Results 1 to 2 of 2
2010-01-20, 15:25 #1
- Join Date
- Oct 2009
- Shoreline, Washington, USA
- Thanked 1 Time in 1 Post
Browser forensic tools find malware entry points
By Ryan Russell
Malware removal is only the first step in fighting an infection.
Your job isn't finished until you've determined what the malware is, how it breached your defenses, and how to prevent similar infections in the future.
The full text of this column is posted at WindowsSecrets.com/2010/01/21/05 (paid content, opens in a new window/tab).
Columnists typically cannot reply to comments here, but do incorporate the best tips into future columns.
Last edited by revia; 2011-01-20 at 14:55.
2010-01-21, 15:03 #2
- Join Date
- Feb 2009
- Hinsdale, IL, USA
- Thanked 156 Times in 131 Posts
Great tools (from NirSoft), but most of these tools do not have equivalents for Firefox, Chrome, and other browsers. Also, many of us routinely clear the browser cookies, caches, and other locations where the data would be stored. Any help for us?
One more tool users often overlook is in your firewall or web shields (security program). These programs also may include their own logs and reports. Sometimes, these logs and reports contain information very similar to what was lin this article, if you learn where and how to look. In the new Avast 5, for example, each of its Web Shileds has a log and a running graph of activities being monitored and significant security events. Instructions vary from product to product, and so does the quantity and quality of data logged. In some programs, you need to turn on logging and reporting to get data.
Scan logs also may provide important clues as to how your computer got infected. Don't overlook tthis valuable resource.-- Bob Primak --