Captain Kirk
Member
hi, wow, boy we got a doppleganger of a quandary here.
geez, the possibilities.
security is essential. i am trying to protect myself.
does anybody know the answer to this question?
in the running processes, someone said that sometimes a malicious program can pose a normal one with the same name as a real running process.
how can you tell the difference between a malicious program with the same name as a real program? they both look the same.
and does this happen often?
geez, the possibilities.
security is essential. i am trying to protect myself.
does anybody know the answer to this question?
in the running processes, someone said that sometimes a malicious program can pose a normal one with the same name as a real running process.
how can you tell the difference between a malicious program with the same name as a real program? they both look the same.
and does this happen often?