How to uninstall McAffee (by force, if necessary)

Posted on 2006-05-14
Last Modified: 2011-08-18
I have installed MC Afee Internet Security and now want to unistall it, but cannot. When I go to Add/Remove Programs I find the McAffee program listed as "McAffee Unistall Wizard". CLicking there I get the following message:
"The istallation cannot continue because some components ( c:progr~1\\agent\unistall\masrem.ui )are missing"

I have tried to install the program again using the McAffee cd I have - but same, same.

What's going on ? what to do to clear out Mc Affee completely from my computer ?

Grateful for Help !

Question by:herbalifeexpert
    LVL 97

    Accepted Solution

    Greetings, herbalifeexpert !

    McAfee may be running in the background when you are trying to uninstall it. Disable it - Use MSCONFIG to prevent McAfee from starting up when you boot up. Reboot and try uninstalling then.

    Follow these instructions for uninstalling McAfee Security Center

    Best wishes!
    LVL 2

    Expert Comment

    I haven't used McAfee for a few years, but it sounds like you are trying to do a slightly wrong thing. As you describe it, you are using Add/Remove Programs to try to remove McAfee's "Uninstall Wizard" from your computer. You don't want to do that--you need that program! This Uninstall Wizard is the very program designed to remove McAfee stuff from your computer, and hopefully, the last thing it will do is remove itself. Don't get rid of it--run it.
    Find wherever it is, probably tucked away somewhere in the Program Files folder, or there could be a shortcut in the Start menu under Start -> All Programs -> McAfee, or some such thing as that. Then just run it.

    Author Comment


    Problem  resolved !
    Followed the  instructions in the link previously given by "war1" (You have to remove references to McAfee Security Center last and clean up the registry

    Thanks "war1" , and thanks you others whogave your suggestions.

    All the best !


    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Join & Write a Comment

    Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

    733 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now