Hacker News new | past | comments | ask | show | jobs | submit login

All of these programs are hacks. They delete/rename/move the executables that have been identified by system monitoring to be the source of such data collection.

The problem is using any such tool will put you into the world of unsupported modification.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: