It's not listed there. We got around it by putting a folder on the desktop
called "Cannot Remove" and dragged them into that folder. They'll have to
sit there forever. The HP tech downloaded a Norton tool to get rid of
Norton.
It seems like an unnecessary hack. But if it worked for you then use
it.
You are not on XP and Win 7 is protecting the Program System32.
I can see W-7 protecting programs that MS added, even if not wanted, but two
of these were added by me.
No your user account installed nothing if in fact you did use install
software to install the software.
The account used to install the software is the Trusted Installer
account which control was relinquished to that account to do.the
install. If the Trusted Installer account installed it, then that
account must be used to remove it.
Or you could have put the admin user group on the folder with the
permissions needed to remove it manually. But that would require that
you knew how to do it.
Apparenty I found the wrong "hidden admin account" because I still needed
Permission to remove the programs.
Well, if the user account or user group is not on the file or folder
or the user account or user group is on the is on the file or folder
with the proper permissions, then the user account or user group is
going to be denied the proper access.
Putting 2 and 2 together must have been a secret to W-7 since I still needed
Permission to remove the programs.
No, you just don't have the knowledge on how to do it, which a lot of
it is from prior experience in using an o/s like. NT 4, Win 2K, and
XP which were open by default o/s(s) to know what one needs to do in
order to do the same things on Vista or Win 7. Vista and Win 7 are
closed by default o/s(s).
It is sad that that software like W-7 is installed on people's PCs and they
have no control over ther own computers. It's very sad indeed. I'm glad you
agree.
I am glad that MS has closed down the o/s so that one needs to know
how to admin the system with proper permissions and knowledge needed
to do so, closing many of the attack vectors on the machine.