Technology
How to Remove Bloatware From Your New PC
A brand-new Windows computer should be pristine. After all, you haven’t gummed it up yet with software, right?
Leave that to the computer manufacturers who load your new PC with “free” software you don’t want. You might call it bloatware, crapware, shovelware, or crudware, since it’s basically useless to you. There’s a reason for doing it, of course—bloatware offsets the price of super-cheap PCs on retail shelves, even if only by pennies.
I’ve had few major problems with bloatware when buying PCs directly from a vendor. But in retail, it’s a whole other world of garbage. For example, a few years ago, my 75-year-old technophobic father got a new PC to replace his dying Windows Vista system, which he mainly used to print pictures. I couldn’t really recommend spending a lot of money to get it fixed. “Just go find an off-the-shelf PC for under $400; it’ll be fine,” I said.
Hardware-wise, that Acer Aspire X (Model AXC-605G-UW20) he purchased at Walmart was sufficient. The specs all qualified as an upgrade.
(Credit: PCMag, Walmart)
To sell this PC for $399, however, Acer sold out my parents and wasted hours of my family’s lives.
Using TeamViewer remote-control software, I could see that the system was a mess, though all my father had done was install the software for his beloved (but dying) Kodak printer. The desktop was awash with at least 15 icons for needless, worthless crap. Opening up the Uninstall a Program control panel revealed even more. We tried to uninstall the obvious things, but they persisted.
With many of the uninstall routines, the dialog boxes had giant buttons that would say “Uninstall and Get PC XXXXXX” or something similar. If we just wildly clicked where the button was, the uninstall might work—but something else was installed in its place. We had to look carefully for the fine print on the dialog boxes that read “Delete Only” or similar. Tricks and traps abounded.
Back then, I turned to Slim Computer from Slimware Utilities, which kept a database of bloatware and helped identify it on a new Windows PC. It has since been discontinued, but current options include Bulk Crap Uninstaller(Opens in a new window) and Should I Remove It?(Opens in a new window) (The excellently named PC Decrapifier was another favorite, but has also been discontinued.)
(Credit: Reason Cybersecurity)
These utilities point out some bloatware but might not automate removal—in which case you still have to go through the normal uninstall process, which might be filled with tricks and traps to keep your new PC full of bloatware. So you’re on your own to an extent. But there are ways around that.
‘Potentially Unwanted’ Crap
Dad’s then-new Acer PC also came with actual malware, in the guise of “potentially unwanted programs,” or PUPs.
The programs don’t call themselves that; it’s a term used by anti-malware companies such as MalwareBytes(Opens in a new window). It describes software you probably didn’t install on purpose, that you don’t want, and that you’ll likely find unusable. But it’s necessary to say “potentially,” because it’s possible you really wanted to install a toolbar for your browser called “Search Protect” from a company named Conduit(Opens in a new window) or a search engine for your browser called Binkiland.
In reality, that’s about as likely as wanting to be set on fire. Both of those “programs,” among others, were on Dad’s PC. They existed only to take over his browsing experience; each appears on a list of browser hijackers(Opens in a new window) from Wikipedia. Check the list, and delete any you see. The list can and will go on and on, as hijackers make new threats. It’s telling that searching for “Search Protect” or Binkiland brings up absolutely no link for people to download those programs—only to remove the hijackers’ files.
These programs did a number on my dad’s PC. I couldn’t get the installed browsers (IE and Firefox) to go to a website to download new tools to deal with those threats. I had to download the clean-up software to my workstation, then use TeamViewer to do a remote file transfer of the EXE installer to Dad’s desktop.
Also note that at this point, we uninstalled McAfee Security Suite, which came free with the Acer as well. You may not consider antivirus software to be bloatware, but it certainly can be. Acer didn’t put it on there to be altruistic; McAfee paid for placement. McAfee was likely to slow the PC more than other AV products we could install later, and it would eventually cost $79 after the trial was over. No, thanks.
Here’s a rundown of the tools used to clean the hijacking PUPs:
MalwareBytes
The free version of MalwareBytes comes with a trial of the Premium version, so it’s worth running on every fresh installation of Windows. Also, the scans take a lot less time on a new Windows install. After 14 days, you lose features such as real-time protection and anti-ransomware, but it’s worth running up front. Just remember after that two weeks, you should get some real-time anti-malware protection.
Steven Gould’s Cleanup
This donationware(Opens in a new window) does the trick for Windows XP on up.
CCleaner
This Windows cleanup tool can not only scrape away temp files and other detritus, but it can also uninstall apps built into Windows. I’m not talking bloatware but actual apps that Microsoft created to work with Windows. Consider them OS-sanctioned crap. Click on Tools, then uninstall, and you’ll get a list of possibilities to delete. (This suggestion might be controversial: CCleaner got hit with data-collecting malware in 2017, and in 2020, Windows’ own antivirus flagged it as a PUP but seems to have now cleaned up its act.)
