How to check the extension using J2TEAM Extension Checker

Bank account hijacking, Gmail, Facebook, . most recently occurred because users accidentally installed fake extensions, containing malware to attack the system and steal personal information. Therefore, it is necessary to thoroughly examine the extensions before installing, especially check if the extension contains malware.

In response to this situation, the J2TEAM team released a tool to assist in scanning the extensions installed on the system, called Extension Checker. This tool provides two types of Desktop App that support checking on Windows and the extension installed from Chrome Store running Windows, Linux or Mac. The following article will guide you how to use J2TEAM Extension Checker in two different installation tools.

1. Chrome Extension Checker:

This is J2TEAM's Desktop App installed on Windows that checks the reliability of all the extensions you have installed on your computer.

Step 1:

First, download Chrome Extension Checker according to the link below.

  1. https://github.com/J2TeaM/chrome-extension-checker/releases/tag/v1.0.2

We will download Chrome Extension Checker as .rar to the computer.

How to check the extension using J2TEAM Extension Checker Picture 1

Step 2:

Next, users will proceed to extract the downloaded tool file .

How to check the extension using J2TEAM Extension Checker Picture 2

Step 3:

After the extract is complete, click on the Chrome Extension Checker tool to launch the program. The interface of Chrome Extension Checker will look like the image below. Above the Path to Extensions section will be the path of the default folder extension on the computer.

To conduct an extension scan, press the Start button.

How to check the extension using J2TEAM Extension Checker Picture 3

The result will immediately appear. If you receive the OK message as shown, the extension is installing safely for the system. If you notice Malware Extension or Fake IDM Extension, then you need to check the extension and proceed to remove it from the system, then quickly change all personal online account passwords.

How to check the extension using J2TEAM Extension Checker Picture 4

2. J2TEAM Extension Checker utility:

This utility will support more diverse than the above tool, because it can be installed directly from Chrome Store, running on Windows, Mac or Linux. In addition, the scanning speed of this utility is fast, especially allowing removal if a dangerous extension is found with just one click.

Step 1:

To download the J2TEAM Extension Checker utility, click on the link below.

  1. Download the J2TEAM Extension Checker utility

Step 2:

Then click the Add to Chrome button to install the extension.

How to check the extension using J2TEAM Extension Checker Picture 5

Finally click Add utility to complete the installation.

How to check the extension using J2TEAM Extension Checker Picture 6

Step 3:

To test the entire installation utility on the browser, click on the J2TEAM Extension Checker icon at the bottom of the access bar to the website address.

How to check the extension using J2TEAM Extension Checker Picture 7

Step 4:

A list of extensions currently installed on the system, along with the safety or danger status that the J2TEAM Extension Checker utility checks, in the Result column. Each add-on will include the latest version in use.

How to check the extension using J2TEAM Extension Checker Picture 8

If you receive dangerous results for the system, users can proceed to remove the extension, click the Remove button. Click Delete to remove the utility on the system.

How to check the extension using J2TEAM Extension Checker Picture 9

So with the Extension Checker utility from J2TEAM, we will know where the extension is safe for the system. From there, it is possible to quickly remove dangerous utilities, prevent the impact of sticks to the system.

Hope the above article is useful to you!

4 ★ | 1 Vote

May be interested

  • The fake IP method helps you access anonymouslyPhoto of The fake IP method helps you access anonymously
    in many previous articles, we have mentioned that it is very important to remain anonymous online. the private information leaked every year makes online security problems increasingly necessary. that is why we should use a virtual ip address. below, we will learn the methods to create fake ip offline!
  • 10 important Windows Group Policy settings need to be done immediatelyPhoto of 10 important Windows Group Policy settings need to be done immediately
    configure the 10 group policy below carefully and enjoy better windows security for your computer.
  • How to customize DNS in Windows 10?Photo of How to customize DNS in Windows 10?
    changing dns makes browsing the web faster, can overcome geographic limits to access the desired content. if you are using windows 10 then this is how to change dns for you.
  • Instructions for changing Google DNS 8.8.8.8 8.8.4.4Photo of Instructions for changing Google DNS 8.8.8.8 8.8.4.4
    dns google 8.8.8.8 8.8.4.4 is one of the many dns users choose to use, especially to speed up access to the network or access to blocked facebook.
  • How to change DNS Freenom World on WindowsPhoto of How to change DNS Freenom World on Windows
    dns freenom world is a new dns from freenom provider, which helps users to access web speed faster and access anonymously without saving history.
  • Create QR codes on computers with QRCode MonkeyPhoto of Create QR codes on computers with QRCode Monkey
    the qr code is probably too popular with many effects such as allowing wi-fi access without a password, searching for apps, ... if you don't want to download the app to create a qr code on your phone, you have you can do this on your computer using an online website. there are many applications that generate qr codes, but here we will use qrcode monkey.