HijackThis inspects your computers browser and operating system settings to make a log file of the present state of your computer. Using HijackThis you can selectively remove surplus settings and files from your computer. Because the settings recognized in a HijackThis log file can belong to both legitimate software and surplus malware, it is important to use extreme caution when choosing to removing anything using HijackThis.
HijackThis also comes with a process manager, HOSTS file editor, and exchange data stream scanner
0 comments:
Post a Comment