?
Solved

uninstaller in use

Posted on 2004-08-26
1
Medium Priority
?
347 Views
Last Modified: 2008-02-20
i can't install some softwares, though i'm able to install some others.

i'm gettin

'setup has detected that uninstallshield is in use, please close uninstallshiled and restart setup.'

i can't figure out why am i gettin this error messare?
0
Comment
Question by:coolx
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
deb007 earned 300 total points
ID: 11910030
Hi,
This could be happening if IsUninst.exe is corrupted on a particular machine. IsUninst.exe is the InstallShield uninstallation file, and when it's corrupted it might appear to be in use even though it's not showing up as a process that is running in Task Manager.

Delete all instances of IsUninst.exe from the %systemroot% directory and run setup again.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Issue: Unstable cursor in Windows XP and Windows runs extremely slow in that any click will bring up the Hour glass (sometimes for several seconds before giving you what you want) . Troubleshooting Process and the FINAL FIX: This issue see…
If you have done a reformat of your hard drive and proceeded to do a successful Windows XP installation, you may notice that a choice between two operating systems when you start up the machine. Here is how to get rid of this: Click Start Clic…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month8 days, 16 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question