Power users, those with detailed knowledge of their computer systems, will be better equipped to handle a larger variety of anti-virus tools. A power user is more able to determine whether a change detected by a checksum program is in fact legitimate. Additionally, a power user is going to be better equipped to configure some of the other tools, such as general purpose monitors and access control shells.