![]() ![]() If AVG does not tell us explicitly why, and give me complete informed control, then I would stop trusting AVG, and I would move on. Maybe because the program installed in user directories, or ‘watches’ the computer’s audio and video bus to record, or installs auto-run elements, or has zipped contents or performs DNS lookups, AVG thinks it’s doing something bad, but that’s what programs do, especially programs that browse the web, seek download options, and download our choice from those options, as well as compiling and converting to local re-playable files. ![]() ![]() Maybe there is a conflict between newly signed or unsigned programs and dates in your particular AVG installation where it dings newly released things because they have not been tested yet, so they are being overcautious, who knows? Regardless, no PUP I’ve ever seen steals or destroys.Īnd regardless, OKmusi does not show up as even a PUP at FREE VirusTotal, including analysis by Avast and AVG. What is a PUP ‘potentially unwanted program’?Īt worst, they do exactly as they promise in their TOS terms of service, which might include installing additional software, a browser extension, a background ‘buy me’ nag, or reporting user usage to their mothership – none of this is totally hidden, just buried in their terms of service. ![]() Some anti-malware programs go way overboard removing PUPs ‘potentially unwanted programs’ because, hey, they want to show they are doing something more than the competition. I check the installer at FREE VirusTotal ( subjecting any submission to ~70-ish different anti-malware tests, including Avast and AVG – join/create a FREE log-in at FREE VirusTotal and then we can see details behavior of the tested file ), then I also check each installed program file at FREE VirusTotal, and make my own ‘do I trust it? do I care?’ assessment from there. AVG is notorious for releasing software with a virus in it ( see their acquisition of CCleaner and the resulting sullied reputation ), and their mother company, Avast, has been breached, losing user data into the wild, their products have been discovered to collect and resell user data through their subsidiary Jumpshot, they employed notoriously fraudulent iYogi to provide support, and were under investigation at least in 2020, so there’s that. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |