Text Keeper browser extension
Text Keeper is a malicious browser extension forced by savetextnotes.com. The Text Keeper browser extension for Google Chrome is installed by adware and might replace your default homepage and search engine.
The Text Keeper browser extension for Google Chrome has ID: oolahbkehogdohajhebgdfccmlbekkc and starts showing displaying advertisements and redirect as soon as Text Keeper in installing as a browser extension.
Text Keeper will redirect your browser to intrusive ads, such as Warning Malware Detected scams, Doubledeepclick rogue advertisement networks or install more adware onto Windows 10 for example. You should remove the malicious Text Keeper browser extension ASAP form your computer to prevent new adware from infecting your computer even more.
Text Keeper adware infection?
Adware uses a deceptive technique to enter the computer, this technique is called bundling. Software that uses “bundling”, is software known as “Pay-Per-Install” (PPI) or “monetization” software installers. This is installation software where software developers get paid for every install.
The process of the Pay-Per-Install software does not directly disclosure the adware present, it’s hidden by a human psychology trick named Dark Patterns. These Dark Patterns are used to make sure people click through their PPI installation process without noticing what they actually install on their computer.
There is, however, a very small button that might disclosure the presence of the additional adware. Despite that small button, a lot of people do not see the button as they click the Next button to install their desired software.
How to avoid pop-up redirects and the Text Keeper browser extension?
To avoid adware and their Text Keeper pop-up redirect advertisements. Do not click too fast on the Next button during installation of any software installation.
Instead, read what you actually install. Click every button to see if it exposes some form of an adware offer, especially a “custom”, “advanced”, “Expert” or “more” button. Adware is most of the time installed by the computer user itself. Overview the installation and uncheck all items you do not wish to install.
If the Pay Per Install (PPI) software installation has an EULA (end-user license agreement), read this EULA to find out what kind of software is offered during installation. It may prevent adware from installing by deselecting or uncheck Adware and Potentially Unwanted Programs (PUPs).
Personal information is information that is unique to you (such as your name, address, e-mail address, telephone number and credit card number). We may collect such personal information from you via our service. Because protecting your information is important to us, we do not sell any personal information to third parties.
Information Automatically Logged
Our systems may automatically log certain non-personal information such as your IP address to help diagnose problems with our servers, to help administer our service or to perform analysis in order to maintain, protect and improve our services.
We will take commercially reasonable measures in providing secure transmission of your personal information before it is transferred across the Internet from your personal computer to our servers and in securing such personal information stored on our systems. However, you should be aware that there is always some risk involved in transmitting information over the Internet and that there is also some risk that others could find a way to thwart our security systems. As a result, while we strive to protect your personal information, we cannot ensure or warrant the security and privacy of personal information you transmit to us, and you do so at your own risk.
This site may contain links to other sites that are not under our control. These sites have their own policies regarding privacy, which you should review before using them. We bear no responsibility for linked websites and provide these links solely for your convenience and information.
Use of Website by Children
Our website is intended for the general audience and is not directed to children under the age of 13. Children under the age of 13 may not use our website.
We respect the privacy of parents and children and are committed to complying with the Children’s Online Privacy Protection Act (COPPA). If a parent believes that his or her child has submitted personal information to us, he or she can contact us via e-mail or postal mail as listed below. We will promptly delete the information upon learning that it relates to a child under the age of 13.
Remove Text Keeper browser extension – Get rid of Text Keeper
Use this quick menu to easily follow the steps to successfully clean your computer from adware, potentially unwanted programs, any viruses, and spyware.
Uninstall Adware, Text Keeper or Potentially Unwanted Programs
In this first step, we show you how to detect and manually uninstall adware and potentially unwanted programs responsible for the Text Keeper pop-up redirect. Both adware and potentially unwanted programs leave traces.
After you have uninstalled any adware or potentially unwanted programs, perform an anti-malware scan with our recommended removal tools to remove any traces from your computer.
Check the installed applications list for recently installed malware applications.
SearchAwesome, MultiTimer version 1.0, ShutdownTime version 1.0, PC Speed UP Pro, System Healer, BlockAdsPro, FolderShare, ProxyGate, MiniCalc, Runbooster, Shadowsocks version 1.0, VidSquare, S5M, AnonymizerGadget, Toolbars, Lightning, La Cie Public version 1.0, 184.108.40.206, Internet Speed Tester, WebDiscover Browser, NativeDesktopMediaService, System Table
Select the software application from the list and click the Uninstall button.
Click the column "Installed On" to sort recently installed software applications by date, sorting the software applications by installation date makes it easier for you to detect recently installed applications.
If you don't know what to look or need help to remove the malicious software,
Remove Text Keeper redirects and Text Keeper Browser Extensions from IE, Chrome, Firefox
In this first step, we show you how to manually remove adware from your browser and how to reset the browser to default settings.
If after this step, there are still problems with a hijacked homepage or Text Keeper advertisements in your browser, perform a malware scan with our recommended malware removal tools.
- Internet Explorer
- Google Chrome
- Microsoft Edge
select the wrench button, and from the menu select "Manage add-ons".
Check the add-ons list for any suspicious Browser Helper Objects, remove unwanted suspicious add-ons using the Remove or Disable button. If the button is grayed out, scan your computer with malware removal tools to remove the malicious add-on.
Reset your default Homepage and Search engine for Internet Explorer
The Internet Explorer has the option to reset to default. However, resetting your browser settings will affect your saved bookmarks and passwords.
select the wrench button and from the menu select "Internet Options".
Select "Advanced" from the tab menu, Click the Reset button.
Check "Delete personal settings" and click the Reset button.
Restart Internet Explorer for the changes to take effect.
Good, Internet Explorer is reset to the default configuration, it is important to know there are virus remnants on your computer. We recommend to scan and remove the virus files from your computer. Make sure the virus does not reinstall, and all remnants are removed from your PC.
Click the menu button, from the Chrome menu click More tools and then Extensions.
Search for any unknown browser extension(s) from the list and remove them by using the Remove button.
Remove any browser extension that you do not know is very important.
Remove "installed by enterprise policy" from Chrome
When a Chrome setting or browser extension is disabled because the setting is "installed by enterprise policy" you can use the instructions below to enable the setting and remove it. Right click the start button, click Run, type: cmd.exe
Enter the following command's one byline and press enter after each line to execute the command.
rd /S /Q "%WinDir%\System32\GroupPolicyUsers"
rd /S /Q "%WinDir%\System32\GroupPolicy"
Now try to remove the extension of blocked "Installed by enterprise policy" setting from Chrome.
Reset the Google Chrome profile sync
Google Chrome synchronizes the browsers user-profile with their Google Cloud services. If the Google Chrome browser is infected with adware, this adware, usually browser extensions, the homepage and search engine settings are synced with Google's servers.
It is important to clean this synchronized cache. If the user doesn't clear the synchronized cache, the adware, browser extension and settings keep coming back on any devices the Chrome user profile is synchronized with.
- Open your Google Dashboard (opens in a new browser window).
- Click Reset sync to clear all of your synced data on Google's server.
- Click OK.
Reset your default Homepage and Search engine for Google Chrome
Chrome has the option to reset to default settings, a Chrome browser reset will not affect your saved bookmarks and passwords.
Click the menu button, from the menu click Settings.
Scroll down to Advanced and again scroll down to Reset settings.
Click the Reset button to reset Google Chrome.
Confirm the reset of the Chrome web-browser by clicking the Reset button.
Restart Google Chrome for the changes to take effect.
Google Chrome is reset to default settings, it is important to know there are remnants of malware on your computer. We recommend to scan and remove malware files from your computer to make sure the malware does not reinstall and the malware is entirely removed from your PC.
Click the Firefox menu button, from the menu click on Add-ons.
Select Extensions from the left menu. Search any unknown Firefox browser extension and remove the extension using the Remove button.
Reset your default Homepage and Search engine for Firefox
The fastest and easiest way to reset your default homepage and the search engine is by resetting Firefox to default settings.
Click the menu button, from the menu, select Help ? (the question mark icon, at the end of the menu).
Click on Troubleshooting information from the Help menu.
select the Refresh Firefox button and confirm the Refresh Firefox dialog once again to Reset Firefox to default settings.
Click Finish, Firefox will restart.
The Firefox browser is reset to default settings, it is important to know there are remnants of malware on your computer. We recommend to scan and remove malware files from your computer to make sure the malware does not reinstall and the malware is entirely removed from the Firefox web-browser and PC.
Right-click the start button in Windows 10, from the start menu top click Apps and Features.
Scroll down through the right Apps and Features list till you see Microsoft Edge, click Advanced options.
Click on the Reset button to reset Microsoft Edge to default settings. Microsoft Edge reset will clear the browsing history, cookies, and settings not the Edge favorites.
The Microsoft Edge web-browser is reset to default settings, it is important to know there are remnants of malware on your computer. We recommend to scan and remove malware files from your computer to make sure the malware does not reinstall and the malware is entirely removed from the Microsoft Edge web-browser and PC.
Remove Adware responsible for the Text Keeper redirect/ads with Malwarebytes
Malwarebytes is the most powerful anti-malware solution to detect and proactively remove adware, browser hijackers from the web-browser and viruses including potentially unwanted programs from your PC. Malwarebytes works excellently alongside antivirus software without any conflicts. Malwarebytes is by far the best malware detection and malware removal tool available today.
- Start the Malwarebytes installation setup file. Click here for detailed Malwarebytes installation instructions.
- Click Scan Now to start searching for malware on your PC.
- Malwarebytes will start searching for malware on your PC.
Wait for Malwarebytes to finish the malware scan. The Malwarebytes malware scan usually takes between 2 to 5 minutes to complete.
- Once the malware scan is completed, Malwarebytes will display the results of the malware scan.
In order to remove the found malware on your PC, click the Quarantine Selected button.
- All found malware will be moved to quarantine. Malwarebytes requires a reboot to successfully complete the malware removal process.
- Restart your PC.
- After the restart, all the malware detected by Malwarebytes is moved to quarantine.
Your PC is clean from malware!
Remove Text Keeper pop-up traces with AdwCleaner
- Right-click the AdwCleaner executable you just downloaded and select "Run as Administrator" this is important.
- Select the Scan Now button.
- Wait for the adware & malware scan to finish.
- Click the Clean & Repair button to remove the adware and malware from your PC.
- Wait for AdwCleaner to remove the adware and malware from your PC.
- Click the Clean & Restart Now button to finish the malware removal process.
- After the reboot, AdwCleaner shows a summary of the detected and removed malware files.
Clean your Browser from the Text Keeper redirect with Zemana
- Open the Zemana Anti-Malware installer
- Install Zemana Anti-Malware using the default settings
- Zemana Anti-Malware will update itself
- Select the Scan button to perform a malware scan
- Wait for the scan to finish, it takes a few minutes.
- Select the Next button to remove the malware found on your computer
- That's it. All malware is successfully removed from your computer.
Optimize your device, get rid of junkware