involves packages which consist of viruses, worms and/or Trojan horses or almost every other Laptop or computer code, data files or programs created to interrupt, ruin or Restrict the features of any Laptop application or components or telecommunications;“I came across this on line. So I checked on it. It was uncomplicated and economical. I would