P
Phantom
When running Hijack-This, you get a lot of line items of what was found. I
understand that there are some good and bad entries. Where, or how do you
go about knowing which ones are good and which ones are bad?
I know they can be posted here for MVP's to look at and advise, but with so
many computer brands and configurations of software, I would like to know
how it's sorted out, i.e., how is it determined what is safe to remove?
understand that there are some good and bad entries. Where, or how do you
go about knowing which ones are good and which ones are bad?
I know they can be posted here for MVP's to look at and advise, but with so
many computer brands and configurations of software, I would like to know
how it's sorted out, i.e., how is it determined what is safe to remove?