Malware Log Analysis: Don’t Let the HTTP Code Fool You

An essential component of the analysis and cleanup of websites infected with malware is viewing and evaluating the log files. However, even here there are things to consider that might seem odd at first glance.

This blog post shows a common pitfall when doing log analysis.