8 | WeLiveSecurity

8

Figure 5: Killing running processes