Hijack Logs

By beerabuser30
Dec 21, 2005
Topic Status:
Not open for further replies.
  1. I open up people Hijack logs to try to understand what you guys are talking about in these threads. Any advice on how to read these or were to get good information about reading them?
  2. Tedster

    Tedster Techspot old timer..... Posts: 10,067   +13

    reading HJT logs

    basically you are looking at a computer's registry. You are reading what files load upon startup, settings, and other stuff. What you are looking for are things that are unusual or settings that tell you that a computer is potentially compromised.

    Also you are looking for settings that tell you a computer user is novice - for example turning on messanger programs (a big no no ). Serious computer users would never intall yahoo messanger and MSN messenger and the types because they are big windows for attacks.
Topic Status:
Not open for further replies.


Add New Comment

TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...


Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.