HijackThis
Encyclopedia
HijackThis is a freeware
Freeware
Freeware is computer software that is available for use at no cost or for an optional fee, but usually with one or more restricted usage rights. Freeware is in contrast to commercial software, which is typically sold for profit, but might be distributed for a business or commercial purpose in the...

 enumerating tool for Microsoft Windows
Microsoft Windows
Microsoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...

 originally created by Merijn Bellekom, and later sold to Trend Micro
Trend Micro
Trend Micro Inc. is a computer security company. It is headquartered in Tokyo, Japan and markets Trend Micro Internet Security, Trend Micro Worry-Free Business Security, OfficeScan, and other related security products and services...

. The program is notable for targeting browser-hijacking
Browser hijacking
Browser hijacking is the modification of a web browser's settings by malware. The term "hijacking" is used as the changes are performed without the user's permission. Some browser hijacking can be easily reversed, while other instances may be difficult to reverse. Various software packages exist...

 methods, rather than relying on a database
Database
A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality , in a way that supports processes requiring this information...

 of known spyware. It scans a user's computer quickly, and displays browser hijacking locations, showing what entries are there. HijackThis is used primarily for diagnosis of browser hijacking, as uninformed use of its removal facilities can cause significant software damage to a computer. HijackThis does not remove or detect spyware; it lists most common locations where browser hijacking activity can occur. Browser hijacking can cause malware to be installed on a computer.

Use

HijackThis can generate a plain-text
Plain text
In computing, plain text is the contents of an ordinary sequential file readable as textual material without much processing, usually opposed to formatted text....

 logfile detailing all entries it finds, and some entries can be fixed by HijackThis. Inexperienced users are often advised to exercise caution, or to seek help when using the latter option, as HijackThis does not discriminate between legitimate and unwanted items, with the exception of a small whitelist of legitimate entries, thus allowing a user unintentionally to prevent important programs from operating, which may cause the computer or its peripherals to stop working. HijackThis attempts to create backups of the files and registry entries that it fixes, which can be used to restore the system in the event of a mistake.

A common use is to post the logfile to a forum
Internet forum
An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are at least temporarily archived...

 where more experienced users can help decipher which entries need to be removed. Automated tools also exist that analyze saved logs and attempt to provide recommendations to the user, or to clean entries automatically. Use of such tools, however, is generally discouraged by those who specialize in manually dealing with HijackThis logs: they consider the tools dangerous for inexperienced users, and neither accurate nor reliable enough to substitute for consulting with a trained human analyst.

Later versions of HijackThis include such additional tools as a task manager
Task manager
A task manager is a program used to provide information about the processes and programs running on a computer, as well as the general status of the computer. It can also be used to terminate processes and programs, as well as change the processes priority...

, a hosts-file
Hosts file
The hosts file is a computer file used in an operating system to map hostnames to IP addresses. The hosts file is a plain-text file and is conventionally named hosts.-Purpose:...

 editor, and an alternate-data-stream
Fork (filesystem)
In a computer file system, a fork is byte stream associated with a file system object. Every non-empty file must have at least one fork, and depending on the file system, a file may have one or more other associated forks, which in turn may contain primary data integral to the file, or just metadata...

 scanner.

Hijack Pro

During 2002 and 2003, IT entrepreneur Glenn Bluff (owner of Computer Hope UK) made several attempts to buy Hijackthis. This led to the joint development of Hijackpro. A professional version of Hijackthis with the built in capabilities to kill processes similar to killbox. Hijackpro had 2.3 million downloads from an illegal download site in 2003 and 2004 and was being found on sites claiming it was hijackthis and was free. Hijackpro was sold to Touchstone software
Touchstone software
TouchStone Software Corporation, Inc. is an American software developer for the personal computer industry, specializing in system update technology. It also owns and operates a network of Internet Web properties...

 now Phoenix Technologies
Phoenix Technologies
Phoenix Technologies Ltd designs, develops and supports core system software for personal computers and other computing devices. Phoenix's products — commonly referred to as BIOS or firmware — support and enable the compatibility, connectivity, security and management of the various components and...

 in 2007 to be integrated into DriverAgent.com
DriverAgent.com
DriverAgent is a Windows driver scanning, detection, and update software published originally by Touchstone software. DriverAgent's software scans a user's computer and locates updates to the device drivers on that user's computer. This scan is free, and provides a list of the hardware currently...

 along with Glenn Bluff's other company Drivermagic.com
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK