that's surprisingly astute from you, SilentKiller.
pretty much every program with any tangible from of "hack detection" will at the very least, check what processes are running on your machine to a list of "suspicious" ones determined by the distributors of the software. this is not new, and such information is probably never even seen by human eyes to begin with.
pretty much every program with any tangible from of "hack detection" will at the very least, check what processes are running on your machine to a list of "suspicious" ones determined by the distributors of the software. this is not new, and such information is probably never even seen by human eyes to begin with.