Solved

HijackThis

Posted on 2012-12-28
2
421 Views
Last Modified: 2013-12-06
I use HijackThis conservatively to get rid of toolbars and BHO.
Are there tricks to using HijackThis more effectively without breaking things unintentionally.
0
Comment
Question by:scottjnorris
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 92

Expert Comment

by:nobus
ID: 38728876
hijackthis - i used it some years a go, a good tool
but now i just run mbam - better, and fast : http://www.malwarebytes.org/mbam.php
0
 
LVL 10

Accepted Solution

by:
schaps earned 500 total points
ID: 38729391
Yes, there's a trick-- do the scan with the save log file option. Then open the log, ctrl-A to select-all, ctrl-C to copy, then go to one or more HJT analyzer sites, paste in the log, and see what they say. I use http://hijackthis.de and http://hjt.iamnotageek.com

These are just guides to help you decide, though. You can mess up some stuff by deleting without careful evaluation. But this method has helped me find some hidden stuff masquerading as something innocuous.

Good luck!
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For some time some of our users experienced package loss on a couple of our Lenovo Thinkpad S531 machines running Windows 8 or Windows 8.1 64-bit OS. I was not able to find many answers online, but did after some investigation I began to suspect Blu…
In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question