HijackThis
Alte Version von HijackThis 2.0.5 (Beta)
Ausgewählte Version
HijackThis 2.0.5 (Beta)
Windows 95, 98, 2000, XP, Vista, 7
Lizenz
Freeware
Erscheinungsdatum
21 July, 2014 (7 years ago )

Sponsored Links

Herunterladen HijackThis 2.0.5 (Beta)
HijackThis 2.0.5 (Beta)

HijackThis 2.0.5 (Beta) (379.5 KB)

Sponsored Links

Systemanforderungen von HijackThis 2.0.5 (Beta)
  • Windows XP
  • Windows XP x64
  • Windows Vista
  • Windows Vista x64
  • Windows 7
  • Windows 7 x64
  • Windows 8
  • Windows 8 x64
  • Windows 8.1
Programm Information von HijackThis 2.0.5 (Beta)
Version Name:
HijackThis 2.0.5 (Beta)

Datei Größe:
379.5 KB

Erscheinungsdatum:
21 July, 2014 (7 years ago)

MD5 Prüfsumme:
47811D50390A86A17102D7496E6EABB9

SHA1 Prüfsumme:
2623749CDB27887F6746ACDEE7E8065475F8B541

Version Historie vonHijackThis 2.0.5 (Beta)
  • Fixed No internet connection available when pressing the button Analyze This
  • Fixed the link of update website, now send you to sourceforge.net projects
  • Fixed left-right scrollbar when in safe mode or low screen resolution

Mehr ansehen...

HijackThis Screenshots

Screenshots sind für diese Software nicht verfügbar

Über HijackThis

HijackThis can either save this info as a plain text logfile or disable the found items. Caution should be exercised when using the latter option, as HijackThis does not discriminate between legimate and unwanted items - thus allowing a user to unintentionally disable important programs from running, which may possibly cause their system or peripherals to stop working. HijackThis will, however, create backups of the files and registry entries it removes, which can be used to restore the system in the event of a mistake.

A common tradition is to post the logfile to some web board/forum where more experienced users will help decipher which entries need to be removed. Automated tools also exist that analyze saved logs and attempt to provide recommendations to the user, or to clean entries automatically. Use of such tools, however, is generally recommended against by those who specialize in manually dealing with HijackThis logs; they consider the tools to be potentially dangerous to inexperienced users, and not accurate and reliable enough to substitute consulting a trained human analyzer.

Later versions of HijackThis include additional tools like a task manager, hosts file editor and alternate data stream scanner. HijackThis is property of Merijn Bellekom .


Updates : HijackThis Updates

Did You Know?

HijackThis inspects your machines browser and operating system settings to generate a log file of the current state of your computer.