While it is possible through a software program running on the computer to require a user to enter a password or other verification code, this method is not robust in that a password may be guessed, or the software program may be bypassed by commercially available software development tools.