Feeds

Dell cleans up crapware

No I don't want to register any E-Monkey Assistants DAMN IT!

Internet Security Threat Report 2014

Dell's tradition of shoveling bloatware into newborn PCs may be coming to a close. All it took was a few years of outrage.

Previously, only Dell XPS systems had the privilege of shipping with a "no software preinstalled" option. But vigilant e-coniptions on Dell's IdeaStorm feedback site has prompted Dimension desktops and Inspiron notebooks to join the party.

Customers who configure either system on Dell.com can now choose to forgo unhappy hours of removing unwanted "productivity," ISP, media software such as QuickBooks Trial, NetZero Installers, Earthlink Setup, Wanadoo Europe Installer, Norton Ghost 10.0, MS Plus Photo Story 2LE, MS Plus Digital Media Installer, AOL US, AOL UK, MusicMatch Music Services, Corel Snapfire Plus SE, Yahoo! Music Jukebox, Roxio RecordNow, Sonic RecordNow Audio, Dell Search Assistant — and the rest of the gang.

But not all software gets cut by Occam's pre-configuration razor. Dimension and Inspiron systems will still ship with trial version of anti-virus software, Acrobat Reader and Google tools.

Dell says the reason for this is that customers expect to be protected by anti-virus from the get-go and tend to "pro-actively" select a subscription to security services. Acrobat reader is required to read electronic copies of system documentation and Google Tools...Well, they don't seem to have a good excuse for that one.

The company has also recently launched a software uninstall utility in the US for Inspiron and Dimension systems. Dell's Software Uninstall Utility comes pre-installed with computers to uninstall pre-installed software. Got that? Good.

Oddly, not even Dell's own program has the gumption to get it all. Dell's blog admits, "While today this does not remove all Dell-installed software on the system, we will continue to improve its functionality to ensure it meets customer's needs."

The uninstall program is currently not available for download, "because it is tailored to the software on the system." The rest of you will have remove unwanted software by hand — just like primitive man did. ®

Internet Security Threat Report 2014

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Will BlackBerry make a comeback with its SQUARE smartphones?
Plus PC PIMs from company formerly known as RIM
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
Soundbites: News in brief from the Wi-Fi audiophile files
DTS and Sonos sing out but not off the same hymnsheet
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.