Uninformed: Informative Information for the Uninformed

Vol 4» 2006.Jun


Conclusion

As the Internet becomes an increasingly hostile place and the need for in-depth personal security software (as a supplement or even replacement for proper system administrator) grows for end-users, it will become increasingly important for the vendors and providers of personal security software to ensure that their programs do not impair the normal operation of the systems upon which their software is installed. The author realizes that this is a very difficult task given what is expected of most personal security software suites, and hopes that by shedding light on the flaws in existing software, new programs can be made to avoid similar mistakes.