Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.
I dont know how can a hacker find a security hole in a system? For example:
When you connect to a system, how can you find the hole on it?
I dont tell about you can find one when you connect to that web site and you can read the source code.
I mean in the .... ( he he , i dont know what layer it is) command layer
hi nhatminh..... you are posting to a forum for hijack this logs and there analysis.. this is not a hijack log so you may not get many responses... i will have Admin move this post for you so we can get you some help on your issue