Hijack-This Entries

  • Thread starter Thread starter Phantom
  • Start date Start date
P

Phantom

When running Hijack-This, you get a lot of line items of what was found. I
understand that there are some good and bad entries. Where, or how do you
go about knowing which ones are good and which ones are bad?
I know they can be posted here for MVP's to look at and advise, but with so
many computer brands and configurations of software, I would like to know
how it's sorted out, i.e., how is it determined what is safe to remove?
 
When running Hijack-This, you get a lot of line items of what was found. I
understand that there are some good and bad entries. Where, or how do you
go about knowing which ones are good and which ones are bad?
I know they can be posted here for MVP's to look at and advise, but with so
many computer brands and configurations of software, I would like to know
how it's sorted out, i.e., how is it determined what is safe to remove?

Most, if not all that should be there you will have installed
yourself...you should recognise what is what.

If you have any doubts, www.google.com should help.
--
Cheers,

Guy

** Stress - the condition brought about by having to
** resist the temptation to beat the living daylights
** out of someone who richly deserves it.
 
Thanks Doc and Wes. The bleepingcomputer is the one I could follow best.
Got it bookmarked. My system is as clean as I suspected. No problems.
Thanks again.
 
Back
Top