In response to the occurrence of a restricted event in a computing device,
a user of the computing device is presenting with a challenge including
information designed to assist in determining whether the challenge is
answered by a human. If it is determined that the challenge was not
answered by a human, the restricted event is counteracted.