Solved

Any opinions about Hitman Pro and ADW cleaner?

Posted on 2013-12-24
3
604 Views
Last Modified: 2014-01-11
I use malware bytes, but thought these extras might not hurt. Any ideas?
0
Comment
Question by:RaiderNationDelegate
  • 2
3 Comments
 
LVL 18

Assisted Solution

by:awawada
awawada earned 333 total points
ID: 39738155
You can run Hitman Pro and ADW cleaner without thinking twice. Both are great Tools.
My advice is only not to clean with Hitman Pro.

https://www.google.com/webhp?hl=en&sa=N&tab=lw#hl=en&newwindow=1&q=hitman%20pro%20blue%20screen

You will find some other Tools here:
http://www.experts-exchange.com/Security/Vulnerabilities/A_12285-Virus-Removal-Methods.html
0
 
LVL 1

Assisted Solution

by:kostbad
kostbad earned 167 total points
ID: 39738510
I never had any windows problem when removing viruses-malware with antimalware. It's the safest option and will not create problems with the registry or windows. I'm saying that after years of exprerience working in IT.

When antimalware fails to totally remove a virus, i try some other tools like Hitman, RogueKiller or usually a manual removal for some trickier malware.
0
 
LVL 18

Accepted Solution

by:
awawada earned 333 total points
ID: 39738520
My advice again is not to clean with Hitman Pro.
More proves can also be found here:
http://www.experts-exchange.com/Security/Vulnerabilities/Q_27056402.html

@kostbad
Note: Now a days you can't just clean Malware with only Scaning-Tools.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now