CN104679562B - A kind of method and system of strength uninstall - Google Patents

A kind of method and system of strength uninstall Download PDF

Info

Publication number
CN104679562B
CN104679562B CN201510085160.5A CN201510085160A CN104679562B CN 104679562 B CN104679562 B CN 104679562B CN 201510085160 A CN201510085160 A CN 201510085160A CN 104679562 B CN104679562 B CN 104679562B
Authority
CN
China
Prior art keywords
software
file
mount message
unloading
uninstaller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510085160.5A
Other languages
Chinese (zh)
Other versions
CN104679562A (en
Inventor
欧胜
万立新
黄礼强
卞松山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510085160.5A priority Critical patent/CN104679562B/en
Priority claimed from CN201110005069.XA external-priority patent/CN102043655B/en
Publication of CN104679562A publication Critical patent/CN104679562A/en
Application granted granted Critical
Publication of CN104679562B publication Critical patent/CN104679562B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The present invention provides a kind of method and system of strength uninstall, and described method includes following steps:The mounted software of the machine is detected in client, including dbase and version information, corresponding unloading prompting is provided to have installed software per money;When detect user according to it is described unloading prompting selected the unloading operation of certain software after, according to the title and version of the software, preset mount message corresponding with the software is obtained from data file, the mount message includes the file that is added in installation process of the software and the modification to registration table and/or system file;According to the corresponding mount message, the file which is added in installation process and the modification of registration table and/or system file is deleted or recovered.The present invention has provided a kind of easy, unified and thorough software to the user and has unloaded mechanism.

Description

A kind of method and system of strength uninstall
Present patent application be the applying date on 01 04th, 2011, it is Application No. 201110005069.X, entitled A kind of divisional application of the Chinese invention patent application of " method and system of strength uninstall ".
Technical field
The present invention relates to software Unloading Technology field more particularly to a kind of method and systems of strength uninstall.
Background technology
With the development of computer and Internet technology, various application software also emerge in an endless stream.Most software is being pacified It is all very easy to during dress and friendly, but in unloading, some softwares are for certain purpose or itself is lack of standardization, usually can not be thorough It unloads and deletes in the slave user computer at bottom, and a large amount of garbage files under residual, cause very big puzzlement, while also shadow for user The performance of computer is rung.
And solve the problems, such as this one method, it at present can only be different due to software type.Since every money software has its own Characteristics in Compiling and installation process, therefore the mode of its Stub File and position are also different, which results in solve the problems, such as this Mode it is mostly quite personalized.For example, for the unloading residue problem of certain software, someone sums up, and can be introduced into safety Pattern subsequently into registration table, checks specific key assignments, deletes specific installation directory again afterwards;And for another money software Residual, then need to perform specific order in order line.But these modes, not only need that there is phase to computer literacy When understanding, and once slightly slip up, the operation of computer or safety will be caused greatly to damage.
In short, at present for the software that can not be thoroughly unloaded from user computer, lack a kind of simple, unified solution it Road is not for special skilled user, not only for the layer in conventional uninstall process to the use of computer particularly with those Layer choosing, which is selected, to be at a loss what to do and fears, and especially those cannot be unloaded with the software of deletion completely, and even more soft white hands is without plan.
Therefore, how a kind of method and system of strength uninstall is provided, make user can it is easy, thoroughly unload it is soft Part has become industry urgent problem to be solved.
The content of the invention
The technical problems to be solved by the invention are to provide a kind of method and system of strength uninstall, so that user Easy, thorough unloading the machine installation software.
In order to solve the above technical problems, the present invention provides a kind of method of strength uninstall, include the following steps:
The mounted software of the machine is detected in client, is that software has been installed per money including dbase and version information Corresponding unloading prompting is provided;
When detect user according to it is described unloading prompting selected the unloading operation of certain software after, according to the name of the software Title and version, obtain preset mount message corresponding with the software from data file, and the mount message includes the software The file added in installation process and the modification to registration table and/or system file;
According to the corresponding mount message, the file which is added in installation process and to registration table and/ Or the modification of system file is deleted or recovered.
The present invention so a kind of system of strength uninstall is also provided, including:
Data module, for storing the mount message of different software, the mount message includes dbase and version, adds The file added and the modification to registration table and/or system file;
Detection module is every including dbase and version information for detecting the mounted software of the machine in client Money has installed software and provides corresponding unloading prompting;
Detecting module, for whether detecting user according to the unloading operation for unloading prompting and having selected certain software;
Data obtaining module detects user according to the unloading operation for unloading prompting and having selected certain software for working as Afterwards, according to the title and version of the software, mount message corresponding with the software is obtained from data module;
Unload module, for according to the corresponding mount message, the file which is added in installation process and The modification of registration table and/or system file is deleted or recovered.
Wherein, the data module can be located at client the machine or remote server.
The present invention need not occupy excessive client resource, and performing different unloadings for different software without user grasps Make, provided a kind of easy, unified and thorough software to the user and unloaded mechanism.The present invention is applicable not only to desktop computer Terminal, and it is also applied for other mobile clients such as mobile phone.
Description of the drawings
Fig. 1 is the method flow diagram of the strength uninstall according to the embodiment of the present invention.
Fig. 2 is the system schematic of the strength uninstall according to the embodiment of the present invention.
Fig. 3 is the structure diagram of the Unload module according to the embodiment of the present invention.
Fig. 4 is the structure diagram of the Unload module according to another embodiment of the present invention.
Fig. 5 is the structure diagram of the Unload module according to further embodiment of this invention.
Specific embodiment
Below in conjunction with the accompanying drawings, the embodiment of the present invention is described in detail.
As shown in Figure 1, it is the method flow diagram of the strength uninstall according to the embodiment of the present invention, first in client Including dbase and version information, corresponding unloading is provided to have installed software per money for the detection mounted software of the machine in end Prompt (step 101);When detect user according to it is described unloading prompting selected the unloading operation of certain software after, it is soft according to this The title and version of part, obtain preset mount message corresponding with the software from data file, and the mount message includes The file and the modification (step 102) to registration table and/or system file that the software adds in installation process;Root afterwards According to the corresponding mount message, the file which is added in installation process and to registration table and/or system file Modification deleted or recovered (step 103).
The data file can be the information formats such as the form of database or list or text.According to this hair Bright embodiment, data file can be located at client the machine, can also be located at remote server.Here is with database shape Formula is illustrated.
The installation process of client software is can be monitored by the one long-term program resided in client machine , software installation behavior is recorded one by one, but this mode occupies the resource of client, can influence user experience, because This, present invention preferably employs mode be after the installation process of software is simulated and analyzed in advance, to determine the software Mount message, and the mount message is stored in a database.
The mount message determines, can include whether such as software is solar obligation in C disks or peace may be selected Loaded on that under other drives, can establish what kind of file directory and path, which file is installation process can discharge, to registry entry or System file has carried out which modification etc., these mount messages can be collected and determined in advance.It afterwards, can be in server End one database of structure, the mount message of different software is summarized and is stored in database.
The present invention does not interfere the unloading selection of client user, if what user's selection was directly carried by software itself Uninstaller is also possible to perform unloading, but can usually unload halfway feelings due to only performing this conventional unloading Condition, therefore, the present invention or recommended user carry out software unloading using the unloading manner of the present invention.
When user selects to carry out software unloading using unloading manner provided by the invention, the present invention can pass through scanning Detect the installed software of the machine, it is preferred that a list for having installed software can be further listed in, and to have been installed per money Software provides a unloading prompting, such as can be a button, above with " strength unloads " printed words.
Next, can detect whether user presses " strength unloads " button, if there is corresponding button is chosen, then illustrate User wishes to unload the software.But some softwares, may be due to shared by other programs, it is thus possible to lead in unloading Cause can not be deleted normally, this is also an one of the major reasons for leading to not thorough uninstall.
For such case, according to an embodiment of the invention, when the unloading operation for detecting user and having selected certain software Afterwards, relevant document or directly progress file deletion can be deleted or first carry out conventional unloading by performing conventional uninstall process Stub File is deleted again, no matter which kind of mode used, before deletion action is performed, can first determine whether that the software document is It is no shared by some other program, if it is, releasing between the software document to be unloaded and the occupancy program Locking.
Can be scanned by process on the mode to unlock, the positive closing occupancy program, terminate its process or The modes such as service are realized.
After locking between relieving and occupying program, you can it is normal to delete file, but which should specifically be deleted A little files then need to determine according to the corresponding mount message of the software.The software has been recorded in mount message to install The file once discharged in the process and the modification made to registration table and system file, therefore, as long as according in mount message Record, perform anti-installation process.
But it should be noted that in mount message that some are fixed there are one problem, such as the modification to registry entry, but Some are that user is allowed to select, such as installation drive and catalogue, can be by performing one for the content that user is allowed to select A scanning search process determines the specific installation site in specific client end, determines to carry out after specific installation site The anti-installation process of file.It is of course also possible to will likely installation file directory information be put into mount message, and perform accordingly Scanning process.
If database is located at remote server, client obtains the mode of mount message from database, can have more Kind, for example, before unloading is performed, believed first by user end to server request and the corresponding installation of the dbase and version Breath;After server receives the request, the mount message of the software is sent to the client.But this mode requires client to exist It has to online online with server end when performing unloading, has some limitations to use environment at that time.
For this purpose, according to another embodiment of the invention, can also be periodically the machine has been installed by client in advance it is soft The title of part and version information notification server;Server will install the corresponding mount message of software with the client and be sent to Client stores.So when client executing unloads, even if not online, the installation letter of local memory storage can also be directly recalled Breath.
Certainly, client information storage can also be data file form, that is, data file be located at visitor Family end the machine.
Mount message corresponding with the software is being obtained, and is being determined after the specific installation site of this client, i.e., By file that the software adds and the modification of registration table and/or system file can be deleted or recovered.The specific side of execution Selection that there are many formulas, such as:The Uninstaller that the software can be called to carry first performs conventional unloading;It has been unloaded routinely Cheng Hou searches for correspondence position according to the corresponding mount message, and inquiry is with the presence or absence of remaining file or registry entry, if deposited Then it is directly being deleted.
By performing conventional unloading, although uninstall that can be more safe, speed may be relatively slow, especially in the presence of During remaining file, it is also necessary to perform search again.Therefore, according to another embodiment of the present invention, conventional unload can not also be performed It carries, but the catalogue and/or registry entry of installing software that may relate to directly is searched for according to the corresponding mount message; If searching the content to match with the mount message, directly delete or recover.
In some application environments, such as the operating system of some mobile phones, it is desirable that when performing software unloading, it is necessary to pass through Crossing the Uninstaller that the software carries could complete, although this can prevent from deleting software by mistake to a certain extent, also give one A little rogue programs leave opportunity.For example, some rogue programs have distorted the Uninstaller that application software carries, cause one Denier runs the Uninstaller just and can trigger the rogue program, thus can not complete deletion virus.For such case, the present invention It is another that an embodiment is provided when performing unloading:The Uninstaller that the software is carried first is deleted, and is generated one and carried with original Uninstaller new Uninstaller of the same name, and the new Uninstaller does not perform uninstall action after starting and exits, for example, It is exited after startup without performing any action at once, in this way, operating system is considered as having performed the unloading that the software carries Program;Then, after the new Uninstaller has been performed, further according to the corresponding mount message, the peace that may relate to is searched for Fill the catalogue and/or registry entry of software;If searching the content to match with the mount message, directly delete or extensive It is multiple.
