the actionstab | 0.32 |
knitting manuals | 0.16 |
run in the background | 0.63 |
create backdoor | 0.63 |
enter the system | 0.57 |
steal password | 0.56 |
create their own copies | 0.55 |
enter the machine | 0.54 |
send message | 0.53 |
reinstall after partial… | 0.53 |
steal information | 0.52 |
wait for command | 0.52 |
More » |
their multitasking | 0.38 |
their high efficiency | 0.36 |
one significant weakness | 0.34 |
a .500 or better record | 0.32 |
extra negatives | 0.27 |
multiple side effects | 0.27 |
a list of 4urls | 0.25 |
firm grasp | 0.25 |
4 known modules | 0.25 |
multiple side negatives | 0.20 |
self-replicating virus-… | 0.16 |
the user | 0.38 |
program | 0.72 |
malicious programs | 0.68 |
non-self-replicating ty… | 0.20 |
the plant | 0.16 |
distributed | 0.57 |
installed | 0.56 |
employed by hacker | 0.56 |
hidden | 0.51 |
detected | 0.47 |
supported | 0.47 |
removed | 0.44 |
employed by cyber-thiev… | 0.43 |
known for their multita… | 0.42 |
recognized | 0.41 |
More » |