A PUA / PUP (potentially unwanted application / potentially unwanted program) is a software that may be unwanted on the PC and sometimes comes bundled with freeware software. You can use the software at no additional costs, but it will display pop-ups or install a toolbar in the default browser changing the homepage or the search engine. Some of them will also run several processes in the background, slowing down the PC or will display numerous ads. These programs can be installed without your consent (also called adware) or will be included by default in the express installation kit (ad-supported). In order to avoid installing such PUA / PUP, you have to always install the main software by choosing the advanced/custom options. For security reasons, our product will detect such software, will warn you about its presence on the system, allowing you to take the action you want with that application. Antivirus Sniper will detect the application as PUA or PUP.
Here are the criteria used to classify a software as PUA or PUP:
Changing browser settings without consent
Small misleading information about performed actions
Missing uninstallation information
Threatening or scary messages
Distribution of other PUA applications
If you think that the detection was done in error, please email us at [email protected]
How would we distinguish possibly undesirable programming? Examining and classifying conceivably undesirable programming is a mind-boggling issue. Designers of possibly undesirable programming quickly develop their items. Some even contain a couple of attributes that look like real programming to cover the undesirable usefulness. It’s an ongoing procedure, and we endeavor to distinguish normal practices that help give you the most abnormal amount of insurance. Now and again, where the conduct is faulty, we will list the application regardless of whether it doesn’t perfectly fit into the recorded criteria. At the end of the day, we utilize our judgment. While we feature conceivably undesirable projects, you at that point settle on a decision in the prohibitions list and select what you need to keep or evacuate. Here are a portion of the criteria we use: prominent, misdirecting, or misleading promoting, marking, or inquiry rehearses utilizing pop-ups, pop-unders, promotion addition, advertisement overlays, promotion substitution intemperate or misleading appropriation, subsidiary or quit packaging rehearses which might incorporate SEO harming methods forceful or beguiling conduct particularly encompassing buying or authorizing, including utilizing associates and outsiders who utilize various strategies or methods to get clients to buy, than what is accessible from the maker’s site ridiculous, pointless, exorbitant, ill-conceived, or misleading changes of framework settings, security settings or setup (counting program settings and toolbars that bring no extra incentive over standard Operating System and authentic application settings) utilizing counterfeit installers for usually utilized programming, (for example, Adobe Flash Player) to push your item utilizing misrepresented discoveries, (for example, asserting temp documents, treats, vault sections, and so forth are hurtful) as panic strategies to get clients to buy utilizing specialized help trick strategies trouble uninstalling or evacuating the product prevalent negative input or evaluations from the client network when all is said in done harming or lessening end client experience different practices commonly acknowledged as riskware, scare ware, adware, greyware, or generally ordinarily undesirable programming by the client network To keep our investigation valuable, we routinely update our product with applications meeting our criteria. While we buckle down not to, here and there we fail to understand the situation. In the event that you need to present your application for reexamination, it would be ideal if you contact us. Generally, distributors of conceivably undesirable programming are not specialists. They are modern organizations with enormous spending plans and framework. Given this, new types of possibly undesirable programming habitually develop and multiply. To react speedily, we claim all authority to modify, grow and update our criteria without earlier notice or declarations.