Hijack Logs

By beerabuser30
Dec 21, 2005
  1. I open up people Hijack logs to try to understand what you guys are talking about in these threads. Any advice on how to read these or were to get good information about reading them?
  2. Tedster

    Tedster Techspot old timer..... Posts: 6,000   +15

    reading HJT logs

    basically you are looking at a computer's registry. You are reading what files load upon startup, settings, and other stuff. What you are looking for are things that are unusual or settings that tell you that a computer is potentially compromised.

    Also you are looking for settings that tell you a computer user is novice - for example turning on messanger programs (a big no no ). Serious computer users would never intall yahoo messanger and MSN messenger and the types because they are big windows for attacks.
Topic Status:
Not open for further replies.

Similar Topics

Add New Comment

You need to be a member to leave a comment. Join thousands of tech enthusiasts and participate.
TechSpot Account You may also...