We use a lot of free or shared software when using computers, and these software will be more or less bundled with some junk plug-ins, although many software will prompt whether to install these plug-ins during installation, however, the existence of these spam will prevent us from installing software and occupying valuable hard disks. Therefore, we need to remove the spam from the software we really need. This article will teach you how to remove the software.
1. dummies can do the same-plug-ins installed in self-extracting Mode
Principle Analysis
The simplest method for installing the spam plug-in is to use WinRAR's self-extracting installation function to compress normal programs with the spam plug-in into a self-extracting compressed package. Double-click the compressed package, the software and plug-in will be installed at the same time. The easiest way to prevent this bundle is to drag the package to WinRAR before double-clicking the self-decompressed package, and press the shortcut key "Alt + I" to bring up the information box of the compressed file, then select the "comment" label, as shown in 1. If you can see the installation script of other programs in the comment, you must be vigilant.
Figure 1 The script to be executed is displayed in the Self-decompressed File
2. decompress the package to complete-Clear the junk software in the package.
Operation Practice
Below we will provide a solution to crack the self-decompressed package plug-in bundle described above. Many plug-ins are installed using this method, which is used by RM file repair experts in version 4.60. Let's take it as an example.
Press the shortcut key "Alt + I" to open the information box of the compressed file and select the "comment" tab. You can see the following text:
Path = hyrm
Setupdomainsetup.exe hyrm.exe
Overwrite = 1
Title = Rm movie file repair expert (V4.60 free version) Installation
Text
Let's explain this Text. The "Path" parameter is followed by the decompressed release Path; the "Title" and "Text" are the Title and Text description of the Self-extracting window respectively; we need to pay attention to the parameter after "Setup". If the value behind this parameter is two or more, the spam program may be bundled. In this example, It is setup.exe hyrm.exe, we can basically determine that the software is bound with other programs.
Ghost is also a self-extracting file. decompress it, right-click the cab file, select "attribute", and select the "Digital Signature" label. Its company name is Beijing Perfect Time and Space Network Technology Co., Ltd, it is probably a plug-in related to him.
And delete all the remaining items, so that your green and pollution-free RM repair experts will be born. In this example, many plug-ins are bundled, but there are only two executable files on the backend of the setup.exe folder. The setup.exe file is an executable program used to call other security plug-ins.
Figure 2 numerous garbage in self-decompressed packages
3. cache also helps-create a free-of-installation listener
Operation Practice
Now many of my friends are still listening to it. The official program is an installation file. In fact, this program is completely green. The Installation File is designed to allow us to install junk plug-ins. This software can also use similar analysis to self-decompress the compressed package to obtain the Green Edition program.
The Installation File of Yan jingting is shelled by professional shelling software. We cannot directly remove the shell, but according to the software installation principle, it automatically decompress all the files to the Temporary Folder at runtime. We can use this temporary folder to create a green version Program (we take the 4.4.5.2 version as an example, version 4.6.6 does not seem to have this feature ).
Run the installer. After the installation interface is displayed, do not click Start and press Win + F to open the Search dialog box and select search all files and folders ", select "more advanced options", select the search system files and hidden files, and click "Search" to find a folder named "sfx **. tmp ", as shown in 3.
Figure 3 the installation package is automatically decompressed by the listener
Copy the folder and close the installation interface of the listener. Go to the files sub-folder in the folder. The BaiduBar. dll file is a tool bar of Baidu. Do not hesitate to delete it. The functions of the remaining dll files can no longer be determined by name. We should use a method similar to the above to identify the dll files. Right-click the dll file with an unknown function and select "attribute ", select the "version" and "Digital Signature" labels respectively. The company field determines whether the file is a junk plug-in. If you find that there are junk plug-in production company names in the company attributes, delete them directly.
Deleted. If it can be used normally, you can delete the file. After this process, the spam plug-ins in the listener are basically cleaned up. Rename this folder as "", and your Green player will be generated.
Note:: TTPlayer.exe is used in Win2000/XP/scripts ).
4. Plug-ins-plug-ins installed in shell mode
Principle scoreAnalysis
Another typical method of bundling junk plug-ins is shelling, that is, bundling the plug-ins in shell mode out of the real program, as long as the installation program is run, you will be prompted to install this spam program. The most typical part is the Chinese patch of the New Century members of the Chinese version. In the early days, the Chinese version of the new century was bundled with the netassistant through shelling. When installing the patch, you will be prompted whether to install the netassistant.
5. The patch should be cleaned up-to split the Chinese patch and the Internet Assistant
Operation Practice
Although we can choose whether to install the netassistant plug-in when installing the Chinese patch, if there are many such patches, there will be a large number of repeated junk plug-ins occupying your valuable hard disk, moreover, cainiao may mistakenly install junk programs when installing Chinese patches due to negligence. To this end, we need to clear these nasty guys.
In the new century, the chinese prawn community has provided us with dedicated gadgets (only kb in size) to extract clean Chinese patches and run software, as shown in figure 4, click the Browse button next to the input file, select the Chinese patch, Click Browse next to the output file, and select the location where the innocent file is stored after shelling, click "Remove innocent Chinese patches. Note: This method is only applicable to works released before the new century of Chinese.
Figure 4: Restore patches in the new century of Chinese
6. Spam created professionally-spam software encapsulated by professional installation programs
Many software installation programs are made using some Installation tool, and spam plug-ins are bundled along with the installation tool. For this type of software, we can try to decompress these packaged programs with the anti-installation program of these installation program preparation tools.
The relationships between common unpacking tools are shown in the following table:
| Encapsulation Software |
Unpacking Tool |
| Inno Setup |
Innounp |
| SetupFactory |
Setup Factory unpacker (currently only software created with SetupFactory 5 and 6 is supported) |
| WISE Setup |
HWUN |
| CreateInstall |
CreateInstall |
| InstallShield |
WINPACK |
In addition to the unpackage tool described above, you can also try the FAR 10 thousand tool and use it with the InstallExplorer plug-in, you can unlock the installation programs created by tools such as WISE, Inno Setup, Gentee Installer, InstallShield, NSIS, SetupFactory, escheon, and MSI Windows Installer.
7. Also the true nature of the program-to give the ultimate taste five strokes to lose weight
Five excellent five strokes is a very useful five strokes input method, for the use of 86 five strokes