It is of the present invention to the possible installation site of software and the installation software catalog and registry entry that may relate to Etc. information search, can be by " Program Files " file under each drive, under root, " Documents The position of the frequent releasing document of the installation files such as and Settings " files or frequent mounted file modification scans for, Can be used to matched information can include the title of the software, icon, shortcut and the specific file for being specific to the software Etc. information.
In order to avoid some softwares are to unloading or delete set special protection, such as need input validation code or needs The obstacle caused by the measures such as unloading or deletion could be performed after unlock, it according to an embodiment of the invention, can be by directly will The mode that file crushes is deleted by force and thoroughly, i.e., is packed into the data field for storing the file content to be deleted This document Status Flag to cover former data, and is arranged to " delete " by hash in directory area.
And need that there is corresponding permission for the operation of some registry entries, therefore, according to an embodiment of the invention, Before execution is deleted or recovered to the modification of registration table, the operating right of registration table can be changed automatically first, with Obtain complete control.For example, " everyone " in registry entry operating right can be authorized to complete control.
It is above-mentioned be deleted or modified by force by way of uninstall, it is possible to some undesirable knots can be caused Fruit for such case, can determine corrective measure, which be embodied in the corresponding installation of the software by analyzing its reason In information, and database is stored in, is not in similar results to there is client to perform again when the software unloads.
It is corresponding with the strength discharging method of the present invention, the present invention also provides a kind of strength uninstalling system, as shown in Fig. 2, Including data module 201, detection module 202, detecting module 203, data obtaining module 204, Unload module 205.Wherein:
Data module 201 can be located at client the machine, can also be located at remote server, for storing different software Mount message, the mount message can be analyzed to determine by the installation process to software, including dbase and Version, the file of addition and the modification to registration table and/or system file can also include possible installation file catalogue Information;
Detection module 202, for detecting the mounted software of the machine in client, including dbase and version information, Software is installed for every money, corresponding unloading prompting is provided;
Detecting module 203, for whether detecting user according to the unloading operation for unloading prompting and having selected certain software;
Data obtaining module 204 detects user according to the unloading for unloading prompting and having selected certain software for working as After operation, according to the title and version of the software, mount message corresponding with the software is obtained from data module;
Unload module 205, for according to the corresponding mount message, the file which is added in installation process with And the modification of registration table and/or system file is deleted or recovered.
The data module can be the information formats such as the form of database or list or text.According to this hair Bright embodiment, data module can be located at client the machine, can also be located at remote server.Here is with database shape Formula is illustrated.
Equally, in order to avoid the program or file that are unloaded just are occupied and dismount failure caused by possibility by other programs, Whether Unload module of the present invention before unloading is performed, can first determine whether the software document by some program institute It occupies, if it is, releasing the locking between the desire uninstall and the occupancy program.It unlocks may be employed and be scanned into Journey closes and occupies program, terminates the modes such as its process or service.
Equally, the unloading manner of Unload module 205 can also there are many selections.
As shown in figure 3, the Unload module 205, can include conventional unloading unit 301 and remaining deletion unit 302, Wherein:
Conventional unloading unit 301 for performing the Uninstaller that the software carries, carries out conventional unloading;
Whether remnants delete unit 302, for after the completion of routinely unloading, being deposited according to the corresponding mount message inquiry In remaining file or registry entry, if it is present corresponding delete.
As shown in figure 4, the Unload module 205, can also be including search unit 401 and execution unit 402, wherein:
Search unit 401, for according to the corresponding mount message, searching for the catalogue for installing software that may relate to And/or registry entry;
Execution unit 402 is deleted or recovered for after the content to match with the mount message is searched, performing.
As shown in figure 5, the Unload module 205, can also be that, including replacement unit 501, search unit 502 performs list Member 503, wherein:
Replacement unit 501, the Uninstaller for the software to be carried are deleted, and generate a unloading journey carried with original Sequence new Uninstaller of the same name, the new Uninstaller do not perform uninstall action after starting and exit;
Search unit 502, for after the new Uninstaller is performed, according to the corresponding mount message, search may The catalogue and/or registry entry for the installation software being related to;
Execution unit 503, for when searching the content to match with the mount message, performing deletion or extensive to it It is multiple.
The Unload module can be packed into when performing deletion in the data field for storing the file content to be deleted This document Status Flag to cover former data, and is arranged to " delete ", it is possible thereby to reach thorough by hash in directory area The effect of deletion;And when performing Registry Modifications, the operating right of registration table can be changed first, it is complete to obtain Control.
The specific running of strength uninstalling system other parts of the present invention, the embodiment with the strength discharging method The realization details of middle introduction is similar, and details are not described herein.

Claims (19)

  1. A kind of 1. method of strength uninstall, which is characterized in that include the following steps:
    The mounted software of the machine is detected in client, including dbase and version information, is provided to have installed software per money Corresponding unloading prompting;
    After detecting user and having selected the unloading operation of certain software according to the unloading prompting, according to the title of the software and Version, obtains preset mount message corresponding with the software from data file, and the mount message is being pacified including the software Fill the file added in the process and the modification to registration table and/or system file;Wherein, the mount message passes through advance The installation process of software is simulated and analysis obtains;
    According to the corresponding mount message, the file which is added in installation process and to registration table and/or it is The modification of system file is deleted or recovered.
  2. 2. the method as described in claim 1, which is characterized in that the data file is located at client the machine or remote service Device.
  3. 3. the method as described in claim 1, which is characterized in that before the delete step is performed, further comprise:
    Judge the software document whether shared by some program;
    If it is, release the locking of the desire uninstall and the occupancy program.
  4. 4. the method as described in claim 1, which is characterized in that it is described according to the corresponding mount message, which is added File and the step of the modification of registration table and/or system file is deleted or recovered, including:
    The Uninstaller that the software carries is performed, performs conventional unloading;
    After the completion of conventional unloading, according to the corresponding mount message inquiry with the presence or absence of remaining file or registry entry, if In the presence of then corresponding to delete.
  5. 5. the method as described in claim 1, which is characterized in that the mount message further comprises possible installation file mesh Record information.
  6. 6. such as claim 1-5 any one of them methods, which is characterized in that it is described according to the corresponding mount message, by this The file of software addition and the step of the modification of registration table and/or system file is deleted or recovered, including:
    According to the corresponding mount message, the catalogue and/or registry entry of installing software that may relate to are searched for;
    If searching the content to match with the mount message, directly delete or recover.
  7. 7. such as claim 1-5 any one of them methods, which is characterized in that it is described according to the corresponding mount message, by this The file of software addition and the step of the modification of registration table and/or system file is deleted or recovered, including:
    The Uninstaller that the software is carried is deleted, and generates a new Uninstaller of the same name with the former Uninstaller carried, The new Uninstaller does not perform uninstall action after starting and exits;
    After performing the new Uninstaller, according to the corresponding mount message, search for the installation software that may relate to catalogue and/ Or registry entry;
    If searching the content to match with the mount message, directly delete or recover.
  8. 8. the method as described in claim 1, which is characterized in that described the step of deleting file, including:
    Hash is packed into the data field for storing the file content to be deleted, to cover former data, and in directory area This document Status Flag is arranged to " delete ".
  9. 9. the method as described in claim 1, which is characterized in that the step that the modification to registration table is deleted or recovered Suddenly, including being changed automatically to the operating right of registration table first the step of, to obtain complete control.
  10. 10. a kind of system of strength uninstall, which is characterized in that including:
    Data module, for storing the mount message of different software, the mount message includes dbase and version, addition File and the modification to registration table and/or system file;Wherein, the mount message passes through the installation in advance to software Cheng Jinhang is simulated and analysis obtains;
    Detection module, for detecting the mounted software of the machine in client, including dbase and version information, be per money Software is installed, corresponding unloading prompting is provided;
    Detecting module, for whether detecting user according to the unloading operation for unloading prompting and having selected certain software;
    Data obtaining module, for when detect user according to it is described unloading prompting selected the unloading operation of certain software after, According to the title and version of the software, mount message corresponding with the software is obtained from data module;
    Unload module, for according to the corresponding mount message, the file which is added in installation process and to note The modification of volume table and/or system file is deleted or recovered.
  11. 11. system as claimed in claim 10, which is characterized in that the data module is located at client the machine or remote service Device.
  12. 12. system as claimed in claim 10, which is characterized in that the Unload module before deletion is performed, first determines whether this Whether software document is shared by some program, if it is, releasing the locking of the desire uninstall and the occupancy program.
  13. 13. system as claimed in claim 10, which is characterized in that the Unload module, including:
    Conventional unloading unit for performing the Uninstaller that the software carries, carries out conventional unloading;
    Remnants delete unit, for after the completion of routinely unloading, being inquired about according to the corresponding mount message with the presence or absence of remnants File or registry entry, if it is present corresponding delete.
  14. 14. system as claimed in claim 10, which is characterized in that the mount message further comprises possible installation file Directory information.
  15. 15. such as claim 10-14 any one of them systems, which is characterized in that the Unload module, including:
    Search unit, for according to the corresponding mount message, searching for the catalogue for installing software that may relate to and/or registration List item;
    Execution unit is deleted or recovered for after the content to match with the mount message is searched, performing.
  16. 16. such as claim 10-14 any one of them systems, which is characterized in that the Unload module, including:
    Replacement unit, the Uninstaller for the software to be carried are deleted, and generation one is of the same name with the former Uninstaller carried New Uninstaller, the new Uninstaller do not perform uninstall action after starting and exits;
    Search unit, for after the new Uninstaller is performed, according to the corresponding mount message, searching for the peace that may relate to Fill the catalogue and/or registry entry of software;
    Execution unit, for when searching the content to match with the mount message, deletion or recovery to be performed to it.
  17. 17. system as claimed in claim 10, which is characterized in that the Unload module is when performing deletion, described in storage The data field of the file content to be deleted is packed into hash, to cover former data, and in directory area by this document state mark Will is arranged to " delete ".
  18. 18. a kind of computer equipment, which is characterized in that including:It memory, processor and is stored on the memory and can be The computer program run on the processor realizes such as claim 1 when the computer program is performed by the processor To the strength uninstall any one of 9 method the step of.
  19. 19. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, the computer program realize strength uninstall as claimed in any one of claims 1-9 wherein when being executed by processor Method the step of.
CN201510085160.5A 2011-01-04 2011-01-04 A kind of method and system of strength uninstall Active CN104679562B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510085160.5A CN104679562B (en) 2011-01-04 2011-01-04 A kind of method and system of strength uninstall

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110005069.XA CN102043655B (en) 2011-01-04 2011-01-04 Method and system for carrying out advanced uninstall on software
CN201510085160.5A CN104679562B (en) 2011-01-04 2011-01-04 A kind of method and system of strength uninstall

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201110005069.XA Division CN102043655B (en) 2011-01-04 2011-01-04 Method and system for carrying out advanced uninstall on software

Publications (2)

Publication Number Publication Date
CN104679562A CN104679562A (en) 2015-06-03
CN104679562B true CN104679562B (en) 2018-06-05

Family

ID=53314659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510085160.5A Active CN104679562B (en) 2011-01-04 2011-01-04 A kind of method and system of strength uninstall

Country Status (1)

Country Link
CN (1) CN104679562B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106155740A (en) * 2016-06-30 2016-11-23 百度在线网络技术(北京)有限公司 For the method and apparatus carrying out Unloading Control

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101256498A (en) * 2008-03-25 2008-09-03 中兴通讯股份有限公司 Method and device for unloading terminal drive
CN101876914A (en) * 2010-04-23 2010-11-03 中兴通讯股份有限公司 Method for deleting files and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4082256B2 (en) * 2003-03-25 2008-04-30 ブラザー工業株式会社 Information processing apparatus and program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101256498A (en) * 2008-03-25 2008-09-03 中兴通讯股份有限公司 Method and device for unloading terminal drive
CN101876914A (en) * 2010-04-23 2010-11-03 中兴通讯股份有限公司 Method for deleting files and mobile terminal

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
《软件卸载跟我学》;王彦博等;《电脑知识与技术》;20100430;第19-20页 *
《软件完美卸载全攻略》;鞠华英等;《电脑知识与技术》;20061031;第27-29页 *
《顽固程序,请你出局》;乔珊;《软件》;20051231;第39-40页 *

Also Published As

Publication number Publication date
CN104679562A (en) 2015-06-03

Similar Documents

Publication Publication Date Title
CN102043655B (en) Method and system for carrying out advanced uninstall on software
CN100426298B9 (en) A kind of cleaning garbage files method and system
US7669059B2 (en) Method and apparatus for detection of hostile software
JP4807970B2 (en) Spyware and unwanted software management through autostart extension points
CN101641681B (en) Self-managed processing device
US8407189B2 (en) Finding and fixing stability problems in personal computer systems
CN104040496B (en) Terminal and application recovery method
US20130160126A1 (en) Malware remediation system and method for modern applications
CN105743730B (en) The method and its system of real time monitoring are provided for the web service of mobile terminal
JP5363305B2 (en) Method for determining the ID of an electronic device
CN106557384A (en) Based on the data processing method of Linux, device and system
WO2011085647A1 (en) Method and apparatus for detecting software installation
CN104536792A (en) Method and device for eliminating application program residual files
EP1903468A1 (en) Sharing management program, sharing management method, terminal, and sharing management system
WO2011130971A1 (en) Method and mobile terminal for deleting files
JP2010026662A (en) Information leakage prevention system
CN105868056B (en) Obtain the method, apparatus and secure virtual machine of deleted document in Windows virtual machine
CN107766068B (en) Application system patch installation method and device, computer equipment and storage medium
US9459976B1 (en) Repair of computers that have software-related problems
CN104679562B (en) A kind of method and system of strength uninstall
CN104200164B (en) Loader virus searching and killing method, device and terminal
CN106897063B (en) Method and system for permanently adding OS boot entry to BIOS based on EFI
KR101060596B1 (en) Malicious file detection system, malicious file detection device and method
CN103795771A (en) User terminal, reliability management server, and corresponding methods and programs
JP2008210151A (en) Failure prediction system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220728

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.