Knowledge (XXG)

Uninstaller

Source 📝

50:: The Logger is used to log installations (e.g., log which files were added or changed, which registry entries were added or changed, etc. at the time of installation). This log is used when the user decides to uninstall the logged installation at later date (in that case, the log is "reversed" — i.e., the log is read, but opposite actions are taken in reverse order). 91:
After the release of Norton Desktop for Windows 2.0, Ken Spreitzer, who was a tester for the product at Symantec, capitalized on the uninstall idea and wrote the first widely used PC program called "UnInstaller", initially licensed to MicroHelp and then by February 1998 sold by CyberMedia. MicroHelp
83:
Prior to about the 1990s, there was no such thing as an uninstaller, as most programs were simply stored on disk and/or tape, and a program was "removed" by simply erasing it. As operating systems and applications became more complex, mere deletion of a program might be inadequate or insufficient to
87:
Uninstall was invented by Jack Bicer. While he was working on Norton Desktop for Windows at Symantec, Bicer came up with the Uninstall concept and developed the first Uninstall program in 1991. When published on March 23, 1992, Norton Desktop for Windows V.20 (see the official - README.TXT) was the
34:
Generic uninstallers flourished in the 1990s due to the popularity of shared libraries and the constraints of then-current operating systems, especially Microsoft Windows XP. Declining storage costs and increasing capacity subsequently made reclaiming disk space less urgent, while end-user
68:: The Watcher watches running programs for installation programs (and usually offers to start the logger when such programs are detected). Usually, this works by watching the tasklist for any names that are commonly used by installation programs (e.g., SETUP.EXE, INSTALL.EXE, etc.) 98:
that the royalties he received from MicroHelp for Uninstaller made him a millionaire by age 30. Tim O'Pry, while president of MicroHelp, substantially rewrote the code for Uninstaller version 2, which became a best-selling program.
31:. Uninstallers are useful primarily when software components are installed in multiple directories, or where some software components might be shared between the system being uninstalled and other systems that remain in use. 62:: The Analyzer is used to uninstall programs of which installation is not logged. In that case, the program analyzes the program and finds (and deletes, if the user decided to uninstall the program) all related components. 84:
remove the program in its entirety. Entries might be left behind in a system database such as a registry, it may have additional data files, configuration files, sample files, etc.
56:: The Uninstaller is used to reverse changes in the log. This way, the applications can be uninstalled because all changes that were made at the times of installation are reversed. 237: 278: 245: 35:
applications have increasingly relied on simpler installation architectures that consolidate all components to facilitate removal.
273: 27:, is a variety of utility software designed to remove other software or parts of it from a computer. It is the opposite of an 88:
first software package ever to include an Uninstaller, shown under the "Uninstalling Norton Desktop" section.
283: 74:: Some uninstallers may also contain other related tools for clearing caches or removing unwanted files. 123: 94: 128: 113: 118: 197: 153: 148: 267: 171: 222: 92:
published Spreitzer's program as Uninstaller version 1. In 1995, Spreitzer told
28: 108: 43:
Typical uninstallers contain the following components:
198:"Can firms start with low cost and instant customers?" 238:"Information Technology; Minds Behind the Product" 166: 164: 8: 157:. Vol. 5, no. 8. August 1999. 140: 7: 16:Software for removing other software 14: 196:Norman, Jan (January 12, 2009). 236:Lohr, Steve (March 27, 1995). 1: 300: 279:Package management systems 202:The Orange County Register 149:"Uninstalling Software" 274:Utility software types 223:"History of Uninstall" 172:"History of Uninstall" 72:Other tools (optional) 124:Should I Remove It? 60:Analyzer (optional) 242:The New York Times 95:The New York Times 66:Watcher (optional) 225:. March 23, 1992. 129:ZSoft Uninstaller 114:IObit Uninstaller 291: 258: 257: 255: 253: 244:. Archived from 233: 227: 226: 219: 213: 212: 210: 208: 193: 187: 186: 184: 182: 168: 159: 158: 145: 119:Revo Uninstaller 23:, also called a 299: 298: 294: 293: 292: 290: 289: 288: 264: 263: 262: 261: 251: 249: 248:on May 28, 2009 235: 234: 230: 221: 220: 216: 206: 204: 195: 194: 190: 180: 178: 170: 169: 162: 147: 146: 142: 137: 105: 81: 41: 17: 12: 11: 5: 297: 295: 287: 286: 281: 276: 266: 265: 260: 259: 228: 214: 188: 160: 154:SmartComputing 139: 138: 136: 133: 132: 131: 126: 121: 116: 111: 104: 101: 80: 77: 76: 75: 69: 63: 57: 51: 40: 37: 15: 13: 10: 9: 6: 4: 3: 2: 296: 285: 282: 280: 277: 275: 272: 271: 269: 247: 243: 239: 232: 229: 224: 218: 215: 203: 199: 192: 189: 177: 173: 167: 165: 161: 156: 155: 150: 144: 141: 134: 130: 127: 125: 122: 120: 117: 115: 112: 110: 107: 106: 102: 100: 97: 96: 89: 85: 78: 73: 70: 67: 64: 61: 58: 55: 52: 49: 46: 45: 44: 38: 36: 32: 30: 26: 22: 284:Uninstallers 250:. Retrieved 246:the original 241: 231: 217: 207:November 24, 205:. Retrieved 201: 191: 179:. Retrieved 175: 152: 143: 93: 90: 86: 82: 71: 65: 59: 53: 47: 42: 33: 24: 20: 18: 54:Uninstaller 25:deinstaller 21:uninstaller 268:Categories 135:References 39:Components 252:August 7, 181:April 15, 29:installer 109:CCleaner 103:See also 176:Septium 79:History 48:Logger 254:2015 209:2015 183:2023 19:An 270:: 240:. 200:. 174:. 163:^ 151:. 256:. 211:. 185:.

Index

installer
The New York Times
CCleaner
IObit Uninstaller
Revo Uninstaller
Should I Remove It?
ZSoft Uninstaller
"Uninstalling Software"
SmartComputing


"History of Uninstall"
"Can firms start with low cost and instant customers?"
"History of Uninstall"
"Information Technology; Minds Behind the Product"
the original
Categories
Utility software types
Package management systems
Uninstallers

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.