Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What would you define as 'suspicious'? How would you distinguish suspicious from not suspicious?


Frequency, network use, running unknown executables




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: