An application installed on the computer of the friend Afa’s home, due to his misuse, always prompts the uninstallation of the application that the following files do not exist or are not a valid uninstall log file. Regardless of the uninstaller program, select Delete in the "Add/Remove Programs" of the Control Panel or not. After reinstalling the program again, the deletion problem still exists. What should I do? I studied with him for a long time, and finally I finally remembered that the latest version of "Windows Optimizer" provides the "software intelligent uninstall" function. Can automatically analyze the files associated with the specified software on the hard disk and related information registered in the registry, can be cleared after the compressed backup, it seems that only try this trick!
1. Open “Optimization Master” and enter the “Software Smart Uninstall” page in the “System Cleanup Maintenance” category. In the list of programs at the top of the page, the list of all applications in the Windows Start/Programs menu is provided, and the application to be analyzed is selected in the list (Figure 1). (If the program to be analyzed does not appear in the list, click "Other" button, manually select the program to be analyzed).
2. After selecting the application to be analyzed, click the “Analyze” button, and “Master” will start intelligent analysis related to the application. The information is gone. First, detect the degree of integration between the application and the operating system. The "master" automatically finds whether the operating system provides the anti-installer of the application. Although the application provides the uninstaller but has just tried it, no, choose not to bring the software. Anti-installer. Next, Master looks for files related to the application on the hard drive and analyzes information related to the application in the registry. After the intelligent search of the "master", the security and feasibility check of the analysis results are finally performed, and the files to be uninstalled or the registry information that the "master" considers to be unsafe or infeasible are removed from the analysis result list.
3. After the analysis is finished, click the “Uninstall” button. After the “Master” has backed up the relevant registry information and file information, it will start the uninstall operation (Figure 2). After the uninstallation was finished, the "Start/Program" was opened again, and the stubborn application finally disappeared.
after the uninstall is complete, if you need to restore an application has been uninstalled, click on the "Restore" button to enter backup and restore in the corresponding operation. As long as the relevant backup information is not deleted, the application that was previously uninstalled can be restored.
Since I was working on the design of the optical disc, I needed to burn the disc f
Recently, I helped my friends recover a few hard drives that were mistaken f
Failure analysis: After the installation is complete, the access to the kernel driver appears when l
GHOST abnormal situation analysis
Keyboard Key Pointing Comprehensive Exercise
GHOST use detailed explanation
CD burning notes and burning tips
be lazy! Let WinRAR unzip the file and open the unzipped directory directly
DiskGenius hard disk physical bad track repair tutorial
Purple light input method tips
How does the computer turn on and off the Chinese character input method?
Nine major non-passing secrets let WinRAR work exclusively
Ghost 8.0 operation skills from entry to the master
Easy compression software to easily create self-extracting files
Win10 build 10586 preview version upgrade failure card at 40% What should I do?
Red Flag Linux Desktop 5 How to Use SAPGUI Client
How to disable the synchronization host session
Discussion on win 7 security issues
How to upgrade the win7 system flash plugin? How to upgrade the
How to choose win10 multi-version? Windows 10 versions of the difference comparison introduction
IIS installation and solutions to common problems
How Linux uses the arping command to detect IP address conflicts