I ran each of these tools multiple times, MalwareBytes in particular. It kept finding instances of the PUPs, so we turned to the internet (which we could finally surf again) to find instructions(Opens in a new window) for manually deleting individual PUP files. Which we did, with glee. After cleanups were run, the system wasn’t totally bug-free. But it was certainly cleaner than it had been hours before.
Don’t Do What We Did
Let me make it clear: I do NOT recommend going through the steps above.
If we bought that computer today, it would come with Windows 11. Start with a full reset of the OS using the Windows 11 Reset Tool. It’s the first thing anyone buying a new PC at retail should do after they take it out of the box. This should set the PC back to a pristine state, without bloatware (except the Microsoft-supplied stuff you may not want, such as the Edge browser).
Recommended by Our Editors
(Credit: PCMag/Microsoft)
Better yet, vote against bloatware with your wallet. Buy a PC from a maker that guarantees a clean Windows install or at least offers it as an option. Microsoft, naturally, has a clean version of Windows on its Surface devices.
Again, that’s clean as defined by Microsoft—you may not want OneNote or Microsoft’s Mail app. But it’s a lot easier to get rid of Windows add-on software than other bloatware. Right-click anything you see in the Windows Start menu and select Uninstall.
Custom-built-PC manufacturers that promise you a bloatware-free installation of Windows include Maingear(Opens in a new window), Falcon Northwest(Opens in a new window), and Velocity Micro(Opens in a new window). Another option is to go with a local reseller. Or, buy a Mac or a Chromebook and avoid Windows altogether. Or to save money, install Linux on your old PC. (That wasn’t really an option for my dad.)
If you’re wedded to using an older version of Windows, the only surefire way to get the same result is to reinstall the OS completely with a totally fresh, clean configuration. That’s not possible with most retail PCs that came with Windows 7, 8, or 8.1. Whether the operating system installer is an image on a partition of the hard drive or comes on a USB flash drive, it’s likely going to install Windows with all the bloatware, fresh as an outhouse, as well.
You can also find the option to download ISO files of Windows 7 and 8.1 and even 10 at the Microsoft Software Recovery site(Opens in a new window). You’ll need to verify a 25-character product key from a retail version of Windows to download and fully activate the operating system. Keys from computer makers—called OEMs, or original equipment manufacturers—won’t work.
(Credit: PCMag/Microsoft)
Why Is This Happening?
You might be wondering why big-name PC makers and software developers are loading all this bloatware with extra “internet wrapper” PUPs on new systems. The answer? Money, of course. As PC sales dwindle, so do software purchases, and companies scramble to make up for their losses.
For more details, read this article by How-To Geek(Opens in a new window). It examined programs from every major download site, including CNET’s Downloads.com, Tucows, FileHippo, Softpedia, Snapfiles, and more. Every site bundled crapware into the desired software. Some of those sites have multiple download “buttons,” some of which are actually ads, on every page, to obfuscate and confuse users into downloading the wrong thing. That story is from pre-COVID 2019, but it’s unlikely anything has changed. PC sales went up a bit during the pandemic but are back in freefall.
Always download software from the original developer’s site—if you can find it. Unfortunately, even Google search results tend to default to download sites such as those listed above.
Years ago, pundit Ed Bott called for a PC “Truth in Labeling Act”(Opens in a new window) to force PC manufacturers to tell users everything that is pre-installed. This is an excellent idea that will never happen. It would also be great if download sites, some of which claim they don’t allow any type of malware(Opens in a new window), would do the same.
Like What You’re Reading?
Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.
This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.
Technology
Nearly 40 states back surgeon general’s social media warning labels
A coalition of 42 state and territory attorneys general is calling on Congress to pass regulation requiring warning labels on social media platforms. In a letter on Monday, the attorneys general wrote that the warning labels will bring attention to the “inherent risks” social platforms pose to children.
US Surgeon General Dr. Vivek Murthy first proposed the warning labels in June as part of a plan to avert the “mental health crisis” affecting young people. Attorneys general from a significant majority of states, including New York, California, Florida, Oregon, Michigan, and others, are writing in support of the measure, saying the move would help “protect future generations of Americans.” All told, the letter is signed by 39 state AGs as well as the attorneys general of American Samoa, the District of Columbia, and the US Virgin Islands.
The letter cites research linking social media use to anxiety, depression, and suicidal ideation in young people, along with studies that suggest social platforms disrupt children’s sleep with “irresistible algorithmic recommendations, infinite scrolling, and a constant stream of notifications” to keep them “relentlessly engaged on the platform.” The labels proposed by the surgeon general would be similar to the ones already used for alcohol and tobacco products.
