reply to post by Now_Then
I'm what you might call a Windows OS expert, I've intimately used every version from 3.x-through-Windows 7
I can confirm that this is the correct way to remove the add-on in windows XP 32-bit; however, I have not tested this method on XP-64 or vista, but,
it is safe to say it will work..
The instructions in your post simply are steps to manually remove the registry entries for the add-on.
This would be comparable to what happens when you remove a program from the "Add/Remove Programs" menu, but normally this operation is automated.
No one should get any serious paranoia in regards to this, it does not open any back-doors like a Trojan, or Viruii do, it hasn't been exploited yet,
to my knowledge.
However, I removed it immediately myself.
Note:
This add-on would not, and will not have any type bearing or effect on your machines "speed".
Originally posted by Majorion
This is precisely why I DO NOT download any Microsoft updates. This is exactly why I quit doing so for years and have asked others to ignore
Microsoft as well.
They basically tell you that these are just standard security updates and bug-fixes, etc. But the truth is that its malicious, takes too much space,
and although I have no proof, but I wouldnt put it past MS throwing in spyware in the mix every now and then.
[edit on 5/6/09 by Majorion]
Majorion, I have heard this argument before, but, by not updating your windows OS, you are in a sense opening the door for much bigger problems & are
much more open to a, "security breach"
Buffer overflow exploits are the worst and can allow a "Remote" user to execute malicious code on your computer as if it were you sitting in front
of it..
The best way to lessen your security risk with Windows is to turn off unused services (from administrative tools menu > services) There are guides
that you can google. This method will also free up system memory & CPU Cycles and will in most cases boost your PC's performance.
Also an up-to-date firewall program of course helps, preferably one that can intercept "invisible", or "Ghost" Connections.
I would suggest (as a free prog) Comodo Firewall.
Any Specific questions - feel free to u2u or reply here & I'll help the best I can
-CosmicClearance
[Edit to add content]
[edit on 7-6-2009 by CosmicClearance]
[edit on 7-6-2009 by CosmicClearance]