This software will help you to protect your computer against common attempts that malicious programs use to hijack your computer. It looks in places where malicious programs commonly attempt to gain control of your computer and reports to you what it finds.
Many of the items found will be legitimmate, but any malicious items will also be found. If you do not recognize an item we recommend posting the scan log online for experts to examine. There are links to popular websites that will examine your log files in the Tools menu.
This software also provides a database of known software that will help you to determine exactly what is running on your computer, and easy ways to search for more information if necessary.
In the event that you find a malicious item and need to remove it you can do so in just a few simple clicks.
Features:
Online database of threats and whitelist Searches your computer for vulnerable Locations that can be exploited by malware authors
Free research of any unrecognized items that are found during a scan
Outputs a Hijack This! format log file for posting or analysis by experts
Detection and deletion of over 20 different hijack exploits
Creates a system restore point before making any changes to your system