U S E R GU I D E
30
iChecker data are files that contain information about objects that have already been scanned using iChecker
technology.
Anti-Spam databases are databases containing specimens of spam messages added by the user.
Data Encryption are files placed in storage using Data Encryption functionality.
STEP 3. CONFIRMING APPLICATION REMOVAL
Since removing the application threatens the security of your computer and private data, you will be asked to confirm
your intention to remove the application. To do this, click the Remove button.
STEP 4. REMOVING THE APPLICATION. COMPLETING REMOVAL
During this step, the Wizard removes the application from your computer. Wait until removal is complete.
After you remove Kaspersky Internet Security, you can specify the reason why you decided to remove the application by
leaving a comment on the Kaspersky Lab website. To do this, visit the Kaspersky Lab website, by clicking the Complete
form button.
This functionality may be unavailable in some regions.
During removal of the application, you must restart your operating system. If you cancel an immediate restart, completion
of the removal procedure is postponed until the operating system is restarted or the computer is turned off and then
started up.
2006-2019 Rsmanuals.com