Solved

2 NAV's

Posted on 2004-10-05
1
216 Views
Last Modified: 2013-12-04
I recently updated my NIS withn the latest version.  what I had andn what I now have are both paid for versions. I don't think I remembered to uninstall the previous version and if I remember correctly, it appeared as if Norton did that during installation. I didn't give it any thought until I was at start>(right click)explore>local disc (C)>program files and happened to notice a folder titled "Norton Antivirus" and below it a file titled "Norton Internet Security". So I opened the NIS folder and as I suspected, inside was a folder titled "NortonAntiVirus". the NAV in a folder by itself is the old one. (I have no idea how it was and wasn't removed with the NIS that was originally with it.) it is around 13 and a half megs in size and propertiesshows it as having 115 files 0 folders. The NAV inside the NIS folder that was all downloaded recently shows similar properties to the other.... approx 13 and a half megs 118 files, 4 folders.
i am assuming i can delete the old NAV folder, yes?  and since it is not listed (NIS is but NAV isn't) in the add/remove programs, delete is my only option, yes? (other than keeping it but if i don't need it, why tie up 13 and one half megs of space when my C disc is already 2/3 full?) I just wanted a second opinion in case i am incorrect. thanks.
0
Comment
Question by:TwistedPrincess
1 Comment
 
LVL 12

Accepted Solution

by:
alandc earned 50 total points
ID: 12226381
Your best bet if you plan to delete something is to RENAME (I like to add .BAD to the end) or MOVE the folder to another location or drive.

The recycle bin is NOT a safe place to store anything. If everything runs okay for a while after rebooting you are probably okay to delete it.

Additionally, I would suggest that the files you found may be a download cache instead of the final installation location but that is ONLY a guess.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now