Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don’t think that’s a good safety heuristic.


I agree that it's not good, yet anecdotally I've realized that a device has been compromised by running `top`, on Windows and on Linux. It's not a good heurestic because it's only disvoverable post-compromise.


I’ve discovered a compromise before because of the fans going full speed on a server.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: