Many times, you must have noticed that your computer is behaving abnormally. For example, it shows some custom message on the browser, when a drive is inserted to the PC, some file is copied without your permission, etc. There are many types of symptoms, which cannot be written, in a single post. The abnormal changes are due to the presence of a malicious bug named ‘MALWARE’. As its name suggests, it creates many junk files, slow down the computer, make windows behave abnormally. Then how to get rid of it and make things back normal!
Many Antivirus software available in the market are capable of do so. However, there is free and lightweight software capable of rolling back the changes caused by the malware. It is ‘Hijack this”. After installation, it scans the system and detects the changes caused abnormally. The malicious changes can be reversed by selecting ‘fix’ button present on its interface. To do the process more easily run it with Administrative privileges.
‘HijackThis’ inspects your computers browser and operating system settings to generate a log file of the current state of your computer. Using ‘HijackThis’ you can selectively remove unwanted settings and files from your computer. Because the settings identified in a ‘HijackThis’ log file can belong to both legitimate software and unwanted malware, it is important to use extreme caution when choosing to removing anything using ‘HijackThis’.‘HijackThis’ also comes with a process manager, HOSTS file editor, and alternate data stream scanner.Title: ‘HijackThis’ File size: 1.34MB Requirements: Windows (All Versions) Languages: en-US License: Freeware Author: Trend Micro Inc
- How to Use HijackThis to Keep Your Computer Free From Malicious Hijacks (vikitech.com)
- Trend Micro makes HijackThis open source (net-security.org)
- Trend Micro Releases HijackThis Source Code to sourceforge.net (prnewswire.com)
- Security Tool HijackThis Goes Open Source (news.slashdot.org)
- HijackThis goes Open Source (edugeek.net)
- HiJackThis is now Open Source (ghacks.net)
- Protecting Your Computer | DIGITAL LIFE – http://www.cubesquare.co.cc (techanytime.wordpress.com)
- New malware demands payment for copyright violations, illegal porn (geek.com)
- Trojan hijacks often-used DLL file for stealthier approach (net-security.org)
- July 9 could be ‘Internet doomsday’ for some (technolog.msnbc.msn.com)