Basic knowledge you need to know before using free software
With the spread of smartphones and the ability to monetize mobile apps by collecting advertisements and personal information, the current free software that runs on Windows is Open SourceThere are many things developed by and paid trial versions, and security software has started to block adware as PUP/SUS, compared to a decade agoAdware , SpywareRisks such as are reduced.
Open source software
App inspection and protection
Although the number of free software that incorporates adware and spyware is decreasing, there is a possibility of tampering, so the downloaded installer and Zip file are VirusTotal Inspect at.

Overview and usage of VirusTotal
VirusTotal, a free tool for online file and website malware inspection, is run by Irish security vendor Chronicle Security Ireland Limited […]
VirusTotal can check for risks to installers and Zip files, but online types that download programs when the installation runs cannot detect threats.
Windows Defender
Windows Defender Has improved threat detection rates since around 10 when Windows 1703 (2017) was released. Avast-ESET-Kaspersky-Although it is comparable to major third-party security software such as Norton and implements heuristic technology to detect PUP / SUS and unknown threats,Opt-out adware, browser hijackers, etc. included in the installer are not blocked There are many cases.
Some free software still has adware built in, so be careful when setting up if you're using Windows Defender.
ESET Security apps such as PUA / SUS will detect if a third-party app is bundled and block the acquisition of the app.
Data integrity by checksum
Not limited to free software, files uploaded to the server are at risk of tampering and are not 100% safe to obtain from the official website, so some sites Checksum May be displayed.
If the hash value is different, the installer may be missing, virus infected, or the file may have been tampered with.
The hash value is 7-ZIP , Folder Size ExplorerYou can check it with.

7-Installing and using Zip
Open source multi-functional file archiver that can also get checksums and edit archive files 7-Zip is an open source file archiver developed by Igor Pavlov, File / For […]

Installing and using Folder Size Explorer
File Explorer to display the size of a folder Folder Size Explorer is a file explorer developed by Bazwise Technology of Australia, and the folder size and folder […]
Dangerous app
Adware is a way to monetize free software, and most apps can be opted out at the time of installation, so even if the installer contains adware, the app itself is not dangerous, but it fuels user anxiety and makes a paid version. Let me buy Rogue security tool And disguised as a program that is difficult to obtainTrojan horse There are also malicious apps such as.
Rogueware (Rogue Security Tool)

Malware type and overview
About the form and type of malicious software "malware" Malware is a portmanteau of Malicious softwere (malicious software), a virus, a worm, a Trojan horse, and a su […].
As with one-click scams and fraudulent billing scams, finger-moving content and illegal programs are at high risk, and rogueware increases exposure with ads to gain credibility and forges user ratings to avoid it. Requires user attention and risk prediction capabilities.
ル プ リ の イ ン ン ス ト ル ル
The app is provided as an installer or a Zip file, and if provided at the same time, the Zip file is often a portable version that does not require installation.
ア ー キ テ ク チ ャ
32-bit can process 2 to the 32nd power, 64-bit can process 2 to the 64th power at a time, and 1-bit Windows recognizes up to 32GB of RAM and a hard disk can only recognize up to 4TB. 2-bit supports up to 64 GB of RAM on Windows 10 Home, 128 TB on Pro, and HDDs up to 2 EB on GPT.
User Account Control (UAC)
Windows asks the user for permission as a security measure when performing operations that affect the stability of the system with the default settings. Promotion prompt Is displayed.
Promotion prompt In the dialog of the app Digital signature Information can be confirmed.
Programs without digital signatures are riskyAllow only trusted programs to runTo do.
Installer
The installer contains all the files needed for setup Offline installer And download the necessary programs when performing the installation Online installer There is.
The installer sets the storage location of the program, the components to be installed, etc. Setup wizard format However, recently, there are an increasing number of types that automatically perform installation without setting items like mobile apps.
ZIP file
If provided as a Zip file Archiver Use after decompressing with.
To decompress with standard Windows functions, select the Zip file from the context menu (right-click menu). Expand all .
User Experience Improvement Program – Anonymous Data Collection
Most software, both paid and free, has User experience improvement program As such, anonymous usage data collection is enabled by default and our privacy policy describes how we use collected data.
If there is no item to refuse to participate in the User Experience Improvement Program at the time of installation, the terms of use state that anonymous data will be collected, and it is necessary to disable it from the setting screen etc. after installation.
Run Adw Cleane
Adw cleaner is an American security vendor specializing in removing adware, spyware, PUPs/PUAs, etc. Malwarebytes Free software developed by.

