Hijack Logs

Status
Not open for further replies.

beerabuser30

Posts: 198   +0
I open up people Hijack logs to try to understand what you guys are talking about in these threads. Any advice on how to read these or were to get good information about reading them?
 
reading HJT logs

basically you are looking at a computer's registry. You are reading what files load upon startup, settings, and other stuff. What you are looking for are things that are unusual or settings that tell you that a computer is potentially compromised.

Also you are looking for settings that tell you a computer user is novice - for example turning on messanger programs (a big no no ). Serious computer users would never intall yahoo messanger and MSN messenger and the types because they are big windows for attacks.
 
Status
Not open for further replies.
Back