?
Solved

How to install NOD32 on laptop

Posted on 2006-11-03
6
Medium Priority
?
1,162 Views
Last Modified: 2012-05-05
Hi,

This isn't a firewall question - it's about AV. I have NOd32 on my desktop and would like to install it also on my laptop. How is it done??

Thank you!
0
Comment
Question by:Lucynka
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
6 Comments
 
LVL 1

Expert Comment

by:ACScomm
ID: 17873579
Please see the installation guide that you can find at: http://u4.eset.com/manuals/nod_v2_ig.pdf
This document will take you step by step through the installation process, if you have more questions after that, I will be happy to assist.
0
 
LVL 1

Author Comment

by:Lucynka
ID: 17875258
Thanks. I wasn't clear in my question, I'm afraid. My Nod32 is a downloaded version. I don't think I ever got the actual CD. MOst programs allow you to install one licensed version on your desktop and also on one laptop. How is it done with the downloaded version? Can I share it between my desktop and my laptop?

Thank you!
0
 
LVL 1

Expert Comment

by:ACScomm
ID: 17875405
The manual is for both CD & DL software installation, all you need to do is use the details that will be sent to you via Email when you register.
You can install on both laptop and desktop, but you will get only one usernam and password per invoice.
0
 
LVL 1

Author Comment

by:Lucynka
ID: 17876487
I went to Eset's website and here is what I found:

You can install NOD32 only on as many computers as you have licenses purchased in order to comply with license terms. However, you can transfer NOD32 on another computer provided that you uninstall it from the former one.

I sent a question to their technical team.
0
 
LVL 1

Accepted Solution

by:
DarthMod earned 0 total points
ID: 17929832
PAQd, 500 points refunded.

DarthMod
CS Moderator
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question