Hijack Logs

By beerabuser30
Dec 21, 2005
  1. I open up people Hijack logs to try to understand what you guys are talking about in these threads. Any advice on how to read these or were to get good information about reading them?
  2. Tedster

    Tedster Techspot old timer..... Posts: 6,000   +15

    reading HJT logs

    basically you are looking at a computer's registry. You are reading what files load upon startup, settings, and other stuff. What you are looking for are things that are unusual or settings that tell you that a computer is potentially compromised.

    Also you are looking for settings that tell you a computer user is novice - for example turning on messanger programs (a big no no ). Serious computer users would never intall yahoo messanger and MSN messenger and the types because they are big windows for attacks.
Topic Status:
Not open for further replies.

Similar Topics

Create an account or login to comment

You need to be a member in order to leave a comment
TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...

Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.