HijackThis

HijackThis
HijackThis
HijackThis-logo.png
HijackThis.png
HijackThis 2.0.2 screenshot
Developer(s) Trend Micro
Stable release 2.0.4 / April 21, 2010; 18 months ago (2010-04-21)
Preview release 2.0.5 beta / February 11, 2011; 9 months ago (2011-02-11)
Operating system Microsoft Windows
Type Malware diagnostics
License Freeware
Website free.antivirus.com

HijackThis (HJT) is a freeware enumerating tool for Microsoft Windows originally created by Merijn Bellekom, and later sold to Trend Micro. The program is notable for targeting browser-hijacking methods, rather than relying on a database of known spyware. It scans a user's computer quickly, and displays browser hijacking locations, showing what entries are there. HijackThis is used primarily for diagnosis of browser hijacking, as uninformed use of its removal facilities can cause significant software damage to a computer. HijackThis does not remove or detect spyware; it lists most common locations where browser hijacking activity can occur. Browser hijacking can cause malware to be installed on a computer.

Contents

Use

HijackThis can generate a plain-text logfile detailing all entries it finds, and some entries can be fixed by HijackThis. Inexperienced users are often advised to exercise caution, or to seek help when using the latter option, as HijackThis does not discriminate between legitimate and unwanted items, with the exception of a small whitelist of legitimate entries, thus allowing a user unintentionally to prevent important programs from operating, which may cause the computer or its peripherals to stop working. HijackThis attempts to create backups of the files and registry entries that it fixes, which can be used to restore the system in the event of a mistake.

A common use is to post the logfile to a forum where more experienced users can help decipher which entries need to be removed. Automated tools also exist that analyze saved logs and attempt to provide recommendations to the user, or to clean entries automatically.[1] Use of such tools, however, is generally discouraged by those who specialize in manually dealing with HijackThis logs: they consider the tools dangerous for inexperienced users, and neither accurate nor reliable enough to substitute for consulting with a trained human analyst.

Later versions of HijackThis include such additional tools as a task manager, a hosts-file editor, and an alternate-data-stream scanner.

Hijack Pro

During 2002 and 2003, IT entrepreneur Glenn Bluff (owner of Computer Hope UK) made several attempts to buy Hijackthis. This led to the joint development of Hijackpro. A professional version of Hijackthis with the built in capabilities to kill processes similar to killbox. Hijackpro had 2.3 million downloads from an illegal download site in 2003 and 2004 and was being found on sites claiming it was hijackthis and was free. Hijackpro was sold to Touchstone software now Phoenix Technologies in 2007 to be integrated into DriverAgent.com along with Glenn Bluff's other company Drivermagic.com

References

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Hijackthis — Entwickler: Trend Micro Aktuelle Version: 2.0.2 (7. Juli 2007) …   Deutsch Wikipedia

  • HijackThis — Entwickler Trend Micro Aktuelle Version 2.0.4 (21. April 2010) Betriebssystem Microsoft Wi …   Deutsch Wikipedia

  • HijackThis — est un outil d aide à la détection de paramètres modifiés par des programmes malveillants, sur les systèmes d exploitation Microsoft Windows. Les droits de ce programme appartiennent à la société Trend Micro. Sommaire 1 Présentation 2… …   Wikipédia en Français

  • HijackThis — HijackThis …   Википедия

  • HijackThis — Este artículo o sección necesita referencias que aparezcan en una publicación acreditada, como revistas especializadas, monografías, prensa diaria o páginas de Internet fidedignas. Puedes añadirlas así o avisar al autor pr …   Wikipedia Español

  • HJT — HijackThis Entwickler: Trend Micro Aktuelle Version: 2.0.2 (7. Juli 2007) …   Deutsch Wikipedia

  • Look2Me — ist ein Trojaner für Windows Systeme, der auf dem System eines Users automatisch neue Spyware, Adware und Trojaner installiert. Fälschlicherweise wird er jedoch meistens als Spyware erkannt und bezeichnet. Bei jedem Systemstart kontaktiert der… …   Deutsch Wikipedia

  • Spyware — is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically,… …   Wikipedia

  • Rogue software — Rogue security software is software that uses malware (malicious software) or malicious tools to advertise or install itself or to force computer users to pay for removal of nonexistent malware. Rogue software will often install a trojan horse to …   Wikipedia

  • Rootkit — Pronunciation of Rootkit in US English Un rootkit (le nom « outil de dissimulation d activité » est également utilisé[1]), parfois simplement « kit », est un ensemble de techniques mises en œuvre par un ou plusieurs logiciels …   Wikipédia en Français

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”