Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Your Opinion Sought


  • Please log in to reply
5 replies to this topic

#1 Reena

Reena

  • Members
  • 391 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:UK
  • Local time:02:13 AM

Posted 27 October 2011 - 11:43 AM



I have Hijack This installed and am aware that any Hijack Logs should be posted elsewhere.

May I now ask for comments regarding Hijack This Analyzers on the Web? I am aware that these are not 100% satisfactory but are they any good at all?

My thanks for any comments you may make. I have been helped always by the experts on Bleeping Computer and have learnt a lot from them.

Edited by hamluis, 27 October 2011 - 04:14 PM.
Moved from Win 7 to AV, Friewall, Privacy Protection.


BC AdBot (Login to Remove)

 


#2 hamluis

hamluis

    Moderator


  • Moderator
  • 56,106 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Killeen, TX
  • Local time:09:13 PM

Posted 27 October 2011 - 04:14 PM

Since this is an inquiry re the use of malware tools...and this is the Win 7 forum...I will move your inquiry to AV, Firewall, Privacy Protection where persons more knowledgeable than myself and others visiting this forum...can give you some comments.

Louis

#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,595 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:13 PM

Posted 27 October 2011 - 04:55 PM

HijackThis is an advanced enumerator (similar in some respects to a registry editor) that is used to display certain areas of the Windows registry where the majority of malware reside. HijackThis will scan these areas of your system and then create a log to help diagnose the presence of undetected malware in known hiding places. However, since HijackThis only scans certain areas of a computer's system/registry, a hijackthis log may not always show all the malware on your system. Most of the log entries are required to run a computer and removing essential ones can potentially cause serious damage such as loss of Internet connectivity or problems with your operating system which could preventing it from starting. Using HijackThis requires advanced knowledge about the Windows Operating System and relies on trained experts to interpret the log entries and investigate them in order to determine what needs to be fixed.

Online HijackThis analyzers work in a similar manner but rely on the user's ability to interpret the results and determine what needs to be fixed. However, they often provide misleading and/or questionable results. In my experience, they DO NOT always identify all the malware or all the files properly. They sometimes list legitimate files as bad and bad files as legitimate. They sometimes show entries with "file missing" as bad when that is not always the case. Although these sites are open to the public, the user needs to know what they are doing and how to research the displayed log entries before using the original HijackThis application to fix anything. If you do not have advanced knowledge about computers or training in malware investigation, you should NOT rely on the results of online analyzers or attempt to fix anything without consulting an expert. Doing so on your own and using HijackThis incorrectly could adversely impact your system.

Further, be aware that HijackThis only scans certain areas of a computer's system/registry to help diagnose the presence of undetected malware in known hiding places. Given the sophistication of malware hiding techniques used by attackers in today's environment, HijackThis is limited in its ability to detect infection and generate a report outside these known hiding places. This limitation has made its usefulness nearly obsolete since a HijackThis log cannot reveal all the malware residing on a computer. As such, HijackThis has been replaced by other preferred tools like DDS, RSIT and OTL which provide comprehensive logs with specific details about more areas of your computer.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 Reena

Reena
  • Topic Starter

  • Members
  • 391 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:UK
  • Local time:02:13 AM

Posted 28 October 2011 - 06:10 AM

Thank you, Louis, for re=posting in the correct section. I hope my error does not mean pistols at dawn!!

#5 Reena

Reena
  • Topic Starter

  • Members
  • 391 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:UK
  • Local time:02:13 AM

Posted 28 October 2011 - 06:17 AM

Quietman7 : Your detailed reply was just what I wanted as,to be honest, it was curiosity that prompted my question. I do not intend to use any of these programmes. I am only too aware of the havoc one can cause with a DIY approach.

I came across a Hijack This Analyzer while I was searching for something else on line, and, as it was new to me, and I wondered how on earth it could work.

As you point out it is how the results are interpreted that ensures a successful use of the programme.

Thank you for taking the time to answer so fully. As I said in my original posting, I always learn a lot from the experts at this web-site.

Reena (UK)

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,595 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:13 PM

Posted 28 October 2011 - 03:28 PM

You're welcome.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users