?
Solved

2 NAV's

Posted on 2004-10-05
1
Medium Priority
?
227 Views
Last Modified: 2013-12-04
I recently updated my NIS withn the latest version.  what I had andn what I now have are both paid for versions. I don't think I remembered to uninstall the previous version and if I remember correctly, it appeared as if Norton did that during installation. I didn't give it any thought until I was at start>(right click)explore>local disc (C)>program files and happened to notice a folder titled "Norton Antivirus" and below it a file titled "Norton Internet Security". So I opened the NIS folder and as I suspected, inside was a folder titled "NortonAntiVirus". the NAV in a folder by itself is the old one. (I have no idea how it was and wasn't removed with the NIS that was originally with it.) it is around 13 and a half megs in size and propertiesshows it as having 115 files 0 folders. The NAV inside the NIS folder that was all downloaded recently shows similar properties to the other.... approx 13 and a half megs 118 files, 4 folders.
i am assuming i can delete the old NAV folder, yes?  and since it is not listed (NIS is but NAV isn't) in the add/remove programs, delete is my only option, yes? (other than keeping it but if i don't need it, why tie up 13 and one half megs of space when my C disc is already 2/3 full?) I just wanted a second opinion in case i am incorrect. thanks.
0
Comment
Question by:TwistedPrincess
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 12

Accepted Solution

by:
alandc earned 200 total points
ID: 12226381
Your best bet if you plan to delete something is to RENAME (I like to add .BAD to the end) or MOVE the folder to another location or drive.

The recycle bin is NOT a safe place to store anything. If everything runs okay for a while after rebooting you are probably okay to delete it.

Additionally, I would suggest that the files you found may be a download cache instead of the final installation location but that is ONLY a guess.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month9 days, 1 hour left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question