how can it collect information offline ? ask you to supply it yourself
? Please take a snapshot of your desktop and type out a list of your
directories ? It shows whether a nasty program can do this without
your permission, whether you think you are secure or not.
Where is the need to be online while doing these tests?!
Remember: The program does *not* acquire information the way a hacker
does (outside-in system intrusion), although the website seems to say
so. But PC Audit acts the way a trojan does (from the inside after
execution). As base functionality it does no more or less than trying
to use the online capabilities of your system to send system relevant
data.
It's simply a question of system fortification whether this task will
succeed or not. You can even tell the results beforehand, if you know
some basic facts of your system setup. I don't know (and don't care)
if PC Audit tries to disable or deceive running security software.
It would only be a somewhat advanced feature.
Without online connection it could test whether it *can* or *can not*
access or change resources, replace system files, start services and
so on. The results could be presented to the user while still offline.
As a *last* check there could be the test of using the IE libraries
(and/or other system resources for online-access) with very simple
*non-sensitive* data. I wrote about this before...
There are many areas in the whole test process, where (in most setup
conditions - different) warning bells should ring. But - from what
its website and several descriptions on the net tell - PC Audit does
*not* base its design on the pure presentation of system weaknesses,
but on sensationalism. Using a simple conjuring trick PC Audit shows
your data from the net.
Every AV program which warns of PC Audit does well. It is doublefaced
to complain AV programs should 'know of the good-natured character'
of PC Audit and pity the demonstration of security holes. Whether
PC Audit is bad or only plays the bad program a *very inapt* way:
Security software *should* warn, stop, and so on.
So show me where de-installation is difficult - I have run spybot, my
AV, the cleaner, and ad aware and none of them show anything left by
this programme - can you say what was left on your system - no-one
else has. As far as I see, there is no installation - it is a
standalone executable - if not, show me what it does and I will
readily apologise !
I didn't say that PC Audit has lacks in this field. I added these
thoughts, because they are needed to provide a consistent concept.
If you read back: The only words directly addressing PC Audit on my
last post are:
| If security-software bases its analysis on (partially) sensitive data
| sent to a server with unknown (to-be-trusted) security status over an
| insecure (not encrypted) line, than the programmers of such software are
| either malevalent, careless, or feckless. (Or all of these at the same
| time...)
I said that I didn't test the program and therefore can only base
my opinions on the information found online. The major source of
this is the website of ISA itself. I criticized the basic concept
and provided my opinion of ways to solve the central problems.
You have not been rude at all

Just have not shown why anyone
should be suspicious of this tool
Security software has to be straight-forward and *must not* try to
infatuate with cheap effects. If it chooses the latter way, and
(above all) violates the security of user data and arouses suspicion
in general, the program *ought* to be avoided.
BeAr