Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


How do I remove !80 Search Assistant

Posted on 2004-10-12
Medium Priority
Last Modified: 2012-05-05
Hi, I tried to uninstal the !80 Search Assistant in normal and in Safe mode. How can I manage it to get rid of this thing without accessing the internet.
Question by:IngCharlie
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
LVL 20

Expert Comment

ID: 12292820
Manually uninstall 180 Search Assistant
Deb :))

Author Comment

ID: 12312076
Thanks for your help.
I was able to remove the 180 Search Assistant before, the same way as it was in the link from you,
but I need to remove it fully. It left a search page and a popup page opener.
Called Search for... , when I try to remove it by opening the search properties and to change the search page it opens  
Do you have more clues?

Accepted Solution

dimang earned 80 total points
ID: 12322326
First download a program called Ad-aware.It can be found here it,check for updates and run a full system scan.Hopefully it'll get rid of the thing.
If not there is a link for manual remove

Hope this will help.

Author Comment

ID: 12324894
AdAware's done it. Thanks a lot. I don't know why I didn't use it by now. ;o) (I tried SpyBot but that wasn't enough).
One's more thanks


Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor ( Top Charts is a view in which you can set seve…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question