Publishers

Acer Empowering Technology Acer Empowering Technology





A guide to uninstall Acer Empowering Technology from your PC

This page contains detailed information on how to remove Acer Empowering Technology for Windows. It is produced by Acer Incorporated. More information on Acer Incorporated can be seen here. You can get more details on Acer Empowering Technology at . Acer Empowering Technology is normally installed in the C:\Program Files\Acer\Empowering Technology directory, however this location can vary a lot depending on the user's option when installing the program. Acer Empowering Technology's full uninstall command line is C:\Program Files\InstallShield Installation Information\{8F1B6239-FEA0-450A-A950-B05276CE177C}\setup.exe. The program's main executable file has a size of 312.00 KB (319488 bytes) on disk and is titled Framework.Launcher.exe.

The following executables are incorporated in Acer Empowering Technology. They take 12.95 MB (13578784 bytes) on disk.

  • Framework.Launcher.exe (312.00 KB)
  • SysMonitor.exe (312.00 KB)
  • WMIAcerCheck.exe (20.00 KB)
  • eDSMgr.exe (1.37 MB)
  • eDScsp.exe (518.55 KB)
  • eDSfsu.exe (735.05 KB)
  • eDSLoader.exe (547.55 KB)
  • eDStbmngr.exe (500.05 KB)
  • eDS_CCPSD.exe (463.55 KB)
  • Decryption.exe (910.55 KB)
  • eDScsp.exe (502.55 KB)
  • eDSDTS.exe (615.05 KB)
  • eDSfsu.exe (636.55 KB)
  • eDSLoader.exe (514.55 KB)
  • edsMsgrProxy.exe (434.55 KB)
  • eDSMSNLoader32.exe (444.05 KB)
  • eDSnstHelper.exe (486.55 KB)
  • eDSrf.exe (459.05 KB)
  • eDSService.exe (489.05 KB)
  • eDStbmngr.exe (474.55 KB)
  • eDS_CCPSD.exe (454.05 KB)
  • EgisYahooAPIOffsets.exe (74.55 KB)
  • Encryption.exe (904.55 KB)
  • IMSignInPrompt.exe (138.55 KB)
  • MsnVane.exe (514.55 KB)
  • GACInstaller.exe (28.00 KB)
  • Framework.NotificationCenter.exe (368.00 KB)
...click to view all...

The current page applies to Acer Empowering Technology version 3.0.3008 only. You can find below info on other versions of Acer Empowering Technology:

...click to view all...
Some files and registry entries are regularly left behind when you uninstall Acer Empowering Technology.

Folders left behind when you uninstall Acer Empowering Technology:
  • C:\Program Files\Acer\Empowering Technology

The files below are left behind on your disk by Acer Empowering Technology's application uninstaller when you removed it:
  • C:\Program Files\Acer\Empowering Technology\bg\Framework.AppBar.resources.dll
  • C:\Program Files\Acer\Empowering Technology\bg\Framework.Launcher.resources.dll
  • C:\Program Files\Acer\Empowering Technology\check_process.dll
  • C:\Program Files\Acer\Empowering Technology\cs\Framework.AppBar.resources.dll
  • C:\Program Files\Acer\Empowering Technology\cs\Framework.Launcher.resources.dll
  • C:\Program Files\Acer\Empowering Technology\da\Framework.AppBar.resources.dll
  • C:\Program Files\Acer\Empowering Technology\da\Framework.Launcher.resources.dll
  • C:\Program Files\Acer\Empowering Technology\de\Framework.AppBar.resources.dll
  • C:\Program Files\Acer\Empowering Technology\de\Framework.Launcher.resources.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\Acer.Empowering.Framework.Interface.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\acer.empowering.windows.forms.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\AxInterop.ShockwaveFlashObjects.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\EDS.Windows.Forms.25.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\EDS.Windows.Forms.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\eDSMgr.exe
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\eDSplugin.25.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\eDSPlugin.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\eds.ico
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\psdDrive.ico
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\Interop.ShockwaveFlashObjects.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_BG.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_CZ.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_DA.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_DE.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_DU.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_EN.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_ES.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_ET.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_FI.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_FR.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_GR.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_HR.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_HU.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_IT.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_JP.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_LT.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_LV.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_NO.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_PL.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_PT.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_RO.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_RU.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_SC.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_SK.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_SL.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_SV.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_TC.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_TU.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20061012.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20080430.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20081222.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20081223.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20081224.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20081226.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20081229.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20081231.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090102.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090105.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090111.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090112.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090116.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090201.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090202.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090205.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090208.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090209.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090228.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090301.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090303.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090311.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090312.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090313.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090314.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090315.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090320.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090321.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090324.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090409.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090617.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090619.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090721.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090726.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090727.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090730.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090801.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090802.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090808.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090820.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20090901.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20091108.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20100112.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20100519.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20100523.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20100620.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20100702.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20100713.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20100730.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20100813.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20100830.log
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\log\UserName_CLASS_LIB-20100911.log

Use regedit.exe to manually remove from the Windows Registry the keys below:
  • HKEY_CURRENT_USER\Software\Acer\Empowering Technology 3.0
  • HKEY_LOCAL_MACHINE\Software\Acer Incorporated\Acer Empowering Technology
  • HKEY_LOCAL_MACHINE\Software\Acer\Empowering Technology 3.0
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{8F1B6239-FEA0-450A-A950-B05276CE177C}

Use regedit.exe to remove the following additional values from the Windows Registry:
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\Acer\Empowering Technology\eDataSecurity\
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\eDataSecurity Service\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ETService\ImagePath


How to delete Acer Empowering Technology using Advanced Uninstaller PRO

Acer Empowering Technology is an application marketed by Acer Incorporated. Sometimes, people try to remove it. This is easier said than done because performing this manually takes some knowledge regarding PCs. The best EASY solution to remove Acer Empowering Technology is to use Advanced Uninstaller PRO. Here are some detailed instructions about how to do this:





1. If you don't have Advanced Uninstaller PRO on your system, install it. This is good because Advanced Uninstaller PRO is one of the best uninstaller and general tool to optimize your computer.

DOWNLOAD NOW

  • visit Download Link
  • download the program by pressing the DOWNLOAD NOW button
  • set up Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. Take your time to get familiar with the program's interface and wealth of tools available. Advanced Uninstaller PRO is a very useful PC management program.

3. Click on the General Tools category
Go to General Tools


4. Activate the Uninstall Programs feature
Go to Uninstall Programs


5. All the applications installed on the PC will be shown to you

6. Scroll the list of applications until you find Acer Empowering Technology or simply click the Search field and type in "Acer Empowering Technology". The Acer Empowering Technology application will be found automatically. Notice that after you click Acer Empowering Technology in the list , some data regarding the application is made available to you:


  • Safety rating (in the lower left corner). This tells you the opinion other people have regarding Acer Empowering Technology, from "Highly recommended" to "Very dangerous".
  • Reviews by other people - Click on the Read reviews button.
  • Technical information regarding the application you wish to remove, by pressing the Properties button.
For example you can see that for Acer Empowering Technology:





  • The web site of the program is: http://www.acer.com
  • The uninstall string is: C:\Program Files\InstallShield Installation Information\{8F1B6239-FEA0-450A-A950-B05276CE177C}\setup.exe
7. Click the Uninstall button. A confirmation window will show up. accept the removal by clicking the Uninstall button. Advanced Uninstaller PRO will uninstall Acer Empowering Technology.
Uninstall Acer Empowering Technology


8. After removing Acer Empowering Technology, Advanced Uninstaller PRO will ask you to run an additional cleanup. Click Next to go ahead with the cleanup. All the items of Acer Empowering Technology that have been left behind will be detected and you will be asked if you want to delete them. By uninstalling Acer Empowering Technology using Advanced Uninstaller PRO, you can be sure that no Windows registry entries, files or directories are left behind on your computer.

Your Windows PC will remain clean, speedy and able to run without errors or problems.



Geographical user distribution

  • Windows Vista (6.0)
  • 10.0
  • Windows 7 (6.1)
Software Application


Disclaimer

This page is not a piece of advice to uninstall Acer Empowering Technology by Acer Incorporated from your PC, we are not saying that Acer Empowering Technology by Acer Incorporated is not a good application. This text simply contains detailed instructions on how to uninstall Acer Empowering Technology supposing you decide this is what you want to do. Here you can find registry and disk entries that Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' computers.

2016-07-20 / Written by Daniel Statescu for Advanced Uninstaller PRO

follow @DanielStatescu
Last update on: 2016-07-19 22:41:12.447