Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Suggesions


  • Please log in to reply
1 reply to this topic

#1 Small Lady01

Small Lady01

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:In the Garden
  • Local time:12:30 AM

Posted 25 March 2009 - 07:59 AM

I wanted to know if anyone could suggest any reading/video material so that people may be better equiped to interpret some of the logs that are produced by some malware programs. I also want to better understand VB as it seems key to writing batch files to cure some of these rogue spys left over from sweeps.

When I was school I dabbled in programming but it was not meant to be. I still the love the subject I'm just not in love with it. But like any relationship I want to know how to recognize and understand the signs when they present themselves.
"When I was kidnapped, my parents snapped into action. They rented out my room."


Woody Allen

BC AdBot (Login to Remove)

 


#2 SLIX

SLIX

  • Members
  • 380 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Cornwall UK.
  • Local time:05:30 AM

Posted 25 March 2009 - 08:08 AM

Hi

A good place to start would be to read the HijackThis tutorial found here: http://www.bleepingcomputer.com/tutorials/how-to-use-hijackthis/
Steve




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users