"However, there is a method to get this capability immediately by ???fooling??? the applications with false users, and using existing application interface modification capabilities." . . . .