Banish The Bloat: Getting Rid Of The Junk That Your Computer Came With

Bloatware: the unnecessary, storage-consuming software that comes preloaded on your computer. Bloatware is unwanted and takes up valuable space on your hard drive while making your computer run slower than it needs to. Some pre-installed software, like Lenovo’s Superfish, even had the potential to compromise the security of the device. Fortunately, Lenovo will no longer be installing Superfish or any other bloatware on their computers, according to Bit-Tech.

However, not all PC makers will follow in Lenovo’s footsteps because there’s big money in bloatware. According to PC World, the ever-lowering prices of computers causes PC vendors to make very little money on each computer they sell. To compensate for the loss of profits on hardware, bloatware developers (such as anti-virus services, browser extensions, and ad-filled games) pay computer manufacturers for a spot on their devices. This actually lowers the overall cost of the computer for the consumer. While some of these programs are useful, most contribute to making your computer start up slower and run sluggishly.

So how does one banish the bloat? If you know for sure that a program is not necessary you can go to your Control Panel in Windows and click “uninstall a program.” From there, you can locate the programs you want to remove and simply uninstall them. Sometimes you will have to restart your computer after uninstallation. It’s best to do this immediately after purchasing your PC and before installing any of your own software.

You can also use a tool such as PC Decrapifier, which walks you through locating and uninstalling bloatware so your computer can run faster.

A last resort for removing bloatware is to reinstall Windows completely. If you are a computer novice, this is best left to the professionals, but if you know your way around a PC you can reinstall Windows using a new Windows disc or a version of Windows loaded on a USB. PC World has a great article that explains this process in detail.  

If you are still unsure, give cat-man-du a call and we will get rid of the bloat, whether you bought your computer from us or not.

Please follow and like us:

How To Spot An SMS Phishing Attack

SMiShing: SMS phishing. We’ve all heard of email phishing scams where an attacker sends a false email and “fishes” for financial information, login credentials, or other sensitive data. These phishing scams can also happen over text messages.

Criminals will send you an SMS or text message that leads you to a website that will ask you to put in your login credentials or other sensitive information, therefore stealing it. Or clicking on a link in the text will install malware on your device. This malware can basically hijack your phone, log your keystrokes, and perform a number of malicious attacks.

It sounds like an obvious plan that would be easy to detect, right? Who would fall for that? SMS phishing attacks can be tricky, especially to those that are uninformed of the dangers. Because of  the personal nature of text messages, when a criminal sends a text directly to your phone, you will open it usually within 15 minutes of receiving it.

It might appear as if the text came from a friend, a retailer, your bank, and other trusted sources. Often the texts will say that you have won something or, according to, they will play on your fears such as fear of someone stealing your money, fear of being accused of a crime, or fear of harm to a loved one.

Last September, the occurrence of SMS phishing attacks more than tripled in the U.S, according to Cloudmark, a security firm. The U.S. region most prone to SMS phishing attacks is Odessa and West Texas, with 16.1% of the population being attacked at some time. This might be due to the rural, less tech-savvy population.

Here’s how you can avoid falling for a SmiShing scam. Avoid clicking links in text messages, no matter who the text came from. Ignore texts that ask you to “respond quickly” or respond with your sensitive, personal information. If a text appears to have come from a trusted source like your bank or a retailer, call that business directly. Be suspicious of strange numbers that don’t look like phone numbers. This could be criminals covering up their identity with email-to-text services. Turn on the “block texts from the internet” feature on your phone. Most of all, always be on your guard and think about what you are doing. It only takes half a second to click on a malicious link.

Please follow and like us: