A method and apparatus for detecting, curing and remedying invasive
software installation inadvertently, negligently, or intentionally
marketed by a vendor. A party may procure a product that sends back
invasive data to a source. A testing regimen may identify and defeat
sources of any invasive executables found. Accordingly, a party may
identify those software packages deemed invasive, and may optionally
provide a solution to either defeat or monitor them, where practicable.
An independent developer may obtain intellectual property rights in the
testing, solution or both of the counter-invasive software system or
product. An independent developer may become a supplier of testing or
solution systems, motivating a supplier by one of several mechanisms. The
developer or damaged party may obtain a legal status with respect to the
vendor or of a host of software as a customer, user, clients,
shareholder, etc., in order to exercise rights and remedies or provide
motivation to a vendor who does not take responsibility for its actions
as executed by its marketed products.