Solved

HijackThis

Posted on 2012-12-28
2
402 Views
Last Modified: 2013-12-06
I use HijackThis conservatively to get rid of toolbars and BHO.
Are there tricks to using HijackThis more effectively without breaking things unintentionally.
0
Comment
Question by:scottjnorris
2 Comments
 
LVL 92

Expert Comment

by:nobus
ID: 38728876
hijackthis - i used it some years a go, a good tool
but now i just run mbam - better, and fast : http://www.malwarebytes.org/mbam.php
0
 
LVL 10

Accepted Solution

by:
schaps earned 500 total points
ID: 38729391
Yes, there's a trick-- do the scan with the save log file option. Then open the log, ctrl-A to select-all, ctrl-C to copy, then go to one or more HJT analyzer sites, paste in the log, and see what they say. I use http://hijackthis.de and http://hjt.iamnotageek.com

These are just guides to help you decide, though. You can mess up some stuff by deleting without careful evaluation. But this method has helped me find some hidden stuff masquerading as something innocuous.

Good luck!
0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

HOW TO REMOTELY CLEAN MEROND.O WITH ESET SILENTLY PROBLEM       If you have the fortunate luck to contract the Merond.O virus on your network, it can be quite troublesome to remove as it propagates to network shares on your network. In my case, the …
In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question