Windows Client OS

Remove Orphaned Apps from the Add/Remove Applet in Control Panel

How can I remove orphaned apps from the Add/Remove applet in Control Panel in Windows 2000/XP/2003?

Sometimes after you uninstall a program its entry still remains in the Add or Remove Programs dialog box. This should not have happened in the first place, but if it does happen you’ll be really pissed off because when you click on Change/Remove in the dialog box, you get an error, telling you that the program no longer exists.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

To remove these orphan entries do the following:

  1. Start Registry Editor (Regedit.exe).

  2. Locate the following key in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
  1. Make sure you backup the keys by exporting them to a .reg file.

  2. Look for the name of the program with the orphaned entry.

  3. Delete the entire listing for the software with the orphaned entry.

  4. Close the registry editor.

  5. Restart your computer.

BTW, this can also be accomplished by use of many third-party tools such as TweakUI and others. To read more about these apps go to this article: Free Tweaking Tools.

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: