In this case, the software creator is Cisco, which may be considered as a "Trusted" vendor because of its story, however as said, there is no way of actually checking everything that is going on under the hood unless the source code was provided or unless you were a skilled reverse engineer. In the end, you are trusting (with Administrative privileges) an application to perform some changes in your system. Every piece of software that you install on your computer which does not provides the source code should be treated as potentially harmful.
0 Comments
Leave a Reply. |