?
Solved

Should I remove "Embassy Trust Suite" from Wave, installed on my new Dell Optiplex?

Posted on 2008-10-18
5
Medium Priority
?
7,508 Views
Last Modified: 2013-12-04
I have a new Dell Optiplex 755, pre-loaded with windows XP!  It came with what seemed initially to be zero "crapware" for which I was delighted.  But now I see "Embassy Trust Suite" from Wave Systems Corp. (http://www.wave.com/about/default.asp)
I read that all Dell systems come pre-installed with this software (blurb from Wave below).
Interestingly, the Add/Remove Programs doesn't list this product.
How can I remove this from my machine?   Or should I leave it on?
Thanks.

Blurb from Wave follows:  (http://www.wave.com/about/default.asp)
Waves core products are based around the Trusted Platform Module (TPM), the industry-standard hardware security chip that is included as standard equipment on most enterprise-class PCs shipping today.
0
Comment
Question by:Dwight Baer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 25

Accepted Solution

by:
slam69 earned 2000 total points
ID: 22751345
from what im reading whilst you can remove it you will find it can remove some functionality such as fingerprint reader functionality. Consider turning TPM off in BIOS and that shoudl leave you alone without the need of removing teh suite
0
 

Author Closing Comment

by:Dwight Baer
ID: 31507525
Thanks!
0
 

Expert Comment

by:meshoxford
ID: 25945841
so if I do this I will stop getting this error message?
0
 

Expert Comment

by:meshoxford
ID: 25945917
no that didnt work :(

Man dell comes iwth all this bloatware, its annoying
0
 

Author Comment

by:Dwight Baer
ID: 25945946
What error message are you getting?
I posted this question a month ago, and I'm sorry but I can't remember if I took the software off or left it on, but I'm no longer getting any error messages.
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
For both online and offline retail, the cross-channel business is the most recent pattern in the B2C trade space.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Suggested Courses
Course of the Month9 days, 11 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question