PUP – What are potentially unwanted programs, and how can you protect yourself from them?
Author
Carolin AndreeEveryone knows about viruses and Trojans. But what are PUPs (Potentially Unwanted Programs), and are they a danger to your computer? Read on to learn more about this topic, including tips on protecting yourself from PUPs.
How do PUPs get onto a computer?
As the name already suggests, PUPs are unwanted programs that make their way onto computers without permission – most commonly through the process of downloading software – hidden inside desired programs.
In most cases, PUPs are designed as marketing tools, with the ability to change your browser settings. For example, a user is asked whether a specific search engine should be used as the default search engine in the Internet browser during the installation process. The ticks for consent are usually already set, and the new search engine is subsequently installed. These additional programs are therefore installed almost exclusively with the conscious or unconscious consent of the user.
In contrast to viruses or Trojans, PUPs are not in themselves dangerous but are an inconvenience and rather annoying for users. Why? Most of these unwanted programs offer no real added value to the user and waste valuable system resources. In worst cases, they deliberately slow down a computer to sell a suitable program to speed it up again.
Why do PUPs exist?
The answer is simple: software developers can make money by offering these free programs. For example, a freeware manufacturing company receives a small amount of money for each successful toolbar installation or a new default search engine. Since freeware is installed on computers en masse, this can quickly become a lucrative business for the developers.
If you think that this cannot be legal, think again. The developers of such programs stay within the boundaries of the law because the user must approve the installation of these programs. Of course, as most users want quick access to their new software, they click through the installation process without giving much thought to what they agree to. Therefore, programs can be installed quickly without the users even noticing.
How do you recognise PUPs?
Whilst there are some more apparent indications of PUPs, such as a change in the browser toolbar, many are not so easy to detect.
Security engineers will often examine lists of "incorrect" or "bad" behaviours to establish whether a program or application is a PUP. If such behaviour exists, then it is marked as a PUP.
These behaviours include, but are not limited to:
- Web violations (e.g. altered search results)
- Bookmark entries
- Download violations
- Intrusive pop-ups
- Pre-filled checkboxes during downloads
- A variety of recommendations for additional options
How to remove PUPs from Windows and Mac devices
Unlike removing viruses or Trojans, removing PUPs is not too difficult, although it can be time-consuming. Ideally, you should aim to protect yourself and your company beforehand. You can find out how to do this below. If you have (or suspect) that you already have PUPs on your computer, then you should proceed as follows:
Remove a PUP from a Windows PC
To find out which programs are installed on the PC, you need to go to the overview page of all programs. The way to get there is via the Control Panel and then click on Programs.
Then, select all the programs you want to uninstall. If you are unsure whether a specific program is necessary or not, enter the program’s name into a search engine to verify what it is.
Select the program you want to uninstall and click on the Uninstall button in the bar above. Now follow the instructions of the uninstall wizard to remove the software from your PC.
Removing a PUP from a Mac
To remove PUPs from a Mac, open Finder. In the left menu bar, you will find the internal hard drive of your Mac. This is labelled Macintosh HD by default.
Open the hard drive and then the Applications subfolder. Here you will find all the installed programs. Drag the ones you want to remove to the recycling bin in the dock. The program will be completely uninstalled. Then empty the recycle bin to free up the storage space.
Again, if you are unsure whether a program is necessary or not, check its functionality with the help of a search engine.
How can you protect yourself?
There are a few simple tips to follow to avoid unwanted programs or applications:
Be careful when installing
If you or employees are downloading software, take your time with the installation process. Read through everything carefully and remove any pre-set ticks if necessary.
Use advanced installation
For many programs, there is a choice between simple and advanced installation. During the installation process, it is often advised that the simple process is for people who are not familiar with computers. The advanced variant is therefore only made for experts or those with more advanced knowledge. However, this is just a marketing ploy. The simple installation includes many PUPs that can be deposited onto your PC. Whereas with the advanced installation, you can be more selective about the individual programs and applications.
Employee awareness
Educate your employees about what PUPs are and the possible consequences, especially regarding information security. Highlight what to look out for that would indicate the presence of PUPs. As part of your broader security strategy, work to instil a healthy distrust when it comes to downloading and setting up rules and instructions for installing software. This will save you a lot of time and trouble in the future.
Conclusion
Even though PUPs pose no threat to your computer's security, these unwanted programs can harm your system by allocating unnecessary disk space. Surprisingly, even when you buy a new PC, PUPs are usually included. For example, almost every new PC comes with virus software pre-installed, which should be activated if possible. PUPs can also cause problems because they can change existing default settings, which must be laboriously restored to their original state. Even though PUPs can usually be easily removed, it is still better to avoid installing them in the first place. This saves both time and resources.