{"id":3087,"date":"2012-02-19T17:07:08","date_gmt":"2012-02-19T23:07:08","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=3087"},"modified":"2012-02-19T17:07:08","modified_gmt":"2012-02-19T23:07:08","slug":"trend-micro-migrates-security-tool-hijackthis-to-open-source","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=3087","title":{"rendered":"Trend Micro Migrates Security Tool HijackThis to Open Source"},"content":{"rendered":"<blockquote><p>Trend Micro today announced that is has open sourced the code to its popular free security tool, HijackThis. The tool scans systems to find settings that may have been modified by spyware, malware or other programs that have wiggled their way onto a system and caused problems.<\/p><\/blockquote>\n<p>via <a href=\"https:\/\/www.securityweek.com\/trend-micro-migrates-security-tool-hijackthis-open-source\">Trend Micro Migrates Security Tool HijackThis to Open Source | SecurityWeek.Com<\/a>.<\/p>\n<blockquote><p>\u201cAs new malicious code is released faster than ever before, the need for analyzing log data to identify new malicious code is more important than ever,\u201d the company said in a statement. \u201cThrough this offer to the open source community, the product has the opportunity to develop and become an even better solution to quickly identify new malicious code.\u201d<\/p><\/blockquote>\n<p>Download<a href=\"http:\/\/sourceforge.net\/projects\/hjt\/\"> HijackThis.exe here.<\/a> (sourceforge)<\/p>\n<p>Official website <a href=\"http:\/\/free.antivirus.com\/hijackthis\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro today announced that is has open sourced the code to its popular free security tool, HijackThis. The tool scans systems to find settings that may have been modified by spyware, malware or other programs that have wiggled their &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=3087\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[347,101],"class_list":["post-3087","post","type-post","status-publish","format-standard","hentry","category-pc-issues","tag-malware","tag-security"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/3087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3087"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/3087\/revisions"}],"predecessor-version":[{"id":3088,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/3087\/revisions\/3088"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3087"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}