Solved

How do I completely remove CounterSpy agent with VBScript?

Posted on 2008-10-03
4
851 Views
Last Modified: 2013-11-14
I'm attempting to write a VBScript to do a "complete removal" of the CounterSpy agent from some remote machines.  The problem I have is that the default option is not complete removal.  All of the script executes great, but when the reinstallation of the new Vipre client happens, it installs CounterSpy because it didn't completely remove it in the first place.  Simply doing a quiet uninstall chooses the default options on the uninstall, and does not perform the complete removal.  Is there a way to choose a different option in VBScript or specifically modify the MSI so that the default option is a complete removal?
0
Comment
Question by:cjg1979
  • 2
  • 2
4 Comments
 
LVL 5

Expert Comment

by:lodar123
ID: 22638945
not really, though if you know what is needed to be removed after the uninstall, you can remove it manually through the script.. like registry entries or files etc.
Also if its a MSI, you can create a MST file that gives instruction for the MSI to follow.
0
 

Author Comment

by:cjg1979
ID: 22641312
I like your idea of creating an MST.  Hadn't thought about deleting registry entries manually.  What utilities are good for creating MST files?  
0
 
LVL 5

Accepted Solution

by:
lodar123 earned 500 total points
ID: 22641723
I'd suggest that you start with the MSDN help files

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/msi/setup/applying_transforms.asp
MST are created via the Orca tool from the Windows Installer SDK
0
 

Author Comment

by:cjg1979
ID: 22641847
Thanks, I'll look into that this afternoon.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most PC repair technicians (if not all) always start their cleanup process by emptying the temp folders before running any removal tools. It makes sense because temp folders are common places for malware installers to lurk and removing all the junk …
When you see single cell contains number and text, and you have to get any date out of it seems like cracking our heads.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question