When talking about rogue software, everyone gritted their teeth. I used to be a victim. I had been installed with more than a dozen plug-ins without feeling, so I kept popping up advertisements and modifying the website's homepage. After a long time, I tried my best to uninstall these hooligans. I still had to reinstall the system because of the stubborn resistance. Since then, I have been careful, and I am afraid that I will be infected by rogue software. I did not expect to escape the bad luck. Yesterday I found my favorite computer was inserted by a rogue computer, but this time I was not scared, let's see how I clean up these hooligans.
I am using a free, perfect uninstall software. After simple installation and perfect uninstallation, open the main interface of the software, and click the "Clear plug-in" button. The perfect uninstallation immediately detects the software and plug-in installed in the system. Figure 3 shows that the author's computer has been installed with CNNIC Chinese online navigation, as well as plug-ins such as new word search, Tmall, World News browser, and blue sky voice and video chat room. These software and plug-ins all dive into the computer without installation tips, so I do not hesitate to clear all of them.
Figure 1 perfect unmount Main Interface
Figure 2 Detection System
Figure 3 software and plug-in installation status
Select CNNIC Chinese online navigation, click the "Uninstall" button in the lower right corner, and uninstall the SDK first.Program.
Figure 4 uninstall CNNIC Chinese online navigation
Figure 5 clean up with the built-in uninstall program
The uninstallation programs carried by most rogue software cannot be completely uninstalled. The perfect uninstallation will perform a second uninstallation to clear the residual information in the folder, so that it will not recur.
Figure 6 perform secondary uninstallation perfectly
After the system is uninstalled again, the system detects that the software and plug-ins installed previously do not exist. Open the recycle bin, and all files related to the software and plug-ins are cleaned up here. The Recycle Bin is cleared, and rogue software and plug-ins are pulled from the root.
Figure 7 uninstall successfully
Figure 8 software related files in the recycle bin
After removing the software and plug-ins, You need to restart the computer. If you cannot access the Internet, you can use the "Network component fault recovery device" in other functions in the upper-right corner of the main interface. After the repair, you can access the Internet normally.
The above method is simple and effective. In addition, I was pleasantly surprised to find that the perfect uninstalling "system protection master" not only can defend against Trojan attacks, but also can prevent malicious web pages, malicious scripts, and various network plug-ins from entering. In this way, the rogue software can be cleared and the system can be protected from being harassed by the rogue software and plug-ins.