hijack analysis

  • Thread starter Thread starter Will Renkel
  • Start date Start date
W

Will Renkel

I see in many posts that the suggestion for analyzing a hijack logfile
is to post it to the web and hope someone will analyze it.
I discovered a better first step.
after saving the log file go to

http://www.hijackthis.de/index.php?langselect=english

and get a free first cut analysis yourself.
I used the browse option and it gave me great insight to the situation.
In fact I found the "nasty" I was looking for
and told hijack to fix that one
and whoopie - my problem went away.

Good luck to anyone else who can resolve their issues that way!

--
---------------------------------------------------------------
Will Renkel
Wheaton, Ill.
REGISTERD Linux User: 300583

---------------------------------------------------------------
 
Will Renkel said:
I see in many posts that the suggestion for analyzing a hijack logfile
is to post it to the web and hope someone will analyze it.
I discovered a better first step.
after saving the log file go to

http://www.hijackthis.de/index.php?langselect=english

and get a free first cut analysis yourself.
I used the browse option and it gave me great insight to the
situation. In fact I found the "nasty" I was looking for
and told hijack to fix that one
and whoopie - my problem went away.

Good luck to anyone else who can resolve their issues that way!

That site can give some very wrong analyses.

--
Frank Saunders, MS-MVP, IE/OE
Please respond in Newsgroup only. Do not send email
http://www.fjsmjs.com
Protect your PC
http://www.microsoft.com/security/protect/
 
Back
Top