Making it easy to identify specific penetration tools and methodologies. Every attack is countered with practical, relevant, field- tested workarounds, which have their own special Countermeasure icon.