Rogue software that crashes everyone should be uninstalled immediately;

Windows has a lot of rogue software, which is of no use after installation. It will also occupy the performance resources of the computer and even tamper with the information on the computer. Today Xiaoqu will make a "blacklist" for everyone. You must not install these software on your computer;

1. Master Lu

After buying a computer, many people will install a system detection software to conduct all tests on the computer, evaluate the system, etc. However, I suggest you not touch this software! After Master Lu was acquired by 360, he became a veritable gangster;

After installation, not only various advertisements pop up, but also automatically installed software suddenly appears: Master Lu wallpapers, various game libraries...

f3eea7ea0544b058fc7998d8fc78505c.png

Want to uninstall, not that easy!

Do you think you uninstalled successfully? Actually not; there are still many residual small programs injected into the computer;

57d9411b3b5af7eb0295dfba3e418ada.png

There will be uninstallation residue in the computer, which will never be cleaned up. It will also play Master Lu wallpaper for you from time to time:

922c371d8d4a446a87c3af9a430274be.jpeg

If you encounter something that cannot be unloaded, you can use a tinder crusher;

2, 2345 series

4b9a70c45880abf7a78935c9d8224ac8.png

Mainly talking about its browser, it is simply a rogue among rogues!

Let’s not talk about the many advertisements. It will tamper with the default homepage of all browsers on your computer. Even if you uninstall it, the homepage will still be the same! Is this a familiar page?

bba9bb8fe7b9b4f20ff8d68c03f4d34b.png

3. Unknown wallpaper

The computer should not bring down the entire system just for good-looking wallpapers. Very complex dynamic effects will use more CPU resources and occupy more computer memory. If you like to set up particularly cool dynamic wallpapers, then Make sure your computer equipment is hard-core enough. Unless there is a special need, there is no need to install wallpapers, especially niche wallpapers, which are rogue software;

95c9aee899373c8001eef6fdfd1f50ea.png


4. Kingsoft Drug Tyrant

Who would have thought that Kingsoft Antivirus, which had a simple page in its early years and was famous for its excellent anti-virus capabilities, would now become a rogue software. Not only will it complete its own installation without your knowledge, and it will be difficult to uninstall it after installation, it will also install bundled junk software on your computer. For many computer novices, it is extremely difficult to even find its source files, and it is even more difficult to completely eliminate it.

d3e956e7dcc917cdd6888d01ff2476d9.png

5,360 Family Bucket

This has been written in the previous introduction, and I would like to remind everyone today; for some people who are new to computers, they must think that 360 is very good, and 360 is famous for being free. Let users install it under the guise of being free, although using 360 software is free and has a certain effect. However, you will find that after downloading 360, 360 Browser, 360 Security Guard, 360 Antivirus, etc. will appear on your computer. Some of them were obviously not downloaded by me, but they just appeared. It is hidden in all kinds of inconspicuous corners and can be tied up accidentally, which is the reason why the computer becomes stuck;

372cc351f3682af11705d678cdd4a406.png

Finally, let me tell you that Windows has a free software that detects whether there is malware; friends who have rogue software on their computers can delete it through this method. Friends who are not sure about it can also use this method to detect it. Not much to say, let’s take a look together

1. After turning on the computer, press and hold the Win+R key combination at the same time to bring up the ‘Run’ dialog box;

d72fe02acf232e49ce7f10b35a55b2cf.png

2. Enter mrt, press Enter or click ‘OK’ to open the Microsoft Windows Malicious Software Removal Tool;

d87f3e62c0490b8dea698efb1c1b62f9.png

3. Click ‘Next Page(N)>’ to enter the ‘Scan Type’ selection box. There are three methods: quick scan, full scan, and custom scan. You can choose according to the situation. If time permits, it is recommended to choose full scan;

9a7392359b1d103d49f3d97417f8a7df.png

4. After selecting, click ‘Next Page(N)>’, and the system will start scanning your computer;

41fc1596e66e6ee34f7a8adc3b869df2.png

5. While scanning, the malware found will also be deleted. When the scan is completed, the cleanup is completed. Click ‘Finish’ to end.

17e488506d1700932a6e7a7ec3c21d46.png

In this way, the rogue software on the computer will be cleaned up. Isn’t it very simple? Friends, hurry up and give it a try

Guess you like

Origin blog.csdn.net/qxf865618770/article/details/134985317