Jump to content
Posted 28 January 2014 - 03:01 AM
Posted 28 January 2014 - 06:05 AM
i was just wondering if anybody knew how to read firewall logs.
i want to make sure i understand this essential part.
Yes, this was part of 2 years of security training.
If you expect to learn it from 1 post, you are very mistaken.
I have fed you many articles, that you have most likely not fully read (or scanned) yet -
Start with Make of Computer / Model of Operating System ? (XP) / Make of Router ? / Firewall program (free or paid version) ? / Your other installed security programs / and Hosts file Version / and a few more specific items that are needed.
As this is most likely to do with your "Shadow Hacker", posting more and more questions will not help you.
Posting 1 or 2 replies to the other topics would be much better.
Also learn to read TCPview and Wireshark results I have left you, as they are more accurate.
As answered, "if you will not take any of the advice offered, then your best hope is Google -
Since your level of IT knowlege is limited (by the series of posts you have made) you will not understand.
Very basic from 2001 from Z Net : Note that things have changed a lot since then.
One "simple current Google post"..from How to read Firewall Logs - About 5,710,000 results (0.21 seconds)
From IT World - July 20, 2013, 1:55 PM — Firewall logs always contain far too much data for you to look into. With the likelihood that you're collecting millions -- if not tens of millions -- of records every day, you don't stand a chance of gathering meaningful insights from them unless you summarize or extract meaningful content. In today's post, we're going to look at a simple script that will tell you, given a list of known hostile addresses, whether any of them have connected to your systems (whether they initiated the connections or not) and how many times this has happened.
A formula was then added that you would not understand -
Saved for last -
Now here is The most simple version you will ever read
Posted 28 January 2014 - 09:02 AM
Posted 29 January 2014 - 01:35 AM
Edited by James T Kirk, 29 January 2014 - 01:36 AM.
Posted 29 January 2014 - 06:23 AM
it is a security risk to tell you or let it be known to others what security programs that i am running and what type of devices and system that i am running and have
It is a dream, not a security risk, when you will not let others to help you secure your system better.
In future can you please list what you mean by "hckers" or spell the word correctly.
Or are you afraid the extra letter in the word Hacker will make you look silly, or wake up a hidden Hacker ?
Your problem sounds like someone (even you) has created a second user account and it was never removed.
Do you know how to remove a user account once created ??
It seems that much of the problem dates back to your XP Install; "BootMGR is Missing" Error topic.
I suspect these are your "phantom Hackers" that You created in this topic.
The exact version, I am not sure of, but use these to Delete the Phantom Hacker.
Microsoft Windows XP - Delete a user account
Microsoft Windows XP - Delete a user profile
Remove User Accounts from the Login Screen in Windows XP
How to Delete User Accounts in Windows
Removing user accounts in Windows XP and Vista
Posted 29 January 2014 - 09:00 AM
Posted 29 January 2014 - 03:38 PM
I almost forgot your other question -
Re: Hosts file
The Hosts File and what it can do for you - Bleeping Computer by Lawrence Abrams (a.k.a. Grinler)
To reset the Hosts file back to the default automatically, click the Fix it button or link, click Run in the File Download dialog box, and then follow the steps in the Fix it wizard. Microsoft Fix it 50267 => http://go.microsoft.com/?linkid=9668866
Note: If you are not on the computer that has the problem, you can save the automatic fix to a flash drive or to a CD and then run the automatic fix on the computer that has the problem.
Thank You -
Posted 30 January 2014 - 01:24 AM
Posted 30 January 2014 - 07:17 AM
How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector
i will try to find a program that finds my system vulnerabilities first
0 members, 0 guests, 0 anonymous users