Hacker News new | past | comments | ask | show | jobs | submit login

What would you define as 'suspicious'? How would you distinguish suspicious from not suspicious?



Frequency, network use, running unknown executables




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: