Clean Up Google Chrome from Pop-ups, Redirects, Ads (June 2017) - How to, Technology and PC Security Forum | SensorsTechForum.com

Clean Up Google Chrome from Pop-ups, Redirects, Ads (June 2017)

This post is created to help you clean your Google Chrome web browser from malicious browser extensions and other software that may poison it with various forms of ads or redirects.

Even though ransomware has seen the spotlight among malicious applications, adware developers have also not been sleeping. In fact the adware programs in 2017 are more sophisticated than ever and can be very difficult to be removed, especially from web browsers. They use malicious files and scripts taken from actual malware in order to remain persistent on your computer, even after you have removed an ad-supported application. This is why we have decided to create the following instructions which aim to help you clean up your computer completely. They are combined instructions from Google Support and some other help and support forums and all In combination make for the complete removal of any app that may be an obstacle to your computer and Google Chrome browser. Let’s begin!

How to Clean-Up Google Chrome Manually

Removing Unwanted Apps from Chrome in Windows

If you are using Google Chrome browser on Windows, you need to download a tool, called Chrome Cleanup Tool. It can be downloaded by clicking on the following web link.

1) Click on Accept and Download to download the tool and then click on the Run button to run it as an administrator:

2) After the tool is opened a scan should be ran in order to establish if there are any suspicious programs on Google Chrome. If so, the tool will clean the browser up, without you having to reinstall it and loose all your saved logins and other data.

Resetting Your Google Chrome Settings

Since the clean-up tool will finally redirect you to reset Google Chrome, there are few things that you should do first.

Before restarting Google Chrome browser to it’s stock state, it is very important that you backup all your saved logins and passwords in case you experience the issue of losing them which can cause you a lot of headaches. You can find your login passwords at Settings>Passwords and forms> Manage passwords (highlighted text in blue).

After having done the backup of your passwords you can reset Google Chrome to the state it was when you initially installed the web browser. This is achievable by following the steps below:

1) Open the More menu on your top right. (Three vertically arranged dots).
2) Click on Settings to open the options menu.
3) The the bottom of the options, click on the Show advanced settings highlighted text.
4) At the bottom again, you will find a header, called “Reset Settings”. On it, click on the Reset settings and then confirm it, by clicking on the “Reset” button.

How to Remove All Files and Objects Related to Adware on Your PC

Even though you may have cleaned up Google Chrome successfully, there are multiple objects which the app leaves behind. Those files or entries may reinstall the app, even after you have cleaned up your computer. Their usual locations are:

  • The Windows Registry Editor.
  • %AppData%
  • %Windows%
  • %System%
  • %System32%
  • %Temp%
  • %Local%
  • %LocalLow%

This is why, for complete removal, we strongly suggest you to use the removal steps below in order to remove the suspicious ad-supported programs permanently.

1.Fix registry entries created by ads and unwanted software on your PC
2. Remove ads and unwanted software with SpyHunter Anti-Malware Tool
3. Back up your data to secure it against attacks related to ads and unwanted software in the future

How to Protect Yourself in the Future

Cyber-crooks have become very smart in both developing viruses as well as methods of infection of users. Both home users and enterprises should beware and always apply the following advises to the PCs in their networks:

  • Make sure to use additional firewall protection. Downloading a second firewall (like ZoneAlarm, for example) is an excellent solution for any potential intrusions.
  • Make sure that your programs have less administrative power over what they read and write on your computer. Make them prompt you admin access before starting.
  • Use stronger passwords. Stronger passwords (preferably ones that are not words) are harder to crack by several methods, including brute forcing since it includes pass lists with relevant words.
  • Turn off AutoPlay. This protects your computer from malicious executable files on USB sticks or other external memory carriers that are immediately inserted into it.
  • Disable File Sharing – it is recommended if you need file sharing between your computer to password protect it to restrict the threat only to yourself if infected.
  • Switch off any remote services – this can be devastating for business networks since it can cause a lot of damage on a massive scale.
  • If you see a service or a process that is external and not Windows critical and is being exploited by hackers (Like Flash Player) disable it until there is an update that fixes the exploit.
  • Make sure always to update the critical security patches for your software and OS.
  • Configure your mail server to block out and delete suspicious file attachment containing emails.
  • If you have a compromised computer in your network, make sure to isolate immediately it by powering it off and disconnecting it by hand from the network.
  • Make sure to educate all of the users on the network never to open suspicious file attachments, show them examples.
  • Employ a virus-scanning extension in your browser that will scan all the downloaded files on your computer.
  • Turn off any non-needed wireless services, like Infrared ports or Bluetooth – hackers love to use them to exploit devices. In case you use Bluetooth, make sure that you monitor all of the unauthorized devices that prompt you to pair with them and decline and investigate any suspicious ones.
  • Employ a virus-scanning extension in your browser that will scan all the downloaded files on your computer.
  • Employ a powerful anti-malware solution to protect yourself from any future threats automatically.

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...