61:: The Logger is used to log installations (e.g., log which files were added or changed, which registry entries were added or changed, etc. at the time of installation). This log is used when the user decides to uninstall the logged installation at later date (in that case, the log is "reversed" — i.e., the log is read, but opposite actions are taken in reverse order).
102:
After the release of Norton
Desktop for Windows 2.0, Ken Spreitzer, who was a tester for the product at Symantec, capitalized on the uninstall idea and wrote the first widely used PC program called "UnInstaller", initially licensed to MicroHelp and then by February 1998 sold by CyberMedia. MicroHelp
94:
Prior to about the 1990s, there was no such thing as an uninstaller, as most programs were simply stored on disk and/or tape, and a program was "removed" by simply erasing it. As operating systems and applications became more complex, mere deletion of a program might be inadequate or insufficient to
98:
Uninstall was invented by Jack Bicer. While he was working on Norton
Desktop for Windows at Symantec, Bicer came up with the Uninstall concept and developed the first Uninstall program in 1991. When published on March 23, 1992, Norton Desktop for Windows V.20 (see the official - README.TXT) was the
45:
Generic uninstallers flourished in the 1990s due to the popularity of shared libraries and the constraints of then-current operating systems, especially
Microsoft Windows XP. Declining storage costs and increasing capacity subsequently made reclaiming disk space less urgent, while end-user
79:: The Watcher watches running programs for installation programs (and usually offers to start the logger when such programs are detected). Usually, this works by watching the tasklist for any names that are commonly used by installation programs (e.g., SETUP.EXE, INSTALL.EXE, etc.)
109:
that the royalties he received from MicroHelp for
Uninstaller made him a millionaire by age 30. Tim O'Pry, while president of MicroHelp, substantially rewrote the code for Uninstaller version 2, which became a best-selling program.
42:. Uninstallers are useful primarily when software components are installed in multiple directories, or where some software components might be shared between the system being uninstalled and other systems that remain in use.
73:: The Analyzer is used to uninstall programs of which installation is not logged. In that case, the program analyzes the program and finds (and deletes, if the user decided to uninstall the program) all related components.
95:
remove the program in its entirety. Entries might be left behind in a system database such as a registry, it may have additional data files, configuration files, sample files, etc.
67:: The Uninstaller is used to reverse changes in the log. This way, the applications can be uninstalled because all changes that were made at the times of installation are reversed.
248:
256:
46:
applications have increasingly relied on simpler installation architectures that consolidate all components to facilitate removal.
38:, is a variety of utility software designed to remove other software or parts of it from a computer. It is the opposite of an
289:
284:
99:
first software package ever to include an
Uninstaller, shown under the "Uninstalling Norton Desktop" section.
17:
85:: Some uninstallers may also contain other related tools for clearing caches or removing unwanted files.
294:
134:
8:
208:
105:
159:
139:
124:
182:
129:
233:
103:
published
Spreitzer's program as Uninstaller version 1. In 1995, Spreitzer told
164:
278:
39:
119:
54:
Typical uninstallers contain the following components:
209:"Can firms start with low cost and instant customers?"
249:"Information Technology; Minds Behind the Product"
177:
175:
276:
172:
200:
168:. Vol. 5, no. 8. August 1999.
14:
277:
206:
226:
246:
152:
27:Software for removing other software
24:
240:
25:
306:
207:Norman, Jan (January 12, 2009).
247:Lohr, Steve (March 27, 1995).
13:
1:
145:
49:
7:
113:
10:
311:
290:Package management systems
213:The Orange County Register
89:
160:"Uninstalling Software"
285:Utility software types
234:"History of Uninstall"
183:"History of Uninstall"
83:Other tools (optional)
135:Should I Remove It?
71:Analyzer (optional)
253:The New York Times
106:The New York Times
77:Watcher (optional)
236:. March 23, 1992.
140:ZSoft Uninstaller
125:IObit Uninstaller
16:(Redirected from
302:
269:
268:
266:
264:
255:. Archived from
244:
238:
237:
230:
224:
223:
221:
219:
204:
198:
197:
195:
193:
179:
170:
169:
156:
130:Revo Uninstaller
34:, also called a
21:
310:
309:
305:
304:
303:
301:
300:
299:
275:
274:
273:
272:
262:
260:
259:on May 28, 2009
245:
241:
232:
231:
227:
217:
215:
205:
201:
191:
189:
181:
180:
173:
158:
157:
153:
148:
116:
92:
52:
28:
23:
22:
15:
12:
11:
5:
308:
298:
297:
292:
287:
271:
270:
239:
225:
199:
171:
165:SmartComputing
150:
149:
147:
144:
143:
142:
137:
132:
127:
122:
115:
112:
91:
88:
87:
86:
80:
74:
68:
62:
51:
48:
26:
9:
6:
4:
3:
2:
307:
296:
293:
291:
288:
286:
283:
282:
280:
258:
254:
250:
243:
235:
229:
214:
210:
203:
188:
184:
178:
176:
167:
166:
161:
155:
151:
141:
138:
136:
133:
131:
128:
126:
123:
121:
118:
117:
111:
108:
107:
100:
96:
84:
81:
78:
75:
72:
69:
66:
63:
60:
57:
56:
55:
47:
43:
41:
37:
33:
19:
295:Uninstallers
261:. Retrieved
257:the original
252:
242:
228:
218:November 24,
216:. Retrieved
212:
202:
190:. Retrieved
186:
163:
154:
104:
101:
97:
93:
82:
76:
70:
64:
58:
53:
44:
35:
31:
29:
65:Uninstaller
36:deinstaller
32:uninstaller
18:Uninstalled
279:Categories
146:References
50:Components
263:August 7,
192:April 15,
40:installer
120:CCleaner
114:See also
187:Septium
90:History
59:Logger
265:2015
220:2015
194:2023
30:An
281::
251:.
211:.
185:.
174:^
162:.
267:.
222:.
196:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.