06-23-2011, 09:54 AM
Index of Tutorials
All trainees should take a look at all these tutorials. Read through it carefully and keep it for reference. You will need all of this in your training and when helping users.
Must Reads:
- Introductions to HijackThis
- Effective Communication - A Must Read
- HJT Meaning of Each Line
- Analysing HijackThis Logs
- Detecting Malware
- How to research the registry entries in a HJT log.
- Hierarchy of Analysis & Response For HijackThis
- Must Not Do's
- Basic Method of using HJT and deleting files.
- Infection List :: Telltale signs
- HOSTS File 101
- Updating Java
- Updating Service Packs
- A clean log
- Manually Removing Services
- Code Boxes vs. Quote Boxes (For Scripts)
- CLSID
- Safe/Unsafe P2P programs
- Optional Fixes
- Uninstallable Malware (Optionals)
- How malware hides and installs itself as a service
- Riskaware, Adware and Pornware
- Proxy Servers
- File Infectors: Virut and Sality
- Overview of the Registry
- Working with the Registry using reg.exe
- HijackThis in the Registry
- Editing the Registry
- Editing Registry Keys
- Editing Registry Values
- Creating and Deleting Keys or Values
- Services in the Registry
- sUBs:
- Anti-Rootkit:
- Random/Random
- Old Timer Tools:
- S!R!:
- Other: