Support Forums

Full Version: Practice Log 1A
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Practice Log 1A
PM a professor for your Student Access Key.

Analyzing HijackThis logs is all about using the resources you have at hand. Google is your best tool. As you know, a HijackThis log consists of two main sections: a running process list and a system analysis, which comprises of several sections. One has to be very keen to notice differences between the legitimate and malicious processes.

Let's see how well you can use your resources.