While all of the present solutions operate to some extent to block unwanted information, new solutions of information shipping and availability of new and emerging multimedia screen equipment make particular vulnerabilities in the present approaches.