I found this hacklog.cgi file created couple days ago. Does it tell me who the hacker is? I read that hacklog.cgi is created automatically when it detects corrupted files. Do I need to "rebuild" the files? What are the things that I need to watch out for when reading the hacklog.cgi?

I also read that we can delete this file, is that right?

Thanks,
Tippy


-an adventure is simply a well planned trip gone awry.