The log is where everything on a user's IP is stored. When a hacker connects to an IP, it it logged in the Log.

You should always clear the logs before you disconnect, as the victim Ican review the logs, take your IP, and connect to YOUR system, and hack you back.

Community content is available under CC-BY-SA unless otherwise noted.