05-10-2010, 02:42 PM
To your first suggestion.
Currently when you import a HijackThis log into PH, it puts it into that box, then when you choose to search the internet for a process or filename, it first checks the data in the primary table to see if you already have it. This is so you dont keep searching for something you already have. I am looking into colouring the filename somehow to show whether it is safe or not.
The problems with doing this though, is people may become too reliant on what they see and not actually read the log to make sure everything is correct.
With there being two program file folders, I don't see this being too much of a problem as all analysists should know what the (86x) means (32-bit programs). The problem with making two lines for one processname could be that you would have double the amount of data, which in the long term, could drastically slow down the program.
That said however, I will look into these two suggestions.
Thankyou again Nemmy
(Do you want to be named PH BETA Tester? )
Currently when you import a HijackThis log into PH, it puts it into that box, then when you choose to search the internet for a process or filename, it first checks the data in the primary table to see if you already have it. This is so you dont keep searching for something you already have. I am looking into colouring the filename somehow to show whether it is safe or not.
The problems with doing this though, is people may become too reliant on what they see and not actually read the log to make sure everything is correct.
With there being two program file folders, I don't see this being too much of a problem as all analysists should know what the (86x) means (32-bit programs). The problem with making two lines for one processname could be that you would have double the amount of data, which in the long term, could drastically slow down the program.
That said however, I will look into these two suggestions.
Thankyou again Nemmy
(Do you want to be named PH BETA Tester? )