{"id":13400,"date":"2016-11-04T09:00:13","date_gmt":"2016-11-04T13:00:13","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=13400"},"modified":"2019-11-15T13:46:32","modified_gmt":"2019-11-15T11:46:32","slug":"tip-software-deletion","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/tip-software-deletion\/13400\/","title":{"rendered":"Tip of the week: How to delete unwanted programs"},"content":{"rendered":"<p>The latest version of <a href=\"https:\/\/www.kaspersky.co.za\/plus?reseller=en-za_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a> can <a href=\"https:\/\/www.kaspersky.co.za\/blog\/application-manager-tip\/13063\/\" target=\"_blank\" rel=\"noopener noreferrer\">block the installation of unwanted programs<\/a> \u2014 and remove software that has already sneaked onto your system. It analyzes the list of installed programs and detects unwanted, problem-plagued software.<\/p>\n<p>Programs are rated by their behavior. Trying to scare users into downloading something unnecessary or dangerous \u2014 \u201cAlert! Your computer is infected with Super Worm! Click here NOW to buy Windows Antivirus!\u201d \u2014 gets a program onto the \u201cmisbehaving\u201d list. Other common offenses include secretly installing other software, refusing to close, and showing pop-ups without users\u2019 permission. Programs that hide themselves from the uninstall list also receive penalty points.<\/p>\n<p>Software that has critical vulnerabilities, and whose developers have let known bugs go, will also be recommended for removal. Software vulnerabilities are quite serious; such programs put your whole system at risk.<\/p>\n<p>To scan your system for misbehaving programs and generate a list of unwanted software, follow these directions.<\/p>\n<p>1. Open Kaspersky Internet Security. Choose <b>More functions<\/b> \u2014&gt; <b>Software Cleaner<\/b>.<\/p>\n<p>2. Start the analysis of installed applications.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/11\/06021236\/software-deletion-01_en.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13401\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/11\/06021236\/software-deletion-01_en.png\" alt=\"Tip of the week: How to delete unwanted programs\" width=\"700\" height=\"521\"><\/a><\/p>\n<p>3. Click the link near the triangle icon with the exclamation mark to view the list of detected software. Each name in the list will have an explanation of why the program is considered undesirable.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/11\/06021233\/software-deletion-02_en.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13403\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/11\/06021233\/software-deletion-02_en.png\" alt=\"Tip of the week: How to delete unwanted programs\" width=\"700\" height=\"521\"><\/a><\/p>\n<p>4. You can uninstall the flagged software \u2014 or, if you like a program and want to keep it, click the <b>Hide<\/b> button to add it to the exception list.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/11\/06021231\/software-deletion-03_en.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13404\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/11\/06021231\/software-deletion-03_en.png\" alt=\"Tip of the week: How to delete unwanted programs\" width=\"700\" height=\"521\"><\/a><\/p>\n<p>You can read more about software removal in our <a href=\"http:\/\/support.kaspersky.com\/13128?utm_expid=119644000-30.y3G5eKAmSvCfBBeZ2T4K6Q.1&amp;cid=blog&amp;utm_source=blog.kaspersky.ru&amp;utm_medium=social&amp;utm_campaign=maria_kr_on_blog&amp;utm_content=software_cleaner%2520_ru\" target=\"_blank\" rel=\"noopener noreferrer\">Knowledge Base<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Internet Security can analyze your system, detect unwanted programs and offer to uninstall them \u2014 and it works even on programs that resist removal. <\/p>\n","protected":false},"author":668,"featured_media":13402,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,9],"tags":[1852,1853,572,1870,180,522,1869],"class_list":{"0":"post-13400","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"category-tips","9":"tag-advice","10":"tag-tips","11":"tag-adware","12":"tag-bloatware","13":"tag-kaspersky-internet-security","14":"tag-products-2","15":"tag-software-removal"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/tip-software-deletion\/13400\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/tip-software-deletion\/5675\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/tip-software-deletion\/3994\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/tip-software-deletion\/7981\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/tip-software-deletion\/7908\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/tip-software-deletion\/7928\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/tip-software-deletion\/9496\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/tip-software-deletion\/9298\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/tip-software-deletion\/13547\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/tip-software-deletion\/2701\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/tip-software-deletion\/13400\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/tip-software-deletion\/6287\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/tip-software-deletion\/6716\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/tip-software-deletion\/5631\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/tip-software-deletion\/9170\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/tip-software-deletion\/13162\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/tip-software-deletion\/13547\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/tip-software-deletion\/13400\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/products-2\/","name":"products"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/13400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/668"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=13400"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/13400\/revisions"}],"predecessor-version":[{"id":24226,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/13400\/revisions\/24226"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/13402"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=13400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=13400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=13400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}