Augustus, a doctoral student, is working on a thesis that requires him to browse the Internet for information and visit various unverified Web sites. To protect his computer from the security threats, he uses a tool that utilizes both hardware and software to provide protection against hackers. In the given scenario, Augustus is most likely using__________.