Skip to main content

Removing Norton Anti-virus 2004, How to remove the Registry Enteries

NETWORK TECH WORLD  Found this on the Norton Web site.

I finally got fed up with Norton 2004 AV and switched to Avast.

Had lots of problems removing Norton, lots of stuff left over in the registry.

After a few Google searches, I found this.


http://service1.symantec.com/SUPPORT/nav.nsf/docid/2004020909040706?Open&src=&docid=2001092114452606&nsf=nav.nsf&view=df0a595864594c86852567ac0063608c&dtype=&prod=&ver=&osv=&osv_lvl=


FYI, this is from the Symantec.com Site, so I am guessing it is nice and safe

If you scroll down to the "Removal instructions" the first option is "To remove Norton AntiVirus from the registry" Click on the Plus sign and you can down load the removal tool (it is a .reg file that removes all the keys for Norton.)

Direct Link for the file:

ftp://ftp.symantec.com/misc/consumer/nav/nav2004xp_reg_removal.reg


After I got done, Avast started working right and my system seemed to be running alot better. (after Avast found 14 virues that Norton did not find.) 

Comments

Popular posts from this blog

What is network

NETWORK TECH WORLD What is network  A network is a group of devices, such as computers, servers, and printers, that are connected together and able to communicate with each other. Networks can be classified based on their size and scope, such as a local area network (LAN), which is a network that is confined to a small area, such as a single building or campus, or a wide area network (WAN), which is a network that spans a large geographical area, such as a city or a country. Networks can also be classified based on their communication protocols, such as the Internet, which is a global network that uses the Internet Protocol (IP) to connect devices around the world.

Ten Keyboard Shortcuts Everyone Should Know

NETWORK TECH WORLD  Ten Keyboard Shortcuts Everyone Should Know Using keyboard shortcuts is the easiest way to save you time and effort when you need to access commonly used symbols or processes. Indeed, navigating through shortcuts will keep your internet browsing fast and sharp. You can use shortcuts to inserts symbols instead of spending hours searching the internet for them and subsequently continuously copying and pasting them throughout your work. Some of the most used symbols in business are available in a three key combo. Pressing and holding Ctrl and Alt  and adding a letter to the combination will serve up the symbol. If you add C, you’ll deliver a ©. R, returns ®. T displays ™.  E shows € and the L creates a numbered list 1) 2). Lost Symbols © Ctrl Alt C ® Ctrl Alt R ™ Ctrl Alt T € Ctrl Alt E 3) Ctrl Alt L There’s a great little time saver if you’re working on many documents, across different programs at the same time. Instead of having

Tcp model

NETWORK TECH WORLD Tcp Model  The Transmission Control Protocol (TCP) is a transport layer protocol that is used to establish and maintain a connection between two computers in a network. It is a reliable, stream-oriented protocol that ensures that data is delivered in the correct order and without any errors. The TCP model is a simple, four-layer model that explains how TCP works: Application layer: This is the top layer of the model and is responsible for providing the interface between the application and the network. It is responsible for translating the messages sent by the application into a format that can be transmitted over the network. Transport layer: The transport layer is responsible for providing end-to-end communication between the two computers. It ensures that the data is delivered reliably and in the correct order, and it also provides flow control and error checking. Network layer: The network layer is responsible for routing the data across the network. It determine