HijackThis
Versiones Antiguas de HijackThis 2.0.5 (Beta)
Versión Seleccionada
HijackThis 2.0.5 (Beta)
Sistemas Compatibles
SO Antiguos Compatibles
Windows 95, 98, 2000, XP, Vista, 7
Licencia
Freeware
Fecha Liberación
21 July, 2014 (7 years ago )

Sponsored Links

Descargar HijackThis 2.0.5 (Beta)
HijackThis 2.0.5 (Beta)

HijackThis 2.0.5 (Beta) (379.5 KB)

Sponsored Links

Requerimientos del Sistema de HijackThis 2.0.5 (Beta)
  • Windows XP
  • Windows XP x64
  • Windows Vista
  • Windows Vista x64
  • Windows 7
  • Windows 7 x64
  • Windows 8
  • Windows 8 x64
  • Windows 8.1
Información del Programa de HijackThis 2.0.5 (Beta)
Nombre de la Versión:
HijackThis 2.0.5 (Beta)

Tamaño de Archivo:
379.5 KB

Fecha Liberación:
21 July, 2014 (7 years ago)

Comprobación MD5:
47811D50390A86A17102D7496E6EABB9

Comprobación SHA1:
2623749CDB27887F6746ACDEE7E8065475F8B541

Historial de Versiones de HijackThis 2.0.5 (Beta)
  • Fixed No internet connection available when pressing the button Analyze This
  • Fixed the link of update website, now send you to sourceforge.net projects
  • Fixed left-right scrollbar when in safe mode or low screen resolution

Ver Más...

HijackThis Imagen

No hay imágenes disponibles para este software

Acerca de HijackThis

HijackThis can either save this info as a plain text logfile or disable the found items. Caution should be exercised when using the latter option, as HijackThis does not discriminate between legimate and unwanted items - thus allowing a user to unintentionally disable important programs from running, which may possibly cause their system or peripherals to stop working. HijackThis will, however, create backups of the files and registry entries it removes, which can be used to restore the system in the event of a mistake.

A common tradition is to post the logfile to some web board/forum where more experienced users will help decipher which entries need to be removed. Automated tools also exist that analyze saved logs and attempt to provide recommendations to the user, or to clean entries automatically. Use of such tools, however, is generally recommended against by those who specialize in manually dealing with HijackThis logs; they consider the tools to be potentially dangerous to inexperienced users, and not accurate and reliable enough to substitute consulting a trained human analyzer.

Later versions of HijackThis include additional tools like a task manager, hosts file editor and alternate data stream scanner. HijackThis is property of Merijn Bellekom .


Actualizaciones : HijackThis Actualizaciones

Did You Know?

Using HijackThis you can selectively remove unwanted settings and files from your computer. Because the settings identified in a HijackThis log file can belong to both legitimate software and unwanted malware, it is important to use extreme caution when choosing to removing anything using HijackThis.