The Good
  - 	Extensive configuration
  
- 	Easy separation of critical system parts through use of
virtual spaces
  
- 	Security dæmon control of file actions
  
- 	Forced code execution
  
- 	Supports POSIX capabilities
The Bad
  - 	Still in development
  
- 	Testing on SMP machines not complete
  
- 	Automatic configurator needed
  
- 	Must be used as an add-on, i.e., not in kernel