If it can be uninstalled through regular channels, it is not considered rogue software.
What is rogue software?
"Rogue software" is software that is between viruses and regular software.
Computer viruses refer to a type of program that itself, or enables other programs to destroy system functions, endanger user data, or perform other malicious behaviors. Such programs often interfere with computer usage and can replicate themselves.
Formal software refers to software developed to facilitate users to use computers for work and entertainment and released to the public.
"Rogue software" is somewhere between the two. It has both normal functions (downloading, media playback, etc.) and malicious behaviors (popping ads, opening backdoors), bringing substantial harm to users.
Classification of rogue software
According to different characteristics and hazards, rogue software that troubles computer users mainly includes the following categories:
1. Advertising software ( Adware)
Definition: Adware refers to a program that is downloaded and installed on the user's computer without the user's permission; or is bundled with other software to seek commercial interests through pop-up advertisements and other forms.
Hazards: Such software is often forced to install and cannot be uninstalled; collects user information in the background for profit, endangering user privacy; frequently pops up advertisements, consuming system resources, making it run slower, etc.
For example: After a user installs a downloaded software, windows with advertising content will keep popping up, interfering with normal use. After some software is installed, advertising icons that are irrelevant to its functions will be added to the toolbar of the IE browser, making it difficult for ordinary users to remove them.
2. Spyware (Spyware)
Definition: Spyware is a software that can install a backdoor on a user's computer and collect user information without the user's knowledge.
Hazards: Users’ private data and important information will be captured by “backdoor programs” and sent to hackers, commercial companies, etc. These "backdoor programs" can even enable users' computers to be remotely controlled and form a huge "botnet", which is one of the important hidden dangers of current network security.
For example: Some software will obtain the user's software and hardware configuration and send it out for commercial purposes.
3. Browser hijacking
Definition: Browser hijacking is a malicious program that targets users through browser plug-ins, BHO (browser auxiliary objects), Winsock LSP, etc. The browser is tampered with so that the user's browser configuration is abnormal and the user is forcibly directed to a commercial website.
Hazards: Users will be forced to install such plug-ins when browsing websites. Ordinary users cannot uninstall them. After being hijacked, users will be forcibly directed to their designated websites as long as they surf the Internet, which has serious consequences. Browse the Internet normally.
For example: Some unscrupulous sites will frequently pop up installation windows, forcing users to install a browser plug-in, without even soliciting user opinions, and using system vulnerabilities to force installation into the user's computer in the background. This kind of plug-in also uses non-standard software writing technology (this technology is usually used by viruses) to avoid uninstallation by users, often causing browser errors, abnormal system restarts, etc.
4. Behavior recording software (Track Ware)
Definition: Behavior recording software refers to stealing and analyzing user privacy data without the user's permission, and recording the user's computer usage habits and Internet browsing Software for personal behaviors such as habits.
Hazards: endangers user privacy and may be used by hackers to commit online fraud.
For example: some software will record the websites visited by users in the background and analyze them, and some will even send them to specialized commercial companies or institutions. Such institutions will use this to spy on users' hobbies and conduct Corresponding advertising promotion or commercial activities.
5. Malicious shareware
Definition: Malicious shareware refers to some shareware that uses deception in order to obtain benefits. , trial traps and other methods to force users to register, or bundle various malicious plug-ins into the software and install them into the user's machine without permission.
Hazards: Use "trial trap" to force users to register, otherwise they may lose personal information and other data. Plug-ins integrated into the software may cause the user's browser to be hijacked and privacy stolen.
For example: after a user installs a certain media player software, he or she will be forced to install software that has nothing to do with the playback function (search plug-ins, download software) without giving clear prompts; and the user uninstalls the player software. These additional installed software will not be automatically uninstalled.
Another example is a certain encryption software. After the trial period, all encrypted data will be lost. Only by paying for the software can the lost data be retrieved.
6. Others
With the development of the Internet, the classification of "rogue software" has become more and more detailed. Some new types of rogue software are constantly emerging, and the classification standards will inevitably change. adjustment.
More people are not disgusted with Yahoo Assistant software because of its functional problems, but because of its promotion methods, forced installation, bundled installation, inability to uninstall and other problems
2005 On September 13 last year, Microsoft defined 3721 as a virus in the anti-spyware software Microsoft AntiSpyware. Yahoo China handled this upcoming public relations crisis extremely quickly. On September 15, it launched a software called " "Yahoo Internet Assistant" new software to replace 3721, and block "rogue software" keywords in three Alibaba-owned search engines, Yahoo China, Yisou, and 3721. This is deceiving others.
