The hacklog isn't exactly a log of hacks. Whenever the input filtering routines find something not quite right, or whenever a corrupted profile is found, the request is logged to the hacklog.

In general, you don't need to worry about the hacklog, unless it grows more than a few hundred KB. It's perfectly safe to ignore, or delete entirely.

(The name and purpose comes from the 5-series, where it really was a log of legit hack attempts. Our record on security issues since then has made the log pretty redundant...)


This thread for sale. Click here! [Linked Image from navaho.infopop.cc]