Publishers

Acer eDataSecurity Management Acer eDataSecurity Management





A way to uninstall Acer eDataSecurity Management from your PC

You can find below detailed information on how to remove Acer eDataSecurity Management for Windows. It was coded for Windows by Egis Inc.. You can read more on Egis Inc. or check for application updates here. Click on to get more details about Acer eDataSecurity Management on Egis Inc.'s website. The program is frequently located in the C:\Program Files\Acer\Empowering Technology\eDataSecurity directory. Take into account that this location can differ depending on the user's choice. The full command line for removing Acer eDataSecurity Management is C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSnstHelper.exe -Operation UNINSTALL. Note that if you will type this command in Start / Run Note you might receive a notification for administrator rights. The application's main executable file occupies 474.55 KB (485936 bytes) on disk and is called eDStbmngr.exe.

The following executable files are incorporated in Acer eDataSecurity Management. They occupy 11.93 MB (12512800 bytes) on disk.

  • eDSMgr.exe (1.37 MB)
  • eDScsp.exe (518.55 KB)
  • eDSfsu.exe (734.55 KB)
  • eDSLoader.exe (548.05 KB)
  • eDStbmngr.exe (500.05 KB)
  • eDS_CCPSD.exe (463.55 KB)
  • Decryption.exe (910.55 KB)
  • eDScsp.exe (502.55 KB)
  • eDSDTS.exe (615.05 KB)
  • eDSfsu.exe (635.55 KB)
  • eDSLoader.exe (514.55 KB)
  • edsMsgrProxy.exe (434.55 KB)
  • eDSMSNLoader32.exe (444.05 KB)
  • eDSnstHelper.exe (486.55 KB)
  • eDSrf.exe (459.05 KB)
  • eDSService.exe (489.05 KB)
  • eDStbmngr.exe (474.55 KB)
  • eDS_CCPSD.exe (454.05 KB)
  • EgisYahooAPIOffsets.exe (74.55 KB)
  • Encryption.exe (904.55 KB)
  • IMSignInPrompt.exe (138.55 KB)
  • MsnVane.exe (514.55 KB)
...click to view all...

This web page is about Acer eDataSecurity Management version 3.0.3065 alone. You can find below a few links to other Acer eDataSecurity Management versions:

...click to view all...
Acer eDataSecurity Management has the habit of leaving behind some leftovers.

Folders remaining:
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity

The files below are left behind on your disk by Acer eDataSecurity Management when you uninstall it:
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\Acer.Empowering.Framework.Interface.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\acer.empowering.windows.forms.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\AxInterop.ShockwaveFlashObjects.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\DecryptionGuide.html
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\eDataSecurity.bak
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\eDataSecurity.dat
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\EDS.Windows.Forms.25.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\EDS.Windows.Forms.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\eDSMgr.exe
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\eDSplugin.25.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\eDSPlugin.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_CZ.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_DA.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_DE.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_DU.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_EN.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_ES.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_FI.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_FR.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_GR.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_HU.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_IT.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_JP.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_NO.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_PL.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_PT.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_RU.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_SC.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_SV.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_TC.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\2.8\eDataSecurity_TU.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_BG.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_CZ.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_DA.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_DE.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_DU.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_EN.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_ES.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_ET.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_FI.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_FR.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_GR.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_HR.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_HU.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_IT.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_JP.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_LT.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_LV.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_NO.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_PL.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_PT.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_RO.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_RU.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_SC.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_SK.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_SL.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_SV.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_TC.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\eDataSecurity_TU.chm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\ReleaseNotes.htm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\help\ReleaseNotes2.8.htm
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\HTCA_SelfExtract.bin
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\eDataSecurity.png
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\eDataSecurity_Commercial_N.png
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\eDataSecurity_consumer_D120_H.png
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\eDataSecurity_consumer_D120_N.png
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\eDataSecurity_consumer_D120_P.png
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\eDataSecurity_consumer_D96_H.png
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\eDataSecurity_consumer_D96_N.png
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\eDataSecurity_consumer_D96_P.png
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\eds.ico
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\MenuIcon.png
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\MenuTitle.png
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\icon\psdDrive.ico
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\Interop.ShockwaveFlashObjects.dll
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_BG.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_CZ.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_DA.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_DE.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_DU.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_EN.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_ES.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_ET.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_FI.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_FR.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_GR.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_HR.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_HU.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_IT.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_JP.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_LT.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_LV.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_NO.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_PL.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_PT.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_RO.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_RU.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_SC.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_SK.ini
  • C:\Program Files\Acer\Empowering Technology\eDataSecurity\locale\eDataSecurity_SL.ini

Registry keys:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2563365A59739284BBB046F420972E97
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{A5633652-3795-4829-BB0B-644F0279E279}

Open regedit.exe in order to remove the following values:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2563365A59739284BBB046F420972E97\ProductName
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Program Files\Acer\Empowering Technology\eDataSecurity\
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Folders\C:\Windows\Installer\{A5633652-3795-4829-BB0B-644F0279E279}\
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\eDataSecurity Service\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Acer\Empowering Technology\eDataSecurity\x64\decryption.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Acer\Empowering Technology\eDataSecurity\x64\eDSfsu.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Acer\Empowering Technology\eDataSecurity\x64\eDSMgr.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Acer\Empowering Technology\eDataSecurity\x64\eDStbmngr.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Acer\Empowering Technology\eDataSecurity\x64\encryption.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\decryption.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSfsu.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSMgr.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDStbmngr.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\encryption.exe


How to uninstall Acer eDataSecurity Management from your computer with the help of Advanced Uninstaller PRO

Acer eDataSecurity Management is an application released by the software company Egis Inc.. Sometimes, people decide to remove this program. This can be hard because performing this manually requires some knowledge related to Windows program uninstallation. One of the best EASY practice to remove Acer eDataSecurity Management is to use Advanced Uninstaller PRO. Take the following steps on how to do this:





1. If you don't have Advanced Uninstaller PRO on your Windows PC, install it. This is good because Advanced Uninstaller PRO is a very potent uninstaller and all around tool to take care of your Windows system.

DOWNLOAD NOW

  • navigate to Download Link
  • download the setup by pressing the DOWNLOAD button
  • set up Advanced Uninstaller PRO
2. Run Advanced Uninstaller PRO. Take some time to admire the program's interface and wealth of tools available. Advanced Uninstaller PRO is a very useful Windows tool.

3. Press the General Tools button
Go to General Tools


4. Press the Uninstall Programs feature
Go to Uninstall Programs


5. All the applications installed on your PC will appear

6. Navigate the list of applications until you locate Acer eDataSecurity Management or simply click the Search field and type in "Acer eDataSecurity Management". If it exists on your system the Acer eDataSecurity Management app will be found very quickly. After you click Acer eDataSecurity Management in the list of applications, the following data regarding the program is made available to you:


  • Star rating (in the lower left corner). The star rating explains the opinion other people have regarding Acer eDataSecurity Management, from "Highly recommended" to "Very dangerous".
  • Reviews by other people - Press the Read reviews button.
  • Technical information regarding the application you want to remove, by pressing the Properties button.
For instance you can see that for Acer eDataSecurity Management:





  • The web site of the application is: http://www.hiegis.com
  • The uninstall string is: C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSnstHelper.exe -Operation UNINSTALL
7. Click the Uninstall button. A confirmation window will appear. accept the uninstall by clicking the Uninstall button. Advanced Uninstaller PRO will automatically remove Acer eDataSecurity Management.
Uninstall Acer eDataSecurity Management


8. After uninstalling Acer eDataSecurity Management, Advanced Uninstaller PRO will offer to run a cleanup. Click Next to go ahead with the cleanup. All the items of Acer eDataSecurity Management that have been left behind will be found and you will be able to delete them. By uninstalling Acer eDataSecurity Management with Advanced Uninstaller PRO, you are assured that no registry items, files or folders are left behind on your disk.

Your system will remain clean, speedy and able to take on new tasks.



Geographical user distribution

  • 10.0
  • Windows Vista (6.0)
  • Windows 8.1 (6.3)
  • Windows 7 (6.1)
Software Application


Disclaimer

The text above is not a recommendation to remove Acer eDataSecurity Management by Egis Inc. from your PC, nor are we saying that Acer eDataSecurity Management by Egis Inc. is not a good application. This text simply contains detailed info on how to remove Acer eDataSecurity Management in case you want to. Here you can find registry and disk entries that our application Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' PCs.

2016-06-19 / Written by Daniel Statescu for Advanced Uninstaller PRO

follow @DanielStatescu
Last update on: 2016-06-19 20:40:38.767