Solved

uninstalling IE5

Posted on 2000-05-13
3
167 Views
Last Modified: 2010-04-14
How do you uninstall IE5 on W2P?.
I think my current installation got corrupted, since I cannot connect to the internet (and have THREE ISP's).
I tried to reinstall it, but the installation process 'sees' it's already installed and it 'finishes' asking you to reboot.
NT and Windows 95/98 have a way to work on this (Control Panel > Add/remove progs, select IE5, click Add/Remove,
and choose from several options.
This is not the case with W2P.
Will appreciate help to solve this problem.
0
Comment
Question by:efrain12
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 2

Accepted Solution

by:
ABCStore earned 100 total points
ID: 2807600
Get IE 5.5 from windowsupdate.microsoft.com
0
 
LVL 12

Expert Comment

by:pjknibbs
ID: 2807879
IE5 is integrated into Win2K Professional, and as far as I can tell cannot be removed independently of the rest of the OS. You'll have to try an upgrade like ABCStore suggested.
0
 

Author Comment

by:efrain12
ID: 2809347
I'm going to take ABCStore's comment as an answer, since the update helped in bringing - indirectly - my browser back to work. When I upgraded, it didn't 'repair' the previous version, so I decided to reinstall W2P; then I reinstall IE5.5 and trying those options (in Control Panel>Add/Rem..) I could finally make it work.
Thanks to both of you guys.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question