Experiment:-12: Removing Unwanted Software
Experiment:-12: Removing Unwanted Software
EXPERIMENT:- 12
AIM :- Demonstrate to remove unwanted software applications.
If if is no longer possible to uninstall the software the normal way, sometimes it helps to
reinstall the software to make sure all files are where they should be. There is a chance this
will repair the uninstall procedure as well. Of course, this reinstalling is only possible when
the original installation files are still available. Reason enough to save the downloaded
installation files on a safe location, you never know whether they will be useful later on!
Disabling the applications which are not frequently used will improve the system
performance remarkably. Most applications offer this option at setup, if you are not sure it
is better to disable this option. This option is also offered in the settings of many programs,
like the following example of Flashpaste (www.download.com, one of the few applications
which is very useful to boot at startup).
On many computers you will find a long list of services from different software
vendors/manufacturers. Because the names of the services are not always that obvious, the
name of the vendor/manufacturer will give an indication what the service is used for. After
combining the information of the service, the manufacturer and the history of the computer
are combined, it will probably give a clue.
becomes hard to trace the cause, so don't forget you have made changes to the services! If
needed, make some notes of the disabled services.
In the example, only the necessary items have been left over like the Application
Accelerator from Intel, the NVIDIA features (graphics card), Bluetooth support and usefull
additional tools like TaskSwitchXP and FlashPaste. The item wcescomm.exe appears to be
from the application Microsoft ActiveSync, the synchronization software for a PDA/MDA.
Combine the information of MSCONFIG with the information from the firewall
Although it is not always clear what the entries are used for, a firewall (like Comodo
Firewall) can be of use, especially when this application is trying to access the internet. By
combining the MSCONFIG information with the information from the firewall, will
probably give a good idea, especially if a virus uses the whole bandwidth of the internet
connection (disabling a virus has to be done in Safe Mode (press F8 at Windows startup)
to disable the virus). In the example above, the firewall was useful to
identify WCESCOMM.EXE as the synchronization tool Microsoft ActiveSync.
TIP: If you have no idea what a program is used for, you can still search the internet. There
are multiple websites with information about processes, like www.processlibrary.com. The
information on those websites will give a good idea whether a process is usefull or not.
This build in tool does not show a lot of information of the running processes and the
accompanying files. The alternative tool Process
Explorer (download:www.microsoft.com/technet/sysinternals/ProcessesAndThreads/Proc
essExplorer.mspx) however, gives a lot more information. By Process, Properties it is very
easy to find the file location of a specific process. This makes it a lot easier to trace the
actual name of the application which will indicate whether it is a wanted or unwanted
application. The next step is to disable it with MSCONFIG.
Most viruses and popup windows are simply disabled with MSCONFIG
In many cases, disabling a virus or popup window is easier then you would expect,
especially if you are following a straight forward procedure. Start MSCONFIG, disable
allNOT Microsoft services on the tab Services and disable all items on the tab Startup.
Before making any changes, make some notes which services and startup items have been
disabled already in a previous session! Reboot the computer and check the two tabs in
MSCONFIG whether one of the items has been enabled again. This might be a virus
because they are hard to disable (just like security software). In this case, the virus has to
be disabled after booting the computer in Safe Mode (press F8 at startup of Windows).
After a reboot of Windows start MSCONFIG to verify whether the virus has not been
activated again. If everything is fine, all desired items on the tabs Services and Startup can
be enabled again.