Google 2084

Last night I noticed that Google took the liberty of installing a Google Update Daemon on my computer. I did a quick check of my Applications folder but noticed that there were no Google applications even running on my computer. The only google related software installed is excellent 3rd party Reader Notifier to keep in sync with the Google RSS Reader.

While searching my computer to see if anything Google related was still installed (other than the Google Update Daemon), I came across this Google 2084 shot:

google2084.jpg

In case you haven’t seen Terminator II recently, this part might bring back some memories.

By the time Skynet became self-aware it had spread into millions of computer servers across the planet. Ordinary computers in office buildings, dorm rooms; everywhere. It was software; in cyberspace. There was no system core; it could not be shutdown. The attack began at 6:18 PM, just as he said it would. Judgment Day, the day the human race was almost destroyed by the weapons they’d built to protect themselves. I should have realized it was never our destiny to stop Judgment Day, it was merely to survive it, together. The Terminator knew; he tried to tell us, but I didn’t want to hear it. Maybe the future has been written. I don’t know; all I know is what the Terminator taught me; never stop fighting. And I never will. The battle has just begun.

pastedGraphic.png

If you just want to remove the Google Update Daemon, then you’ll want to run:

sudo launchctl unload -w /Library/LaunchDaemons/com.google.keystone.daemon.plist
sudo rm -fR /Library/Google
sudo rm /Library/LaunchAgents/com.google.keystone.agent.plist
sudo rm /Library/LaunchDaemons/com.google.keystone.daemon.plist

11 thoughts on “Google 2084”

  1. USB Encryption Program increase in the usage of small, large capacity flash drives, the possibility of very sensitive information to be lost or stolen has become a serious threat! How can you protect our from cyber criminals, loss, or theft? idoo USB encryption will probably be your best choice.This software can assist you to guard our data.

  2. Whole Disk Encryption Each day, millions of people go to online to work, do homework, purchase products, manage devices in their homes, and connect with friends. Technology such as the big information are modifying our everyday life at a quick speed, while exponentially increasing the quantity of private data that is attained, used, and shared.

  3. Nice article, If you would like set the access authorities for those files or programs, such as, to hide or lock them, to deny copy or delete etc, and likewise want to monitor their utilization, the File Encryption will probably be your best choice.

Leave a Reply

Your email address will not be published. Required fields are marked *