Jump to content

HijackThis: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Misinformation - as shown above between uppercase type in first block. I correctly that information - I"ve used the program thousands of times.
Cleaned up my rewording.
Line 14: Line 14:
}}
}}


'''HijackThis''', sometimes abbreviated '''HJT''', is a [[freeware]] [[spyware]]-removal tool for [[Microsoft Windows]] originally created by [[Merijn Bellekom]], and later sold to [[Trend Micro]]. The program is notable for taking a [[Heuristic (computer science)|heuristic]] approach to detecting [[malware]] - rather than relying on a [[database]] of known spyware, it quickly scans a user's computer, creates a list of differences from a known spyware-free environment and allows the user to decide what from the list needs to be removed (THIS SENTENCE IS INCORRECT - HiJackThis only lists 'hard' to find registry keys, startup entries, and BHO's (Browser Helper Objects). The software does not perform any kind of antivirus or malware scanning. You need to be an advanced user in order to use this software - it does nothing on it's own. It's an excellent tool and widely used by technicians like myself <END EDIT>. HijackThis is used primarily for diagnosis of spyware, as blind use of its removal facilities can cause significant software damage to a computer<ref name="bleep">{{cite web|url=http://www.bleepingcomputer.com/tutorials/tutorial42.html|title=HijackThis Tutorial|accessdate=2008-03-13|format=html}}</ref>.
'''HijackThis''', sometimes abbreviated '''HJT''', is a [[freeware]] [[spyware]]-removal tool for [[Microsoft Windows]] originally created by [[Merijn Bellekom]], and later sold to [[Trend Micro]]. The program 'HiJackThis' not only lists 'hard' to find registry keys, startup entries, and BHO's (Browser Helper Objects) but lets you see in a nice list a summary of items/objects that are being used in your computer - see picture to the right - it shows it nicely. The software does not perform any kind of antivirus or malware scanning. You need to be an advanced user in order to use this software - it does nothing on it's own. It's an excellent tool and widely used by technicians like myself. HijackThis is used primarily for diagnosis of spyware, as blind use of its removal facilities can cause significant software damage to a computer<ref name="bleep">{{cite web|url=http://www.bleepingcomputer.com/tutorials/tutorial42.html|title=HijackThis Tutorial|accessdate=2008-03-13|format=html}}</ref>.


==Use==
==Use==

Revision as of 09:19, 30 September 2008

HijackThis
Developer(s)Trend Micro
Stable release
2.0.2 / July 7, 2007 (2007-07-07)
Operating systemMicrosoft Windows
TypeMalware diagnostic & removal
LicenseFreeware
Websitewww.trendsecure.com

HijackThis, sometimes abbreviated HJT, is a freeware spyware-removal tool for Microsoft Windows originally created by Merijn Bellekom, and later sold to Trend Micro. The program 'HiJackThis' not only lists 'hard' to find registry keys, startup entries, and BHO's (Browser Helper Objects) but lets you see in a nice list a summary of items/objects that are being used in your computer - see picture to the right - it shows it nicely. The software does not perform any kind of antivirus or malware scanning. You need to be an advanced user in order to use this software - it does nothing on it's own. It's an excellent tool and widely used by technicians like myself. HijackThis is used primarily for diagnosis of spyware, as blind use of its removal facilities can cause significant software damage to a computer[1].

Use

HijackThis can generate a plain text logfile detailing all entries it finds, and most entries can be removed or disabled by HijackThis. Inexperienced users are often advised to exercise caution, or to seek help when using the latter option[1], as HijackThis does not discriminate between legitimate and unwanted items, with the exception of a small whitelist of legitimate entries — thus allowing a user to unintentionally prevent important programs from running, which may cause their system or its peripherals to stop working. HijackThis will, however, attempt to create backups of the files and registry entries it removes, which can be used to restore the system in the event of a mistake.

A common approach is to post the logfile to a forum where more experienced users will help decipher which entries need to be removed. Automated tools also exist that analyze saved logs and attempt to provide recommendations to the user, or to clean entries automatically. Use of such tools, however, is generally discouraged by those who specialize in manually dealing with HijackThis logs; they consider the tools to be potentially dangerous to inexperienced users, and neither accurate nor reliable enough to substitute for consulting with a trained human analyst.

Later versions of HijackThis include additional tools like a task manager, hosts file editor and alternate data stream scanner.

References

  1. ^ a b "HijackThis Tutorial" (html). Retrieved 2008-03-13.