But some of the underlying research on the effects of social media has been disputed, and these labels would mark one of the rare times that platforms for speech and communication have been required to post warnings to their users — with the exception of state-level rules demanding adult sites add unproven health notices about pornography.
“A surgeon general’s warning on social media platforms, though not sufficient to address the full scope of the problem, would be one consequential step toward mitigating the risk of harm to youth,” the attorneys general said. “We urge Congress to consider such measures and continue the search for innovative solutions to protect our children in the face of emerging technologies.”
Technology
Selling on the internet? Beware of sneaky tactics scammers use to trick you
Selling stuff online can be tempting. You don’t have to go out and hunt for buyers. Instead, you can just post an ad on platforms like eBay or Facebook Marketplace and wait for people to reach out to you. But along with the ease of online selling comes the risk of getting scammed.
One of the popular scams to watch out for is the Google Voice verification scam. This scam preys on unsuspecting sellers by exploiting their trust and the convenience of online communication. Scammers pose as potential buyers and use seemingly innocent requests to gain access to your personal information. Their ultimate goal is to hijack your phone number and use it for fraudulent activities.
Here’s how it works: A scammer will send you a text with a Google Voice verification code and ask you to share it with them. If you do, they’ll use that code to create a Google Voice number linked to your phone number. Once they’ve got that, they can use your number for all sorts of shady stuff, like identity theft.
Recently, I received an email from Allen C., a resident of Island Park, New York, explaining how he almost fell prey to the Google Voice scam. Below, I share Allen’s story, discuss the impact of such scams and provide tips on how you can protect yourself.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
How scammers prey on innocent online sellers
Allen told me he was trying to sell an item on eBay when he received a message from someone saying they were interested in buying the item. The person asked for his number, saying she was at work and her husband would contact him. Allen gave his contact number, but then she asked him to share a code.
“At first I thought it was legit, but then she told me she needs to confirm I was real, so she sends me this code through Google Voice, it gave me a 6 digit code which I was supposed to send back,” Allen told me.
“After thinking about it, I was trying to figure out why she needed to know if I was real, when we didn’t even discuss the item I was selling! I did some checking and she started spelling words wrong, she said she didn’t get the return code, I know she did, she begged me to let her send another one. My research confirmed it was probably a scam.”
Allen realized it was a scam just in time, refused to give the scammer his cell number and deleted the message.
DON’T FALL PREY TO ELECTION SEASON’S CRAFTIEST SCAMS
What happens when you give the code to scammers
Once you provide scammers with your Google Voice verification code, they can create a Google Voice number that is linked to your phone number. This gives them significant control over a virtual phone number associated with your real one, which poses serious risks.
One of the main dangers is that scammers can intercept verification codes sent by banks and financial institutions. When these institutions send a verification code to authorize a transaction, it may be redirected to the scammer’s Google Voice number instead of your phone. This allows the scammer to authorize fraudulent transactions, reset passwords and gain access to your financial accounts, effectively bypassing your security measures.
Additionally, by controlling a number linked to your identity, scammers can engage in identity theft. They may open a new credit card or loan account in your name, impersonate you to access other services that rely on phone verification and exploit your phone number as a recovery option for various accounts.
Furthermore, scammers can use the Google Voice number to conduct additional scams while appearing to have a legitimate U.S.-based number. This tactic helps them hide their true identity and makes it more challenging for authorities to trace their actions.
Ultimately, by gaining control of a number associated with your identity, scammers acquire a powerful tool that undermines common security measures that rely on phone verification. This can lead to financial losses, damage to your credit score and a complicated process of reclaiming your identity and securing your accounts.
TV HOST ANDY COHEN SWINDLED IN COSTLY BANK SCAM: HOW TO AVOID BECOMING A VICTIM YOURSELF
HOW TO AVOID BECOMING A MOVING SCAM VICTIM
How to reclaim your Google Voice number?
If you’ve given a scammer the verification, your linked number has been claimed, and someone else is using that number with another Voice account. If you still own the linked number, you can reclaim it by following these steps:
- On your computer, go to voice.google.com.
- Click Settings in the upper right corner.
- Under Linked numbers, click New linked number, then enter the phone number to link
- To verify your number, Google will provide a six-digit code. For a mobile number, click Send Code to review the code in a text message. If it’s a landline, click verify by phone link and then Call.
- Enter the code and click Verify, then Claim
4 other ways to protect yourself from such scams
Scammers don’t only use Google Voice to scam you. They have plenty of other tactics, such as making you install malware to steal your data and passwords. Below are some tips to avoid getting scammed.
1) Check the email address: When you’re trying to sell something online, scammers might reach out to you via email and try to get you to click on malicious links. These links may look harmless, but they can give scammers access to your device and important data. Do not click on any links or attachments in the email and do not reply to it. Remember, you don’t need to click any links to sell an item online.
The best way to safeguard yourself from malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
2) Avoid the sense of urgency: Many online selling scams create a sense of urgency or panic to trick you. Scammers might tell you that there’s a problem with your account, claim that you owe money, suggest that there’s an issue with your listing or even offer you a prize.
They may pressure you to act quickly, asking you to send money, provide personal information or buy gift cards. Don’t let them rush or pressure you. Take a moment to think carefully before you respond. If you’re unsure, consult someone you trust, such as a friend, family member or financial adviser. Remember, legitimate buyers or platforms will never ask you to pay with gift cards, wire transfers or cryptocurrency.
3) Verify buyer or seller’s identity: If you receive a message or call from someone claiming to be a buyer, a platform representative or an organization related to your online sale, don’t trust them blindly. Scammers may use fake names, phone numbers or email addresses to deceive you. They might also have some information about you, such as your name or listing details, which doesn’t mean they are legitimate. This information could be obtained from public sources or previous scams.
Do not provide any additional personal information, such as your bank details, password or Social Security number. Avoid agreeing to any unusual requests, like sending money, buying gift cards or sharing codes. Instead, verify their identity by contacting the organization or platform directly using a known, official contact method. You can also check the organization’s website for any alerts or warnings about scams.
4) Invest in personal data removal services: Removing yourself from the internet is an important step in protecting your personal information from scammers and cybercriminals. Even if you’re not selling anything online, removing your personal information from the web is crucial. This prevents scammers from obtaining your data to make fraudulent calls or create convincing scams. By limiting your online presence, you reduce the chances of scammers finding and exploiting your personal details. Additionally, deleting yourself from the internet ensures that scammers cannot access your personal information to call you or make you believe they have some of your credentials, making their scams seem legitimate.
While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
ALERT: 4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH
Kurt’s key takeaway
Selling items online can be easy, but it comes with risks, such as the Google Voice scam. If someone asks you for a verification code or personal details during a sale, be extra cautious. Always verify their legitimacy and use official channels for communication. Only use trusted platforms to sell anything online and take steps to protect yourself from identity theft, which can impact your finances for years.
Have you ever fallen victim to an online scam? What did you learn from the experience? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Huawei’s new tri-fold phone costs more than a 16-inch MacBook Pro
After weeks of teasing, Huawei has officially launched the world’s first dual-hinged, triple-screen foldable phone and it’s just as expensive as we feared. In China, prices for the Mate XT Ultimate Design start at 19,999 yuan (about $2,809) for the 256GB storage model — that’s roughly $300 more than a brand-new 16-inch MacBook Pro.
All models are equipped with 16GB of RAM, and two additional storage variants are available that cost 21,999 yuan (about $3,089) for 512GB and 23,999 yuan (about $3,370) for 1TB. Chinese retailer Vmall reported 3.7 million preorders before pricing was announced.
The Mate XT features an inverse dual-hinge design that folds in a “Z” shape, allowing it to be used in a variety of formats. The OLED display measures 6.4-inches when fully collapsed as a traditional single-screen device. When fully unfolded, that display increases to 10.2-inches (2,232 x 3,184) and can still be used when partially unfurled in a smaller 7.9-inch configuration.
The device comes with a 5,600mAh battery and supports 66W of wired charging or 50W wirelessly. There’s a triple camera setup located on the rear that consists of a 50-megapixel main camera, a 12-megapixel ultrawide, and a 12-megapixel periscope camera. The hole-punch selfie camera on the front is 8 megapixels, and located on the left-most screen when the device is fully unfolded.
We’ve reached out to Huawei to ask about availability outside of China, but we’re not holding out hope.
-
World1 week ago
Locals survey damage after flooding in eastern Romania
-
World1 week ago
Taiwan court orders release of ex-Taipei mayor arrested in corruption probe
-
Politics1 week ago
Gold Star families slam Kamala Harris for 'playing politics' over Trump's visit to Arlington National Cemetery
-
Politics1 week ago
Michigan becomes a top GOP Senate target as Mike Rogers ties with Dem opponent among older voters
-
World6 days ago
Meloni says 'we are making history' as Italy’s FDI reviews progress
-
World1 week ago
Seven EU members hadn’t received any post-Covid funding by end-2023
-
Politics1 week ago
Margin of error race between Harris and Trump as 2024 election enters final stretch
-
World6 days ago
Israeli forces using ‘war-like’ tactics in occupied West Bank: OCHA