Hijack Terminator Description
Editor: This software will help you to protect your computer against common attempts that malicious programs use to hijack your computer. It looks in places where malicious programs commonly attempt to gain control of your computer and reports to you what it finds.
Many of the items found will be legitimate, but any malicious items will also be found. If you do not recognize an item we recommend posting the scan log online for experts to examine. There are links to popular websites that will examine your log files in the Tools menu.
This software also provides a database of known software that will help you to determine exactly what is running on your computer, and easy ways to search for more information if necessary.
In the event that you find a malicious item and need to remove it you can do so in just a few simple clicks.
Online database of threats and whitelist Searches your computer for vulnerable Locations that can be exploited by malware authors
Free research of any unrecognized items that are found during a scan
Outputs a Hijack Terminator庐 format log file for posting or analysis by experts
Detection and deletion of different hijack exploits
Creates a system restore point before making any changes to your system
If you have our PASAIO庐. (Privacy And Security All In One) software installed, there will be an additional button visible to launch PASAIO庐 program (and vice versa). Requires version 4.1+ of the PASAIO庐 program
Hijack Terminator Screenshots
Screenshots are not available currently.
What's New in Hijack Terminator 1.1
Release notes are not available currently.
Hijack Terminator Requirements
No additional system requirements.