I remember reading a book some years ago (Steal This Computer book or something like that) that described how to disable such programs in such a way that they still appeared to function correctly. I tend to think that they may give a false sense of security. If I were considering one, I would research exactly how secure it really is and which one is the hardest to defeat.