Security Software and Undocumented API Usage

Thanks for this advice, Peter. This pretty much addresses what I was thinking about when asking this question.