Liu Fei, Yahoo China Product Manager, said this in an interview with reporters: "3721 does have problems such as being difficult to completely uninstall, but the Yahoo Assistant launched in October 2005 is to help users The focus is on completely getting rid of online harassment and protecting user privacy and security. There are more prompts during installation, and uninstallation is also very convenient. "The fact is that neither 3721 nor Yahoo Assistant can be cleanly uninstalled, and there are so many rogue software across the country. Programs are all proud of deleting Yahoo Assistant. If Yahoo Assistant can be uninstalled cleanly, where do so many netizens on the Internet complain about not being able to uninstall it come from? Are the authors of rogue software cleaners out of their minds? Launch an uninstaller for a software that can be uninstalled? It turns out that Yahoo Assistant cannot be uninstalled cleanly.
At the height of the rogue software turmoil, Yahoo officials in China also unintentionally admitted the rogue nature of Yahoo Assistant. The official claimed: “Yahoo Assistant has not been installed maliciously, and most victims have installed it by mistake. The Yahoo Assistant was installed only after pressing the Enter key. The active installation rate of Yahoo Assistant has reached 40%. This means that 60% of the users of Yahoo Assistant were forced to install Yahoo Assistant. Assistant, the number of Internet users in China was a little over 100 million in 2005. Now I think there are 100 million people. The official website of Yahoo Assistant claims that 70% of Internet users choose to use Yahoo Assistant. 100 million Did you press enter to install Yahoo Assistant? If you think about it further, what does it mean that people in their 60s are not willing to install Yahoo Assistant but are still using it? A small number of people think that Yahoo's functions are acceptable, but most people are forced to use it because they cannot uninstall it.
Whether it was the 3721 era or the Yahoo Assistant era, neither company acknowledged the harm caused by rogue software to netizens, nor did they apologize to netizens. Therefore, Yahoo Assistant deserved the scolding, just like a puppy paying homage. Jingguo Shrine, it is said that Japan was not good in the past but it is different now. I promise I will not visit it on August 15 this year. How many people can believe what a puppy says? In the same way, Yahoo Assistant said: 3721 could not be uninstalled before, but now I have launched version 3.0 to ensure that it can be uninstalled.
How many people would believe this? 3.0 can be uninstalled, which means that 1.0 and 2.0 cannot be uninstalled before?
Yahoo Assistant is also objectionable to its company. After the Beijing Internet Industry Association named and announced the list of 10 rogue software, Yahoo China only refuted 3721, but did not refute the same company. "Yisou Toolbar" refutes, does it mean that Yahoo China itself has admitted that its own "Yisou Toolbar" is rogue software? If so, Yahoo China admitted that it launched rogue software. Yahoo China also supports the spread of pirated software. If bundling with genuine free software is considered normal promotion, then what is the Yahoo Assistant bundled with pirated XP from "Tomato Garden"? Yahoo Assistant adds another crime, supporting piracy! If Yahoo Assistant is not a rogue, why did it send a lawyer's letter to the author of Super Rabbit, accusing Super Rabbit of malicious deletion? Why not blame Microsoft? Can't "Add/Remove Programs" in Microsoft's control panel also remove Yahoo Assistant? The fact is that regular methods cannot cleanly remove Yahoo Assistant, especially from "Add/Remove Programs", while some excellent rogue software removal programs do this very well, which causes the displeasure of rogue software publishers.
To sum up, what reasons do we have not to dislike Yahoo Assistant?
It is a kind of rogue software, malicious bundled installation.
1. Analysis of the moral aspects of Yahoo Assistant and Yahoo Assistant
Forcibly planting without explicit notification into other program modules.
Loading through system driver, safe mode cannot be avoided. Even Windows provides safe mode with network connection to users as a separate project, while Yahoo Assistant is indiscriminate and loaded regardless of whether the user uses the Internet or not!
2. Legal analysis of Yahoo Assistant and Yahoo Assistant
Additional installation programs violate the right to know;
Deceptive means are used to retain unauthorized information during the uninstallation process. User-permitted modules, and cross-repaired with each other;
Automatically infect, automatically reproduce, hide itself, occupy system resources, interfere with users' online activities, directly or indirectly introduce bad data into the system, and are extremely difficult to remove , automatically loaded through multiple channels...already has complete virus characteristics.
Of course, if you simply install it, he will not torture you. But all your secrets are open to Yahoo Assistant. If you don't care, then of course it doesn't matter. If you had online banking at that time and your money was lost, it can be said that you didn't have any evidence to accuse Yahoo Assistant. The bank will also evade it, saying that you did not keep your password well.
At that time, just cry.
In other words, Yahoo Assistant can control all the privacy on your computer
He will send your Internet information to their database, and also do some weird things Something has arrived on your computer. It's very troublesome. Delete it quickly. Yahoo comes with viruses, including a lot of IE viruses. My friend was installed with Yahoo for some reason, and almost had to reinstall the system. The web page couldn’t be opened, QQ couldn’t be accessed, and nothing could be opened. You’d better Take it off, just in case. The next Trojan will kill the guests and kill the virus that comes with Yahoo!
Uninstall it. I found that its advantages outweigh its disadvantages. It is still safe to uninstall it! !
We can function normally without him! !