The entries are identified following a pattern of letters and numbers: If we want to know the meaning of the found items, we must place the mouse cursor over each item and press the “ Information of selected item” button. Depending on our knowledge, we'll fix errors or send it to people with more knowledge. To use this program is simple we have to press the “ scan” button and wait for the results. So we must scan the system with this software and detect already installed threats. This program does not need installation and is not resident in memory, implying that it will not notify us if a new threat is trying to install. This makes HijackThis a program for advanced users because users with less knowledge should only use the option “ generate report” without deleting any entry. We can select any item in the list and delete it, but we must be careful because, as mentioned before, not all the list elements are a real threat. The main window will display a list of entries marked as potential threats. ![]() ![]() If we do not know how to interpret the report, we should send it to specialized Internet forums, where users will tell us which report lines represent a threat to our PC and, therefore, can be deleted safely. Keep in mind that generated report shows all the entries that are susceptible to being a threat, but that does not mean that each line of the report constitutes a threat to our PC. HijackThis is a tool that scans our system for this type of malicious program and generates a text report informing us about all possible threats found.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |