configuration. When the System Configuration window opens up, then tap on the Boot folder. Here, you will view the Boot options listed at the bottom of the screen. At this point, you should select the Safe Boot option. Then, check the Minimal sub-option. After this, you should click on OK button. Here, a popup screen will appear. You just have to choose Restart option and then your computer will reboot in Safe Mode.
2. Use Third-Party Malware Removal Software:
To fix the issue, you should use the best malware removal software. But to unlock the malware removal features, you have to buy the license. Keep in mind you should check the antivirus itself not be blocked by the trojan before if you are spending money in buying the license. To prevent this, you should first reboot the PC in Safe Mode.
3. Uninstall Malicious Programs:
You should open the Run dialog box just by tapping on the Windows and the R key altogether. After this, you should type in appwiz.cpl and then hit on Enter key. It will open Programs and Features folder, and from here you can identify and uninstall all the malicious programs which are installed by the trojan horse. For details, you should tap on office.com/setup.
4. Scan System Configuration Folder for Malicious Software:
First, you need to open the System Configuration folder and then hit on the Windows startup icon and then type msconfig in the search bar and just press Enter key. After this, you need to tap on the Startup option and then you will see a list of all programs which start running when you start your PC will appear. Here, you should look for those whose manufacturer is marked as Unknown.
Just keep in mind there are chances that all these are malware. If in case, they were important, then their publisher will identify with them. May be, you are directed to the startup section of the Task Manager. Then, click the link.
This will open Task Manager window and you will view all the programs which are set to run automatically, on startup. You should again browse the list to choose those whose publisher is marked as unknown. At last, just disable all those.
5. Delete all Malicious IP Addresses:
You should press both Windows and R keys at the same time in order to open the Run dialog box. When it pops up, you should paste the command below and then click on OK.
Now, you should open the Hosts file in the Notepad. Normally, you will see the two IP addresses at the bottom, they are for the PC’s, or localhost, and it should kept there only. But if you are hacked, then you will see the other IPs just listed below those. You should remove those IP address.
For more details, you need to go to MS Office via www.office.com/setup.