Conversation

It dumps a process into a directory via tons of hacks and then restores it. It can somehow restore existing TCP connections without dropping them, etc. You can even do that across computers. The way it works under the hood is pretty scary. Victor Frankenstein would approve.
1
5