| the actionstab | 0.32 |
| knitting manuals | 0.16 |
| run in the background | 0.63 |
| create backdoor | 0.63 |
| enter the system | 0.57 |
| steal password | 0.56 |
| create their own copies | 0.55 |
| enter the machine | 0.54 |
| send message | 0.53 |
| reinstall after partial… | 0.53 |
| steal information | 0.52 |
| wait for command | 0.52 |
| More » |
| their multitasking | 0.38 |
| their high efficiency | 0.36 |
| one significant weakness | 0.34 |
| a .500 or better record | 0.32 |
| extra negatives | 0.27 |
| multiple side effects | 0.27 |
| a list of 4urls | 0.25 |
| firm grasp | 0.25 |
| 4 known modules | 0.25 |
| multiple side negatives | 0.20 |
| self-replicating virus-… | 0.16 |
| the user | 0.38 |
| program | 0.72 |
| malicious programs | 0.68 |
| non-self-replicating ty… | 0.20 |
| the plant | 0.16 |
| distributed | 0.57 |
| installed | 0.56 |
| employed by hacker | 0.56 |
| hidden | 0.51 |
| detected | 0.47 |
| supported | 0.47 |
| removed | 0.44 |
| employed by cyber-thiev… | 0.43 |
| known for their multita… | 0.42 |
| recognized | 0.41 |
| More » |