Results 1 to 2 of 2
  1. #1
    2 Star Lounger
    Join Date
    Oct 2009
    Shoreline, Washington, USA
    Thanked 1 Time in 1 Post


    Browser forensic tools find malware entry points

    By Ryan Russell

    Malware removal is only the first step in fighting an infection.

    Your job isn't finished until you've determined what the malware is, how it breached your defenses, and how to prevent similar infections in the future.

    The full text of this column is posted at (paid content, opens in a new window/tab).

    Columnists typically cannot reply to comments here, but do incorporate the best tips into future columns.
    Last edited by revia; 2011-01-20 at 13:55.

  2. #2
    Lounge VIP bobprimak's Avatar
    Join Date
    Feb 2009
    Hinsdale, IL, USA
    Thanked 149 Times in 126 Posts
    Great tools (from NirSoft), but most of these tools do not have equivalents for Firefox, Chrome, and other browsers. Also, many of us routinely clear the browser cookies, caches, and other locations where the data would be stored. Any help for us?

    One more tool users often overlook is in your firewall or web shields (security program). These programs also may include their own logs and reports. Sometimes, these logs and reports contain information very similar to what was lin this article, if you learn where and how to look. In the new Avast 5, for example, each of its Web Shileds has a log and a running graph of activities being monitored and significant security events. Instructions vary from product to product, and so does the quantity and quality of data logged. In some programs, you need to turn on logging and reporting to get data.

    Scan logs also may provide important clues as to how your computer got infected. Don't overlook tthis valuable resource.
    -- Bob Primak --

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts