HijackThis inspects your computers browser and operating system settings to generate a log file of the current state of your computer. Using HijackThis you can selectively remove unwanted settings and files from your computer. The program is notable for targeting browser-hijacking methods, rather than relying on a database of known spyware. It scans a user's computer quickly, and displays browser hijacking locations, showing what entries are there.
HijackThis is used primarily for diagnosis of browser hijacking, as uninformed use of its removal facilities can cause significant software damage to a computer. HijackThis does not remove or detect spyware; it lists most common locations where browser hijacking activity can occur. Browser hijacking can cause malware to be installed on a computer.
- The program can create a backup of your original settings and also ignore selected items.
- HijackThis comes with a process manager, HOSTS file editor, and alternate data stream scanner.
- Additional features include a startup list report, uninstall manager and some other tools.
- Portable, no installation.
Because the settings identified in a HijackThis log file can belong to both legitimate software and unwanted malware, it is important to use extreme caution when choosing to removing anything using HijackThis.
|Author:||Trend Micro Inc|
|Windows:||XP, Vista, 7, 8, 10|