III. Stopping Unauthorized Software from Accessing Your Devices