Programs that track system
activity, gather system
information, or track user
habits, and relay this
information to third-party
organizations. The
information that is gathered
by such programs is neither
personally identifiable nor
confidential. Trackware
programs are installed with
the user's consent, and may
also be packaged as part of
other software that is
installed by the user.
Trackware
Downloading the Norton Bootable Recovery Tool
Wizard
If your attempt to install a Norton product fails, you
can download the Norton Bootable Recovery Tool
Wizard. This easy-to-use wizard helps you create
Norton Bootable Recovery Tool on a CD, DVD, or USB
key. You can use Norton Bootable Recovery Tool to
scan your computer and remove any security threats
that prevent successful installation.
It is recommended that you download and install
Norton Bootable Recovery Tool Wizard on a computer
that does not have any security threats and create
Norton Bootable Recovery Tool. If you create Norton
Bootable Recovery Tool on an infected computer, there
is a chance that the recovery CD, DVD, or USB key
might get infected.
w
To use Norton Bootable Recovery Tool, you must use
the product key of the Norton product that you
purchased. If you use a trial version of Norton
AntiVirus, you need to create a Norton Account to
receive a product key to use Norton Bootable Recovery
Tool.
39
Getting started
About Norton Bootable Recovery Tool
Summary of Contents for 10067161 - 10PK NORTON ANTIVIRUS
Page 30: ...Safe Web Lite Getting started About Norton AntiVirus main window 30...
Page 60: ...Getting started About Network Proxy settings 60...
Page 134: ...Trust Level Protecting your files and data About the Norton AntiVirus scans 134...
Page 271: ...Updates 271 Customizing protection features About customizing settings and options...
Page 276: ...Message Protection Customizing protection features About customizing settings and options 276...
Page 285: ...Other Settings 285 Customizing protection features About customizing settings and options...
Page 293: ...Product Security 293 Customizing protection features About customizing settings and options...
Page 306: ...Customizing protection features About customizing settings and options 306...
Page 324: ...Finding additional solutions About uninstalling 324...