Next morning Aiden spent in Sarah's office discussing tools they are using for password cracking, network scanning, network analyzers, scanners for databases and files, etc. When he finished introducing tools they are using, he concluded. "I noticed you are using other tools. Do a comparison of these versus the ones you are using, and if you find that yours are performing better, let me know. Based on what you suggest, we might modify our tools or just use the ones you are using."