You really don't need access to the source in any way to solve this. Rating comments in this legacy AppDeploy message board thread won't reorder them, so that the conversation will remain readable. Answer this question.
Posted by:. Don't be a Stranger! Sign up! View more:. Software Deployment Questions. Powershell script for enabling location services not running? Setup of script to verify a process, then start if necessary? I'm trying to make my command line works inPowerShell and as to be a silent install. Problem with repackaging a application which has a enforced reboot post-install. Link Related Links. MSI Switches. Post Related Posts. How to Patch newly deployed Computer. Thoroughly research any product advertised on the sites before you decide to download and install it.
See here for how to try to recover Admin rights:. How satisfied are you with this reply? Thanks for your feedback, it helps us improve the site. At present, disable windows defender in all options and allow unwise. Disable third party antivirus software Then try to uninstall again, once completed means, then re-enable antivirus software.
This site in other languages x. Some programs also use these files as a guide for the uninstall routine. Hope this information is helpful and let me know if you need any further assistance. Visit our Microsoft Answers Feedback Forum and let us know what you think. Was this reply helpful? Yes No. Sorry this didn't help. Thanks for your feedback. I responded above with a solution that should fix your problem. Please return to the thread and let us know if this has solved your problem.
If not, please return and provide any additional details you have come across so that we can further troubleshoot the issue. Threats include any threat of suicide, violence, or harm to another.
So the uninstall path was DzNuts DzNuts 1. Examine the "UninstallString" key value This will give you the log, but doesn't answer how to silently automate it. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown. The Overflow Blog. Stack Gives Back Safety in numbers: crowdsourcing data on nefarious IP addresses. Featured on Meta.
0コメント