Hitman Pro
Encyclopedia
Hitman Pro 3 is a computer program to detect and remove Rootkits, Trojans
Trojan horse (computing)
A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system. The term is derived from the Trojan Horse story in Greek mythology.-Malware:A destructive program that masquerades as a benign...

, Viruses
Computer virus
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability...

, Worms
Computer worm
A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach...

, Spyware
Spyware
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's...

, Adware
Adware
Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up. They may also be in the user interface of the software or on a screen presented to the user during...

 and other Malware
Malware
Malware, short for malicious software, consists of programming that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior...

 using extensive Behavioural Analysis
Heuristic analysis
Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the wild....

 and Cloud Computing
Cloud computing
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network ....

. The program is developed by SurfRight. First it detects viruses and other files that have a suspicious behaviour (behaviour analysis) and sends them then to the scan cloud via the Internet. The malicious files are detected in the scan cloud where these are removed by Hitman Pro 3. The new version of Hitman Pro, version 3, uses Dr Web, Emsisoft Anti-Malware, G Data AntiVirus and Prevx to detect malicious software (see also multiscanning
Multiscanning
Multiscanning is running multiple anti-malware or antivirus engines concurrently. Traditionally, only a single engine can actively scan a system at a given time. Using multiple engines simultaneously can result in conflicts that lead to system freezes and application failures...

). As the various virus scanners are not installed on the local computer, but in the scan cloud on Internet, there is a very low system load. This technology is called “cloud computing” and is possible using behavioural analysis that can differentiate legitimate from malicious software.

Hitman Pro 1 & 2

Hitman Pro 3 is a completely different design than earlier versions of Hitman Pro that was developed by Mark Loman in the Netherlands
Netherlands
The Netherlands is a constituent country of the Kingdom of the Netherlands, located mainly in North-West Europe and with several islands in the Caribbean. Mainland Netherlands borders the North Sea to the north and west, Belgium to the south, and Germany to the east, and shares maritime borders...

. The previous version of Hitman Pro (version 1 and 2) automatically downloads, installs and runs third party anti-spyware
Spyware
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's...

 and anti-adware
Adware
Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up. They may also be in the user interface of the software or on a screen presented to the user during...

 programs that are freely available on the Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

:
  • Webroot Spy Sweeper
    Spy Sweeper
    Spy Sweeper is a software product that detects and removes spyware and viruses on personal computers that run Microsoft Windows...

     (trial, expires in 7 days)
  • PC Tools Spyware Doctor
    Spyware Doctor
    Spyware Doctor is a spyware removal product for Microsoft Windows developed by PC Tools.-Features:Spyware Doctor is a program which scans a computer for spyware, examining files on the hard drive, objects in memory, the Windows registry, and cookies, and then attempts to quarantine or remove...

     (demo, will not clean anything)
  • ESET NOD32 (trial, expires in 30 days)
  • Lavasoft AdAware SE
    Ad-Aware
    Ad-Aware is an anti-spyware and anti-virus program developed by Lavasoft that detects and removes malware, spyware and adware on a user's computer...

     (freeware)
  • Safer Networking Spybot - Search & Destroy
    Spybot - Search & Destroy
    Spybot Search & Destroy is a popular spyware and adware removal program compatible with Microsoft Windows 95 and later. It scans the computer hard disk and/or RAM for malicious software....

     (freeware)
  • TrendMicro CWShredder
    CWShredder
    CWShredder is a program that runs on Microsoft Windows for removing the CoolWebSearch family of spyware. Originally created by Merijn Bellekom, it was bought by InterMute on October 19, 2004 until June 2005 when InterMute itself was acquired by Trend Micro....

     (freeware)
  • JavaCool Software SpywareBlaster
    SpywareBlaster
    SpywareBlaster is a killbit program for Microsoft Windows designed to block the installation of ActiveX malware.-Features:SpywareBlaster blocks the installation of most ActiveX-based spyware, adware, browser hijackers, dialers and other unwanted programs from the user's computer...

     (freeware)
  • McAfee VirusScan
    McAfee VirusScan
    McAfee VirusScan is an antivirus program created and maintained by McAfee Inc. . McAfee markets VirusScan to home and home-office users; McAfee also develops VirusScan Enterprise for use in corporate environments...

     SuperDAT (virus signature definition updates, McAfee PrimeSupport license required for qualifying product)
  • Ewido Micro Scanner (freeware)


This approach had a few disadvantages, the most important are: the scan time was very long, the program used many system resources and errors in the used third party programs could cause system instability. These disadvantages disappeared in version 3.

Affiliate and Partner Program

Hitman Pro version 2 had a large user base in The Netherlands, more than 3 million at one point. This resulted in large exposure for the third party programs. Webroot Spy Sweeper, PC Tools Spyware Doctor and ESET NOD32 saw their user base increase significantly.

Critics

The program has also opponents that claim that Hitman Pro is using other people’s knowledge without their permission. Software producer Lavasoft was in discussion with Mr. Loman over changes to the program before granting any official permission to implement their software and McAfee says they did not grant permission and claim no knowledge at all of the program with no further comment. This is in apparent contrast to the previous statements of Mr. Loman who claimed he had the agreement of all companies.

Hitman Pro 3

Hitman Pro 3 has a completely different design than earlier versions and does not install software on the users PC. Files on the PC are scanned and suspicious files are analyzed in the scan cloud and then malicious files are removed from the PC. To speed up the scan time and to prevent mistakes (false positives), Hitman Pro 3 uses a white list that includes Windows system files and other (safe) files that are present on most PCs. Hitman Pro 3 also requires a license key to remove malware found on a user's computer, however it does offer a free 30-day trial, which does not let you remove any files identified.
In version 3.5 the 30-day trial does let you remove identified threats. Hitman Pro 3.5 is the current version, so you can remove detected threats if you use this version.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK