Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Practice Log 1A
#1
Practice Log 1A
PM a professor for your Student Access Key.

Analyzing HijackThis logs is all about using the resources you have at hand. Google is your best tool. As you know, a HijackThis log consists of two main sections: a running process list and a system analysis, which comprises of several sections. One has to be very keen to notice differences between the legitimate and malicious processes.

Let's see how well you can use your resources.


Attached Files
.zip   PL1A.zip (Size: 812 bytes / Downloads: 57)


Possibly Related Threads…
Thread Author Replies Views Last Post
  (TUT) A Clean Log --([-S7N-])-- 0 1,433 10-17-2010, 02:34 AM
Last Post: --([-S7N-])--
  (TUT) How to research the registry entries in a HJT log. --([-S7N-])-- 0 1,379 10-17-2010, 02:11 AM
Last Post: --([-S7N-])--
  Practice Log 9B --([-S7N-])-- 0 914 10-17-2010, 12:23 AM
Last Post: --([-S7N-])--
  Practice Log 9A --([-S7N-])-- 0 840 10-17-2010, 12:22 AM
Last Post: --([-S7N-])--
  Practice Log 8D --([-S7N-])-- 0 804 10-17-2010, 12:21 AM
Last Post: --([-S7N-])--

Forum Jump:


Users browsing this thread: 1 Guest(s)