such as Random's System Information Tool
or RSIT can make a detailed analysis of the computer system and generate elaborate reports regarding its efficiency, resource utilisation etc. After installation, first use of the RSIT
generates two reports info.txt and log.txt
. In subsequent runs, only the log.txt is generated. The log.txt report contains general information about the RSIT version, OS, hard disk, RAM
etc. that can be used to identify causes for delays in the computer if any. The info.txt is generated during the first use right after the installation of the RSIT
and consists of a list of software, security software and environment variable amongst others.
has not evolved since 2007 and although it is a very efficient tool, it is rapidly becoming inadequate; we often need to use diagnostic tools that make further analysis and generate longer reports...Random's System Information Tool (RSIT
), created by Random/Random, is one such tool.
Installation and first use
- Download Here and save it to your desktop.
- Double-click to launch RSIT.exe
- Click Continue until the Disclaimer window is dislayed
- If the HijackThis utility (current version) is not present or not detected on your computer, RSIT will download it (allow access in your firewall, if requested) and you must accept the license.
- Launch the scan.
You'll see that during the first use of RSIT
, there are two reports that appear: Info.txt and log.txt.
After this, there will only be the log.txt that will appear.
- It lists all the programs installed in the "Uninstall list" (this is especially useful at the end of disinfection, to identify programs that need updating).
- It displays a sample of the host file in the "Hosts File" section, which can show an empty hosts file or a hosts file that was modified by security software to block malicious sites.
- The list of security software installed, based on the Windows Security Center (which does not always detect all) in the "Information Security Center"
- The "System event log" gives information from the Windows Event Log.
- Finally, the "Environment variables" correspond to environment variables.
- It gives general information: RSIT version, operating system, but especially about the hard disk and RAM, notifying how much these resources are used...This is useful for identifying the cause of any delays in the computer.
- It contains a Hijackthis report sometimes showing hidden elements that do not show the standard version of Hijackthis.
- The list of scheduled tasks (part of Windows that can automatically perform tasks such as updating the virus) in the "Scheduled tasks folder"
- A section dedicated to sensitive points in the registry "Registry dump. It shows registry keys "mountpoints2", which are indicative of an infection of removable disk if they correspond to a negative file.
- The list of files and folders created in the previous month in the "List of files / folders created in the last 1 month" and those that have been modified over the same period in the "List of files / folders modified in the last 1 months. This allows to locate some files added by infections that would not necessarily be a simple report Hijackthis.
- Finally, a list of drivers and services, where certain infections sometimes hide (List of drivers and services).
Published by jak58
Latest update on March 17, 2012 at 06:36 PM by Virginia Parsons.