Installing and using AdwCleaner
AdwCleaner is a stand-alone security app developed by the American security vendor Malwarebytes, which is an essential security tool for using free software. AdwCleaner […]
You don't need to install it and you can use it just by launching the downloaded executable file, so run the latest version of Adw Cleaner after installing the free software.
Uninstall
An app installed using the installer may be an uninstall feature implemented by the app or Windows. Programs and features Uninstall using, butFiles larger than 100 MB remain undeleted in some apps even after uninstalling.
Windows Programs and features There are fewer junk files left undeleted using the uninstaller implemented by the app than.
If you want to reduce junk files when uninstalling as much as possible Revo Uninstaller Such as Uninstall support app To use.

Installing and using Revo Uninstaller
Revo Uninstaller, a popular uninstall support app that detects and deletes files left after uninstalling, is an uninstaller developed by Bulgarian software vendor VS Revo Group […]
Beta and stable (stable)
Free software may be available in stable, beta, and in some cases alpha.
A version with the bug fixed, usually a stable version released,
Beta version
It is a trial version before the official release, and is provided for the purpose of discovering hidden bugs.
α version
A test version for developers to check functions etc. at the beginning of development.
Upgrade to paid version
Most of the free software provided as a trial version can use only basic functions, and upgrading to the paid version will greatly improve usability.
Currently, select the renewal period from 1 month, 1 year, 2 years, etc. at the time of purchase Subscription type Is the mainstream, and the purchase-out type is displayed as the lifetime version or the indefinite version.
You can always use the latest version of the app and get support, but your subscription is often set to auto-renew, so if you want to stop using the app, you need to cancel the auto-renewal of your subscription. be.
Buy-out type
Payment is only at the time of purchase, and the purchased app can be used indefinitely, but the version upgrade is only a minor version upgrade (Ver 3.4 → 3.5), a major version upgrade (Ver 3.5 → 4.0) is not possible, and support is also after purchase. Often set for one year.
The subscription type asks how to cancel the subscription before making a purchase.
Payment is made with a credit card, but if there is concern about unauthorized use, use PayPal or a prepaid card.

Introducing and using PayPal
Founded in 1998, PayPal, a pioneer of Fintech, is an online payment agency service originating in the United States and has a solid support system. ]
Related article

Proton account password reset and data recovery
Password reset and data recovery procedures used with Proton Mail and ProtonVPN The password set in your Proton account recovers encrypted and stored data such as messages and contacts […].

Security and benefits of using VPN services
Benefits of using a VPN service and indicators when selecting a VPN provider Using a VPN service offers the benefits of secure communication, concealment of communication content, and anonymization of communication, and the location of the connection source by specifying a connection server. […]

How to use Windows 11 with Oracle VirtualBox
Secure Boot-Install Windows 2.0 on VirtualBox that does not support TPM11 Oracle VM VirtualBox does not support Secure Boot and TPM2.0, so Window […]

How to purchase a Leawo product and register a license code
Introducing Leawo's sale information, purchase procedure and license registration method Leawo is a brand of multimedia tools developed by software vendor Moyea Software based in Shenzhen, China, China […]

How to save videos from video streaming services
How to Save Amazon Prime Video and Netflix Content to Video Files When using video streaming sites such as Amazon Prime Video and Netflix, the titles I intended to watch later disappear […]