Software

  Home arrow Software arrow Page 3 - Introduction to HiJackThis for Windows...
Watch our Tech Videos 
Dev Hardware Forums 
Computer Cases  
Computer Processors  
Computer Systems  
Digital Cameras  
Flat Panels  
Gaming  
Hardware Guides  
Hardware News  
Input Devices  
Memory  
Mobile Devices  
Motherboards  
Networking Hardware  
Opinions  
PC Cooling  
PC Speakers  
Peripherals  
Power Supply Units  
Software  
Sound Cards  
Storage Devices  
Tech Interviews  
User Experiences  
Video Cards  
Weekly Newsletter
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
SOFTWARE

Introduction to HiJackThis for Windows XP
By: Codex-M
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 4 stars4 stars4 stars4 stars4 stars / 4
    2009-09-21

    Table of Contents:
  • Introduction to HiJackThis for Windows XP
  • Principle of HJT in correcting issues
  • Installation, Doing a System Scan and Saving Log Files
  • Understanding the Log Entries

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH DEV HARDWARE

    Introduction to HiJackThis for Windows XP - Installation, Doing a System Scan and Saving Log Files


    (Page 3 of 4 )

      

    You can freely download HJT at the Trend Micro site. Select the installer version and download it to your desktop. Close all running programs, browsers, open windows and install it. As of the time of writing this tutorial, the latest version is V2.0.2  

    The installation is quick and self-explanatory. Once the installation has been completed, you should be able to locate HJT in: StartAll ProgramsHijackThis  

    Once you've seen that the installation went okay, create a restore point by following the procedures provided at the link on the previous page. Once you have created a restore point, launch the program. What you will then see are options; select "Do a System scan and Save a Log File."  

    This will automatically create the HJT log and save it as Hijackthis1.txt. In your subsequent logs, you can name it Hijackthis2.txt or even a more meaningful filename such as "Hijackthis09072009.txt" to append dates on the text for traceability. Please keep the text file in a safe location for reference. If you close the text file, you will clearly see the analysis window, which is shown below:

     

     

     

    Some buttons and checkboxes that you need to know: 

    1. To fix a malware/spyware entry, just check the box as indicated by "Fix Check Box." 

    2. The HJT Log entries are indicated in the above screen shot. Depending on the number of processes running on your computer, this list can be long.

    3. When you are sure you need to fix the problem, click the "Fix Checked" button. This will permanently delete those entries in your computer system.

     

    More Software Articles
    More By Codex-M

    blog comments powered by Disqus

    SOFTWARE ARTICLES

    - Top Add-ons for Gmail
    - Top Free Photo Editors
    - Administering Google Apps for Your Domain
    - Setting up Google Apps for Your Domain
    - EmailTray Helps Organize Email
    - Portable KeePass Tutorial for Ubuntu Linux a...
    - Windows 7: Applications to Enhance Your OS
    - Windows 7: Great Additions
    - Google Wave Waves Goodbye
    - Netvibes Releases Dashboard Engine
    - Monitoring your Children`s Online Activity w...
    - Evernote: a Lightweight Organizational App
    - A New Way to View Photos Online in 3D
    - Smartphone App iZup Helps Make the Roads Saf...
    - Adobe Elements 8 and Premiere 8 Editing Soft...

    Developer Shed Affiliates

     




    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
    KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF
    overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set:
    status off