Also would need spybot search and destroy. On another note if someone goes oh can I use you computer for myspace do the following:
Run to computer
Puck up computer
Run away with computer
Return when person is gone
Install invisible fence around computer
Place collar on person who made request.