Modifying, repairing, and removing the program
209
remove the entire program. To execute the operation you need, click the appro-
priate button. The program‟s response depends on the operation you select.
Modifying the program is like custom program installation where you can specify
which components you want to install, and which you want to delete.
Repairing the program depends on the program components installed. The files
will be repaired for all components that are installed and the Recommended se-
curity level will be set for each of them.
If you remove the program, you can select which data created and used by the
program you want to save on your computer. To delete all Kaspersky Anti-Virus
data, select
Complete uninstall
. To save data, select
Save application
objects
and specify which objects not to delete from this list:
Activation information
– application key file.
Application databases
– complete set of signatures of dangerous pro-
grams, virus, and other threats current as of the last update.
Backup files
– backup copies of deleted or disinfected objects. You are
advised to save these, in case they can be restored later.
Quarantine files
– files that are potentially infected by viruses or modifi-
cations of them. These files contain code that is similar to code of a
known virus but it is difficult to determine if they are malicious. You are
advised to save them, since they could actually not be infected, or they
could be disinfected after the application databases are updated.
Protection settings
– configurations for all program components.
iSwift data
– database with information on objects scanned on NTFS file
systems, which can increase scan speed. When it uses this database,
Kaspersky Anti-Virus only scans the files that have been modified since
the last scan.
Warning!
If a long period of time elapses between uninstalling one version of
Kaspersky Anti-Virus and installing another, you are advised not to use
the
iSwift
database from a previous installation. A dangerous program
could penetrate the computer during this period and its effects would
not be detected by the database, which could lead to an infection.
To start the operation selected, click the
Next
button. The program will begin
copying the necessary files to your computer or deleting the selected compo-
nents and data.