Kyle4
Solid State Member
- Messages
- 11
- Location
- Sebastian, Florida
I see all these posts in this section of people posting the logs from Hijackthis and the higher-up and more experienced members reading over them and helping them solve their issues with what they are able to find in the log that others can't.
My question is, what do you look for? How do you tell between what is wrong with the log and what is normal. Do you have extensive knowledge of normal parts that are usually found in the log, and then research the other parts to see if it is (or know from experience that it is) an infection? Is there any tutorial to help someone understand these logs? Does it take a MAJOR amount of extensive knowledge, or something that can be learned and understood with some effort and practice?
I personally don't have an issue that requires one of these scans at the moment, but it would still be nice to be able to understand these so that if I need this tool I can use it and settle out the issue independently, or help someone who used this tool, like members like Mak213 helps analyze and interpret problems with these logs.
*Edit: Found Similar topic with answers I needed (http://www.techist.com/forums/f51/hijackthis-question-166066/), no need to reply to this one xP. Feel free to delete this topic
My question is, what do you look for? How do you tell between what is wrong with the log and what is normal. Do you have extensive knowledge of normal parts that are usually found in the log, and then research the other parts to see if it is (or know from experience that it is) an infection? Is there any tutorial to help someone understand these logs? Does it take a MAJOR amount of extensive knowledge, or something that can be learned and understood with some effort and practice?
I personally don't have an issue that requires one of these scans at the moment, but it would still be nice to be able to understand these so that if I need this tool I can use it and settle out the issue independently, or help someone who used this tool, like members like Mak213 helps analyze and interpret problems with these logs.
*Edit: Found Similar topic with answers I needed (http://www.techist.com/forums/f51/hijackthis-question-166066/), no need to reply to this one xP. Feel free to delete this topic