An Unwanted Program Running On A Computer Is Called A

Author clearchannel
7 min read

Anunwanted program running on a computer is called a potentially unwanted program (PUP) or, more broadly, malware. These terms describe software that executes on a system without the user’s informed consent and often performs actions that degrade performance, compromise privacy, or open the door to further threats. Understanding what constitutes an unwanted program, how it infiltrates machines, and how to defend against it is essential for anyone who uses a computer—whether for work, study, or leisure.

What Makes a Program “Unwanted”?

A program becomes unwanted when it exhibits one or more of the following characteristics:

  • Installed without clear permission – The user did not intentionally agree to its installation, or the consent was obtained through deceptive tactics.
  • Performs hidden or undesirable actions – It may display ads, collect personal data, alter browser settings, or consume system resources.
  • Difficult to remove – Many unwanted programs embed themselves deep in the operating system, resist standard uninstall procedures, or reinstall after removal.
  • Potentially harmful – While not all unwanted programs are outright malicious, they can create vulnerabilities that more dangerous malware can exploit.

The cybersecurity community distinguishes between malware (software designed with malicious intent) and PUPs (programs that may be legal but are still undesirable). Both fall under the umbrella of unwanted programs because they run on a computer without the user’s full awareness or approval.

Common Types of Unwanted Programs

Category Typical Behavior How It Spreads
Adware Injects advertisements into browsers, redirects search results, tracks browsing habits. Bundled with free software, malicious ads, fake update prompts.
Spyware Secretly monitors keystrokes, captures screenshots, logs credentials, and sends data to remote servers. Phishing emails, drive‑by downloads, compromised websites.
Ransomware Encrypts files or locks the system, demanding payment for restoration. Malicious email attachments, exploit kits, compromised Remote Desktop Protocol (RDP).
Trojans Masquerade as legitimate software while opening backdoors for attackers. Fake software cracks, pirated media, social engineering.
Worms Self‑replicate across networks, consuming bandwidth and potentially delivering payloads. Network vulnerabilities, removable drives, email propagation.
Botnets Turn infected machines into “zombies” that obey a command‑and‑control server for spam, DDoS, or mining. Often installed via Trojans or exploit kits.
Potentially Unwanted Programs (PUPs) Includes toolbars, browser extensions, system optimizers, and trialware that nag for purchases or change settings. Software bundles, deceptive download buttons, misleading ads.

Although the intent behind each type varies, the end result is similar: an unwanted program running on a computer that the user did not explicitly want and that may harm system integrity or personal privacy.

How Unwanted Programs Gain Access

Understanding infection vectors helps users spot risky behavior before it leads to compromise.

  1. Software Bundling – Free utilities often bundle additional offers. During installation, users may overlook checkboxes that agree to install toolbars, adware, or trial versions.
  2. Deceptive Advertising – Fake “Download” or “Update” buttons on shady websites trick users into downloading executables that contain unwanted payloads.
  3. Phishing and Social Engineering – Emails that appear to be from trusted sources contain malicious attachments or links that, when opened, drop malware onto the system.
  4. Exploit Kits – Compromised or malicious websites scan visitors for outdated plugins (e.g., Flash, Java) and automatically install malware if a vulnerability is found.
  5. Removable Media – USB drives infected with autorun scripts can execute unwanted programs when plugged into a computer.
  6. Peer‑to‑Peer Networks – Files shared via torrents or direct‑connect platforms frequently hide malware inside popular movies, games, or software cracks.

Symptoms of an Unwanted Program Running

Detecting an unwanted program early can limit damage. Common signs include:

  • Slow performance – Programs consuming CPU, memory, or disk I/O cause noticeable lag.
  • Unexpected pop‑ups – Ads appearing outside the browser, especially on the desktop or within legitimate applications.
  • Browser changes – Homepage, default search engine, or new‑tab page altered without user consent.
  • Unfamiliar toolbars or extensions – New items appear in the browser toolbar that the user did not install.
  • Increased network activity – Unexplained data uploads/downloads, often visible in task manager or resource monitor.
  • Security warnings – Antivirus or firewall alerts about suspicious processes or outbound connections.
  • Disabled security tools – Some malware attempts to turn off antivirus updates or firewall rules to maintain persistence.

If any of these symptoms appear, it is prudent to investigate further.

Risks Posed by Unwanted Programs

Even programs that seem merely annoying can have serious consequences:

  • Data theft – Spyware and keyloggers harvest login credentials, financial information, and personal identifiers.
  • Financial loss – Ransomware demands payment; adware may lead to fraudulent purchases via deceptive offers.
  • System instability – Poorly coded unwanted programs can crash applications, corrupt files, or cause blue‑screen errors.
  • Network abuse – Bot‑infected machines can be used to launch distributed denial‑of‑service (DDoS) attacks, affecting other users and services.
  • Legal and compliance issues – Organizations may violate data protection regulations if employee machines leak sensitive data due to unwanted software.
  • Secondary infections – Many unwanted programs open backdoors that allow more dangerous malware to infiltrate the system later.

Detecting and Removing Unwanted Programs

A layered approach works best: use reliable security tools, practice manual inspection, and maintain good hygiene.

1. Run a Full System Scan

  • Antivirus/anti‑malware suites – Modern solutions detect known malware signatures and heuristic behaviors associated with PUPs.
  • Specialized scanners – Tools like Malwarebytes, AdwCleaner, or HitmanPro focus on adware, spyware, and browser hijackers that traditional antivirus might miss.

2. Check Installed Programs

  • On Windows: Settings → Apps → Apps & features → sort by installation date and look for unfamiliar entries.
  • On macOS: Applications folder → review recently added apps.
  • On Linux: review packages via dpkg -l or rpm -qa and check for unknown services.

3. Inspect Browser Extensions

  • Open each browser’s add‑ons/extensions page and disable or remove anything not recognized.
  • Reset browser settings to default if homepage or search engine

##Inspecting Browser Settings and Resetting

Continuing the inspection process, browser settings often require attention. Navigate to each browser's settings menu and review:

  1. Home Page: Ensure it's set to a trusted, user-defined location, not an unfamiliar site.
  2. Search Engine: Verify it's a legitimate, well-known provider (e.g., Google, Bing, DuckDuckGo) and not a suspicious alternative.
  3. New Tab Page: Confirm it opens to a familiar, useful page (like your homepage or a custom new tab) rather than an ad-filled portal.
  4. Saved Passwords & Autofill Data: Review stored credentials. Unwanted programs often harvest this information. Delete any suspicious entries.
  5. Clear Cache and Cookies: This removes temporary files and tracking data accumulated by unwanted software. Access this via browser settings or the "More Tools" menu.

Resetting Browser Settings: If unwanted changes persist or are pervasive, a full browser reset is often necessary. This restores settings to their default state, removing extensions, search engines, and home pages installed by PUPs. Caution: This will also remove your custom settings and extensions. Ensure you have your important bookmarks and saved passwords backed up first. Most browsers offer a "Reset settings" option within their advanced settings menu.

Maintaining Vigilance and Prevention

Detection and removal are crucial, but prevention is paramount:

  • Source Awareness: Download software only from official vendor websites or reputable app stores. Avoid pirated software, cracked games, or files from untrusted peer-to-peer networks.
  • Careful Installation: Always opt for the "Custom" or "Advanced" installation option during software setup. Deselect any pre-checked boxes for bundled toolbars, adware, or additional programs you don't want. Pay close attention to the list of items being installed.
  • Regular Scans: Schedule regular full system scans with your primary antivirus/anti-malware suite and supplement with periodic scans from dedicated tools like Malwarebytes or HitmanPro.
  • Software Updates: Keep your operating system, web browsers, and all installed software (especially security tools) up-to-date. Updates often patch vulnerabilities exploited by malware and remove known PUP signatures.
  • User Education: Be cautious of free downloads, suspicious email attachments, and phishing links. Educate yourself and others about common PUP tactics.

Conclusion

Unwanted programs (PUPs) are more than mere nuisances; they represent a significant security and privacy threat. Their insidious nature often manifests through altered browser settings, unfamiliar toolbars, unexplained network activity, and security warnings, potentially leading to severe consequences like data theft, financial loss, system instability, and network abuse. While detection relies on a combination of reliable security software, manual inspection of installed programs and browser extensions, and resetting settings, effective mitigation demands a proactive stance. By exercising extreme caution during software installation, sourcing applications responsibly, maintaining rigorous update schedules, performing regular scans, and fostering user awareness, individuals and organizations can significantly reduce their vulnerability to these pervasive threats. Vigilance and good digital hygiene are the most effective defenses against the persistent danger posed by unwanted programs.

More to Read

Latest Posts

You Might Like

Related Posts

Thank you for reading about An Unwanted Program Running On A Computer Is Called A. We hope the information has been useful. Feel free to contact us if you have any questions. See you next time — don't forget to bookmark!
⌂ Back to Home