![]() ![]() HiJackThis Fork primarily detects hijacking methods rather than comparing items against a pre-built database. Right-clicking on any entry will allow you to get information including searching Google. You can scan, scan and save a log file as well as a tools section with the process manager, hosts file manager, ADS spy, and more. The interface should be familiar to HijackThis users with some visual updates. Mostly there is an extensive list of changes or improvements over the original HijackThis including new operating system support and too much more to list here as it would take many paragraphs. Click the Fix This button, and poof–they vanish.HiJackThis Fork can detect and correct the changes in the most vulnerable areas of the operating system caused by adware, spyware, malware and other unwanted software. ![]() It presents you with a list of said items, which you may then select for removal. These irregularities can be anything from unknown DLLs in the system folder, to non-standard context menu entries, to unknown services or registry entries. Simple, crude, easy to use–the HijackThis interface is all it needs to be.Basically, HijackThis (you’ve got to love the attitude in the name) is a very small portable app that scans for and displays anomalies in your Windows installations. Now, Trend Micro has placed the program in open source, so perhaps development will continue beyond the version 2.0.4 that it’s been stuck at for a while. Not that I or my repair colleagues ever stopped using it–it’s too darn handy when it comes to spotting malware and removing detritus from your system. ![]() I lost track of the program’s development shortly after Trend Micro took it over. Reviewing HijackThis is like talking to an old friend for the first time after a lengthy communications hiatus. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |