Solved

HijackThis

Posted on 2012-12-28
2
418 Views
Last Modified: 2013-12-06
I use HijackThis conservatively to get rid of toolbars and BHO.
Are there tricks to using HijackThis more effectively without breaking things unintentionally.
0
Comment
Question by:scottjnorris
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 92

Expert Comment

by:nobus
ID: 38728876
hijackthis - i used it some years a go, a good tool
but now i just run mbam - better, and fast : http://www.malwarebytes.org/mbam.php
0
 
LVL 10

Accepted Solution

by:
schaps earned 500 total points
ID: 38729391
Yes, there's a trick-- do the scan with the save log file option. Then open the log, ctrl-A to select-all, ctrl-C to copy, then go to one or more HJT analyzer sites, paste in the log, and see what they say. I use http://hijackthis.de and http://hjt.iamnotageek.com

These are just guides to help you decide, though. You can mess up some stuff by deleting without careful evaluation. But this method has helped me find some hidden stuff masquerading as something innocuous.

Good luck!
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I originally posted this Article Here (http://www.bestelectronicarticles.com/computers/software-troubleshooting/how-to-find-a-driver-for-you-devices-in-windows.html) and thought I would now share with the Experts Exchange community. Driver Proble…
Sometimes a user will call me frantically, explaining that something has gone wrong and they have tried everything (read - they have messed it up more and now need someone to clean up) and it still does no good, can I help them?!  Usually the standa…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question