50:: The Logger is used to log installations (e.g., log which files were added or changed, which registry entries were added or changed, etc. at the time of installation). This log is used when the user decides to uninstall the logged installation at later date (in that case, the log is "reversed" — i.e., the log is read, but opposite actions are taken in reverse order).
91:
After the release of Norton
Desktop for Windows 2.0, Ken Spreitzer, who was a tester for the product at Symantec, capitalized on the uninstall idea and wrote the first widely used PC program called "UnInstaller", initially licensed to MicroHelp and then by February 1998 sold by CyberMedia. MicroHelp
83:
Prior to about the 1990s, there was no such thing as an uninstaller, as most programs were simply stored on disk and/or tape, and a program was "removed" by simply erasing it. As operating systems and applications became more complex, mere deletion of a program might be inadequate or insufficient to
87:
Uninstall was invented by Jack Bicer. While he was working on Norton
Desktop for Windows at Symantec, Bicer came up with the Uninstall concept and developed the first Uninstall program in 1991. When published on March 23, 1992, Norton Desktop for Windows V.20 (see the official - README.TXT) was the
34:
Generic uninstallers flourished in the 1990s due to the popularity of shared libraries and the constraints of then-current operating systems, especially
Microsoft Windows XP. Declining storage costs and increasing capacity subsequently made reclaiming disk space less urgent, while end-user
68:: The Watcher watches running programs for installation programs (and usually offers to start the logger when such programs are detected). Usually, this works by watching the tasklist for any names that are commonly used by installation programs (e.g., SETUP.EXE, INSTALL.EXE, etc.)
98:
that the royalties he received from MicroHelp for
Uninstaller made him a millionaire by age 30. Tim O'Pry, while president of MicroHelp, substantially rewrote the code for Uninstaller version 2, which became a best-selling program.
31:. Uninstallers are useful primarily when software components are installed in multiple directories, or where some software components might be shared between the system being uninstalled and other systems that remain in use.
62:: The Analyzer is used to uninstall programs of which installation is not logged. In that case, the program analyzes the program and finds (and deletes, if the user decided to uninstall the program) all related components.
84:
remove the program in its entirety. Entries might be left behind in a system database such as a registry, it may have additional data files, configuration files, sample files, etc.
56:: The Uninstaller is used to reverse changes in the log. This way, the applications can be uninstalled because all changes that were made at the times of installation are reversed.
237:
278:
245:
35:
applications have increasingly relied on simpler installation architectures that consolidate all components to facilitate removal.
273:
27:, is a variety of utility software designed to remove other software or parts of it from a computer. It is the opposite of an
88:
first software package ever to include an
Uninstaller, shown under the "Uninstalling Norton Desktop" section.
283:
74:: Some uninstallers may also contain other related tools for clearing caches or removing unwanted files.
123:
94:
128:
113:
118:
197:
153:
148:
267:
171:
222:
92:
published
Spreitzer's program as Uninstaller version 1. In 1995, Spreitzer told
28:
108:
43:
Typical uninstallers contain the following components:
198:"Can firms start with low cost and instant customers?"
238:"Information Technology; Minds Behind the Product"
166:
164:
8:
157:. Vol. 5, no. 8. August 1999.
140:
7:
16:Software for removing other software
14:
196:Norman, Jan (January 12, 2009).
236:Lohr, Steve (March 27, 1995).
1:
300:
279:Package management systems
202:The Orange County Register
149:"Uninstalling Software"
274:Utility software types
223:"History of Uninstall"
172:"History of Uninstall"
72:Other tools (optional)
124:Should I Remove It?
60:Analyzer (optional)
242:The New York Times
95:The New York Times
66:Watcher (optional)
225:. March 23, 1992.
129:ZSoft Uninstaller
114:IObit Uninstaller
291:
258:
257:
255:
253:
244:. Archived from
233:
227:
226:
219:
213:
212:
210:
208:
193:
187:
186:
184:
182:
168:
159:
158:
145:
119:Revo Uninstaller
23:, also called a
299:
298:
294:
293:
292:
290:
289:
288:
264:
263:
262:
261:
251:
249:
248:on May 28, 2009
235:
234:
230:
221:
220:
216:
206:
204:
195:
194:
190:
180:
178:
170:
169:
162:
147:
146:
142:
137:
105:
81:
41:
17:
12:
11:
5:
297:
295:
287:
286:
281:
276:
266:
265:
260:
259:
228:
214:
188:
160:
154:SmartComputing
139:
138:
136:
133:
132:
131:
126:
121:
116:
111:
104:
101:
80:
77:
76:
75:
69:
63:
57:
51:
40:
37:
15:
13:
10:
9:
6:
4:
3:
2:
296:
285:
282:
280:
277:
275:
272:
271:
269:
247:
243:
239:
232:
229:
224:
218:
215:
203:
199:
192:
189:
177:
173:
167:
165:
161:
156:
155:
150:
144:
141:
134:
130:
127:
125:
122:
120:
117:
115:
112:
110:
107:
106:
102:
100:
97:
96:
89:
85:
78:
73:
70:
67:
64:
61:
58:
55:
52:
49:
46:
45:
44:
38:
36:
32:
30:
26:
22:
284:Uninstallers
250:. Retrieved
246:the original
241:
231:
217:
207:November 24,
205:. Retrieved
201:
191:
179:. Retrieved
175:
152:
143:
93:
90:
86:
82:
71:
65:
59:
53:
47:
42:
33:
24:
20:
18:
54:Uninstaller
25:deinstaller
21:uninstaller
268:Categories
135:References
39:Components
252:August 7,
181:April 15,
29:installer
109:CCleaner
103:See also
176:Septium
79:History
48:Logger
254:2015
209:2015
183:2023
19:An
270::
240:.
200:.
174:.
163:^
151:.
256:.
211:.
185:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.