Solved

How to prevent an msi uninstall from removing too much and damaging another program?

Posted on 2008-10-27
1
277 Views
Last Modified: 2013-11-14
First let me say I'm a novice at creating MSI's, however,
I've created an MSI using a software program called "EMCO MSI Package Builder".  I've used it for about a year now deploying software and haven't had a problem until now, when I try to remove the MSI package from a workstation, it seems to 'break' another installed program that is unrelated to the one I am removing.  From what we can tell, it appears that both programs use MDAC and running the uninstall causes MDAC to be removed, which cripples our other program.  I've figured out how to turn on logging during the uninstall; however, it is so huge and so verbose, I am lost in it.
My basic question is whether or not there is a way to run an msi uninstall that doesn't damage another program that may use the same .dll's, or other common files?  Second part of the question, is there a way (generically speaking) to build a msi package so that the uninstall doesn't harm other programs?
0
Comment
Question by:BRIDGEDIVISION
1 Comment
 
LVL 40

Accepted Solution

by:
Vadim Rapp earned 150 total points
Comment Utility
q1: no, there's no way. This completely depends on the way MSI is made. If author follows the standards, it doesn't happen, but many don't (see below).

q2: MSI technology includes so called ICE validation, and the recommended practice is that every installation gets validated and what's reported is fixed. You can get ORCA and validate in it; the descriptions of the found problems and instructions are detailed and have great educational value. Once you have yours validated and fixed , have a little fun - validate some installation package from someone major, like the same Microsoft, or Adobe, or Nero - your self-respect will go up 1,000%. That's why there are so many MSKB articles "How to uninstall visual studio", "How to uninstall microsoft office" with many-page instructions, and Nero and Adobe create separate utilities to clean up their mess.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

One of the frequent problems with the installations is when some file or registry entry is not removed from the system upon un-installation of the product. Clean removal is always highly desirable. One major reason for that is badly authored inst…
One of the major drawbacks of deploying applications by GPO is the complete lack of any centralized reporting. After a normal deployment, there are two ways to find out if it was successful – by looking in the event log, and by looking in the log of…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now