Note From The Author, Gus
Thank you for visiting our site. I hope the information herein was useful to you. Should you have additional PC-related questions or problems, click for help: FREE Tech Support Request. Stop searching and get solutions!
HijackThis is a small, free utility to help identify program and settings files that may have been changed, or corrupted, by spyware or any other form of malware. HijackThis, acquired by Trend Micro in 2007, was originally developed by a Dutch student named Merijn Bellekom.
Though the interface is simple, the results are not as user-friendly for the average computer user, it was truly designed more for technicians to help further diagnosis infection problems. Another issue is though it is very streamlined and seems simple and straightforward, deleting a key, or string of code improperly may actually cause more harm than good to your PC system. This is why it is important for you to take precautions when using the information HijackThis presents.
if you will be utilizing this to identify spyware or hacks that have hijacked your Internet browser, you will be looking for specific entries in the results page, specifically those in the range of R0 to R3, and N1 to N4, as of the version used in writing this how-to guide.
Below are the instructions on using HijackThis to quickly scan your computer and find settings which may have been changed by previously mentioned, spyware or other malware.
There is no install sequence, as this program is a standalone executable.
This is the output of HijackThis. Just remember, this is used differently from security software you may be accustomed to, as it will not exclusively identify known problems. This is more of a self-diagnosis tool.
You can start by researching the various, identified extensions, or applications, tied to a specific add-on to ascertain if it is some type of malware.
That’s really about it. HijackThis may not seem informational to many users, however, this little application provides a true look at what is running on your computer. It is simply up to you to identify what should be there, and which extensions or files should not be installed.