OWASP Zed Attack Proxy 2.6.0
How to uninstall OWASP Zed Attack Proxy 2.6.0 from your system
OWASP Zed Attack Proxy 2.6.0 is a computer program. This page is comprised of details on how to remove it from your PC. The Windows version was developed by
OWASP ZAP. Check out
here for more details on OWASP ZAP. Click on
https://www.owasp.org/index.php/ZAP to get more facts about OWASP Zed Attack Proxy 2.6.0 on OWASP ZAP's website. OWASP Zed Attack Proxy 2.6.0 is normally set up in the C:\Program Files\OWASP\Zed Attack Proxy folder, depending on the user's option. OWASP Zed Attack Proxy 2.6.0's complete uninstall command line is C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe. The program's main executable file occupies 78.03 KB (79904 bytes) on disk and is titled i4jdel.exe.
OWASP Zed Attack Proxy 2.6.0 is composed of the following executables which take 1.06 MB (
1107488 bytes) on disk:
- uninstall.exe (609.00 KB)
- ZAP.exe (394.50 KB)
- i4jdel.exe (78.03 KB)
The current page applies to OWASP Zed Attack Proxy 2.6.0 version
2.6.0 alone.
Some files and registry entries are frequently left behind when you uninstall OWASP Zed Attack Proxy 2.6.0.
Folders remaining:- C:\Program Files\OWASP\Zed Attack Proxy
The files below remain on your disk by OWASP Zed Attack Proxy 2.6.0's application uninstaller when you removed it:- C:\Program Files\OWASP\Zed Attack Proxy\AcceptedLicense
- C:\Program Files\OWASP\Zed Attack Proxy\db\db.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\hsqldb.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.schema
- C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.script
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ar_SA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_az_AZ.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bn_BD.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bs_BA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_da_DK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_de_DE.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_el_GR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_es_ES.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fa_IR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fil_PH.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fr_FR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hi_IN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hr_HR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hu_HU.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_id_ID.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_it_IT.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ja_JP.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ko_KR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_mk_MK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ms_MY.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nb_NO.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nl_NL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pl_PL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pt_BR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ro_RO.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ru_RU.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_si_LK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sk_SK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sl_SI.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sq_AL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_CS.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_SP.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_tr_TR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_uk_UA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ur_PK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_vi_VN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_zh_CN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ar_SA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_az_AZ.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bn_BD.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bs_BA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_da_DK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_de_DE.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_el_GR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_es_ES.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fa_IR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fil_PH.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fr_FR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hi_IN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hr_HR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hu_HU.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_id_ID.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_it_IT.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ja_JP.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ko_KR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_mk_MK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ms_MY.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nb_NO.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nl_NL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pl_PL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pt_BR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ro_RO.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ru_RU.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_si_LK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sk_SK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sl_SI.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sq_AL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_CS.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_SP.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_tr_TR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_uk_UA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ur_PK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_vi_VN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_zh_CN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcmail-jdk15on-152.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcpkix-jdk15on-152.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcprov-jdk15on-152.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\BrowserLauncher2-1_3.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-beanutils-1.8.3.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-codec-1.9.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-collections-3.2.2.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-configuration-1.9.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-csv-1.1.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-httpclient-3.1.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-io-2.4.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-jxpath-1.3.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-lang-2.6.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-logging-1.2.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-logging-api-1.1.1.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\diffutils-1.2.1.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\ezmorph-1.0.6.jar
Frequently the following registry keys will not be cleaned:- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\OWASP ZAP
A way to remove OWASP Zed Attack Proxy 2.6.0 from your PC with the help of Advanced Uninstaller PRO
OWASP Zed Attack Proxy 2.6.0 is a program by OWASP ZAP. Frequently, people decide to erase this program. Sometimes this is easier said than done because removing this by hand requires some knowledge related to removing Windows programs manually. The best EASY manner to erase OWASP Zed Attack Proxy 2.6.0 is to use Advanced Uninstaller PRO. Take the following steps on how to do this:
1. If you don't have Advanced Uninstaller PRO on your PC, add it. This is a good step because Advanced Uninstaller PRO is a very efficient uninstaller and general tool to clean your computer.
DOWNLOAD NOW- go to Download Link
- download the program by pressing the DOWNLOAD NOW button
- set up Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. Take your time to admire Advanced Uninstaller PRO's design and wealth of functions available. Advanced Uninstaller PRO is a very good PC management program.
3. Click on the General Tools button

4. Press the Uninstall Programs feature

5. A list of the programs installed on your computer will appear
6. Navigate the list of programs until you locate OWASP Zed Attack Proxy 2.6.0 or simply activate the Search field and type in "OWASP Zed Attack Proxy 2.6.0". The OWASP Zed Attack Proxy 2.6.0 app will be found very quickly. Notice that after you select OWASP Zed Attack Proxy 2.6.0 in the list of apps, some information about the application is available to you:
- Star rating (in the lower left corner). The star rating tells you the opinion other people have about OWASP Zed Attack Proxy 2.6.0, ranging from "Highly recommended" to "Very dangerous".
- Reviews by other people - Click on the Read reviews button.
- Technical information about the app you wish to uninstall, by pressing the Properties button.
For example you can see that for OWASP Zed Attack Proxy 2.6.0:
- The software company is: https://www.owasp.org/index.php/ZAP
- The uninstall string is: C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe
7. Press the Uninstall button. A window asking you to confirm will appear. accept the removal by pressing Uninstall. Advanced Uninstaller PRO will automatically remove OWASP Zed Attack Proxy 2.6.0.

8. After removing OWASP Zed Attack Proxy 2.6.0, Advanced Uninstaller PRO will offer to run a cleanup. Click Next to proceed with the cleanup. All the items that belong OWASP Zed Attack Proxy 2.6.0 which have been left behind will be detected and you will be able to delete them. By removing OWASP Zed Attack Proxy 2.6.0 with Advanced Uninstaller PRO, you are assured that no Windows registry items, files or folders are left behind on your PC.
Your Windows system will remain clean, speedy and ready to take on new tasks.
Disclaimer
The text above is not a piece of advice to uninstall OWASP Zed Attack Proxy 2.6.0 by OWASP ZAP from your PC, nor are we saying that OWASP Zed Attack Proxy 2.6.0 by OWASP ZAP is not a good application for your computer. This page simply contains detailed info on how to uninstall OWASP Zed Attack Proxy 2.6.0 supposing you decide this is what you want to do. Here you can find registry and disk entries that our application Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' computers.
Last update on: 2017-06-01 22:53:20.200