Hi there I have just come across the following link: http://www.morgud.com/interests/security/dfk-threat-simulator-v2.asp which describes "the DFK Threat Simulator was created. Bundling a de-clawed collection of dropper, rootkit, exploit, virus, trojan, spyware, keylogger, leaktest, process termination, action automation, and alternate data stream technology...". Now whilst only a simulator it makes claims about being able to get around most security applications but makes the following (and concerning) claims about PG specifically: "ProcessGuard is especially vulnerable because once the "pgaccount.exe" file is replaced with the dummy placeholder, ProcessGuard will allow any new process without prompting but will appear to be functioning normally! The only thing worse that no security is the illusion of security. In addition, ProcessGuard will protect the new dummy placeholder executable as its own and not allow it to be terminated." I was wondering anyone out there, especially Wayne, had any thoughts about this claim?