Hacker News new | past | comments | ask | show | jobs | submit login

These tools behave like trojans, allowing complete control over a machine. Why would anyone want to run something like that without being able to check for malicious code is beyond my comprehension.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: