OWASP Zed Attack Proxy 2.9.0
A guide to uninstall OWASP Zed Attack Proxy 2.9.0 from your computer
This info is about OWASP Zed Attack Proxy 2.9.0 for Windows. Here you can find details on how to remove it from your PC. It was created for Windows by
OWASP ZAP. Open
here where you can read more on OWASP ZAP. You can see more info related to OWASP Zed Attack Proxy 2.9.0 at
https://www.zaproxy.org/. OWASP Zed Attack Proxy 2.9.0 is usually set up in the C:\Program Files\OWASP\Zed Attack Proxy directory, depending on the user's decision. You can uninstall OWASP Zed Attack Proxy 2.9.0 by clicking on the Start menu of Windows and pasting the command line C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe. Note that you might get a notification for administrator rights. OWASP Zed Attack Proxy 2.9.0's main file takes around 78.48 KB (80368 bytes) and its name is i4jdel.exe.
OWASP Zed Attack Proxy 2.9.0 is composed of the following executables which occupy 597.48 KB (
611824 bytes) on disk:
- uninstall.exe (369.50 KB)
- ZAP.exe (149.50 KB)
- i4jdel.exe (78.48 KB)
This web page is about OWASP Zed Attack Proxy 2.9.0 version
2.9.0 alone.
If you are manually uninstalling OWASP Zed Attack Proxy 2.9.0 we advise you to check if the following data is left behind on your PC.
Directories found on disk:- C:\Program Files\OWASP\Zed Attack Proxy
Usually, the following files remain on disk:- C:\Program Files\OWASP\Zed Attack Proxy\db\db.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\hsqldb.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.schema
- C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.script
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ar_SA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_az_AZ.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bn_BD.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bs_BA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ceb_PH.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_da_DK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_de_DE.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_el_GR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_es_ES.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fa_IR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fil_PH.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fr_FR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ha_HG.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_he_IL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hi_IN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hr_HR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hu_HU.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_id_ID.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_it_IT.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ja_JP.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ko_KR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_mk_MK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ms_MY.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nb_NO.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nl_NL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pcm_NG.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pl_PL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pt_BR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pt_PT.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ro_RO.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ru_RU.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_si_LK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sk_SK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sl_SI.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sq_AL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_CS.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_SP.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_tr_TR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_uk_UA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ur_PK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_vi_VN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_yo_NG.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_zh_CN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ar_SA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_az_AZ.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bn_BD.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bs_BA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ceb_PH.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_da_DK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_de_DE.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_el_GR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_es_ES.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fa_IR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fil_PH.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fr_FR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ha_HG.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_he_IL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hi_IN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hr_HR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hu_HU.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_id_ID.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_it_IT.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ja_JP.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ko_KR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_mk_MK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ms_MY.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nb_NO.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nl_NL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pcm_NG.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pl_PL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pt_BR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pt_PT.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ro_RO.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ru_RU.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_si_LK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sk_SK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sl_SI.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sq_AL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_CS.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_SP.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_tr_TR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_uk_UA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ur_PK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_vi_VN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_yo_NG.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_zh_CN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcmail-jdk15on-1.64.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcpkix-jdk15on-1.64.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcprov-jdk15on-1.64.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-beanutils-1.9.4.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-codec-1.13.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-collections-3.2.2.jar
Registry keys:- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\OWASP ZAP
A way to delete OWASP Zed Attack Proxy 2.9.0 from your computer with the help of Advanced Uninstaller PRO
OWASP Zed Attack Proxy 2.9.0 is an application by the software company OWASP ZAP. Sometimes, computer users choose to erase this program. Sometimes this is hard because deleting this manually takes some skill regarding PCs. The best SIMPLE manner to erase OWASP Zed Attack Proxy 2.9.0 is to use Advanced Uninstaller PRO. Take the following steps on how to do this:
1. If you don't have Advanced Uninstaller PRO already installed on your Windows system, add it. This is good because Advanced Uninstaller PRO is a very useful uninstaller and all around utility to maximize the performance of your Windows computer.
DOWNLOAD NOW- visit Download Link
- download the setup by pressing the green DOWNLOAD NOW button
- set up Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. Take some time to get familiar with Advanced Uninstaller PRO's interface and wealth of functions available. Advanced Uninstaller PRO is a very good system optimizer.
3. Click on the General Tools category

4. Activate the Uninstall Programs feature

5. A list of the applications installed on the computer will be shown to you
6. Navigate the list of applications until you find OWASP Zed Attack Proxy 2.9.0 or simply activate the Search feature and type in "OWASP Zed Attack Proxy 2.9.0". If it is installed on your PC the OWASP Zed Attack Proxy 2.9.0 application will be found automatically. When you click OWASP Zed Attack Proxy 2.9.0 in the list of apps, the following data about the program is available to you:
- Safety rating (in the lower left corner). This explains the opinion other users have about OWASP Zed Attack Proxy 2.9.0, ranging from "Highly recommended" to "Very dangerous".
- Opinions by other users - Click on the Read reviews button.
- Technical information about the program you want to uninstall, by pressing the Properties button.
For example you can see that for OWASP Zed Attack Proxy 2.9.0:
- The publisher is: https://www.zaproxy.org/
- The uninstall string is: C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe
7. Click the Uninstall button. A window asking you to confirm will come up. Confirm the removal by clicking Uninstall. Advanced Uninstaller PRO will automatically uninstall OWASP Zed Attack Proxy 2.9.0.

8. After uninstalling OWASP Zed Attack Proxy 2.9.0, Advanced Uninstaller PRO will offer to run a cleanup. Click Next to start the cleanup. All the items that belong OWASP Zed Attack Proxy 2.9.0 that have been left behind will be detected and you will be able to delete them. By uninstalling OWASP Zed Attack Proxy 2.9.0 using Advanced Uninstaller PRO, you can be sure that no Windows registry entries, files or folders are left behind on your disk.
Your Windows PC will remain clean, speedy and able to serve you properly.
Disclaimer
This page is not a piece of advice to uninstall OWASP Zed Attack Proxy 2.9.0 by OWASP ZAP from your computer, we are not saying that OWASP Zed Attack Proxy 2.9.0 by OWASP ZAP is not a good application for your PC. This text simply contains detailed instructions on how to uninstall OWASP Zed Attack Proxy 2.9.0 in case you decide this is what you want to do. The information above contains registry and disk entries that other software left behind and Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' PCs.
Last update on: 2020-02-05 03:44:11.370