![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTQVK0jqfX4ZdBPmObElTq0Pu9JRjA79v8Nvl75BTitLOE8Xc7ylhBV9bVJh3of6POmCorfkKDxMlZoMTjQRl1wZ1qMBuKhcKxtOI7YmrMkTdnguq-BHNHW1vNRaIj5GVfRIt8w9kobPg/s320/876__hijackThis4.png)
Using HijackThis you can selectively remove unwanted settings and files from your computer. Because the settings identified in a HijackThis log file can belong to both legitimate software and unwanted malware,
it is important to use extreme caution when choosing to removing anything using HijackThis.
HijackThis also comes with a process manager, HOSTS file editor, and alternate data stream scanner.