Feeds

Sun Java piggybacks Microsoft searchbar, divorces Google

The old checked-by-default trick

High performance access to file storage

Sun is now distributing Microsoft's Live Search toolbar atop its Java Runtime Environment, after parting ways with Google's browserware.

According to Sun's press release, Internet Explorer users downloading Sun's JRE "have the option" of downloading the MSN toolbar too. But it's worth noting that the install-Microsoft-app button is checked by default. Sun automatically loads Redmond's browserware unless you specifically tell it not to.

"All our toolbar deals are opt-out - so MSFT toolbar will be opt-out as well. Box will be checked but user can decline to download it," a company spokeswoman told us.

That's right, Sun has a history of piggybacking additional software atop Java downloads, including its very own OpenOffice software suite and Yahoo!'s search toolbar for Mozilla's FireFox browser.

As you can see, the install-Yahoo!-app button is checked by default too:

Yahoo! and Sun Java

JRE piggybacks Yahoo!

And things work much the same way with OpenOffice.

This is isn't nearly as sneaky as Apple slipping its second-rate Safari browser onto PCs via its software updater. But it would be nice if Sun (and so many others) didn't play these games with naive netizens.

Sun wouldn't tell us how much Microsoft was paying the company to distribute the MSN toolbar. But you can bet it would pay a lot less if that box wasn't checked by default.

We commend Sun for eventually acknowledging that its MSN-atop-Java setup is opt-out. But we do find it amusing that so many companies like to play both sides of this issue. When we first discussed the Microsoft tie-up with Sun's Eric Klein - the man who announced that Sun would put Java on the Jesus Phone without checking Apple's anti-Java EULA - he insisted that Redmond's toolbar was opt-in only.

Until today, JRE also piggybacked Google's browser toolbar. But as it makes room for Redmond, Sun has divorced the Mountain View ad broker. Sun Java will attempt to install the MSN toolbar only if you're in the US and you have Internet Explorer installed. According to Sun, JRE was downloaded 525 million times over the past twelve months. And this number leaps by about 65 per cent each year. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.