@ my anonymous coward friends
@ anonymous coward: It has flagged many sites in my Google search results and several others i've clicked on from other sites. When I click on a bad hyperlink, Linkscanner prevents me from connecting to it. Try it for 30 days free and see what you've been missing. Or, better yet, don't try it, and when the day comes you've been owned by a botnet, you might want to scan for a rootkit, and if you find one, it probably got there via a drivebydownloaded exploit that you could have prevented if only you weren't so full of yourself. Why is it that some security professionals think they know everything?
@ second anonymous coward: You wrote, "If you can be owned by visting a poisoned site, then you deserve to be. No LinkScanner will save your ass" That dumb statement only demonstrates your ignorance. I'm not visiting warez sites or any other sites where one might deserve to get hit by malware. These are ordinary sites on the web. If you'd prefer not to know a malicious site is trying to nail you (even if you are patched), then by all means, bury your head deeper in the sand.
@ everyone: inform yourselves. The misinformation on this thread is truly laughable. As John Thompson pointed out, exploits are different from viruses. You need AV software AND anti-exploit software. It's all about layering. If someone truly evaluates the product and takes the time to learn what it does, what it doesn't do, and how it's different from AV and AS and firewalls and intrusion detection systems, and they still decide they don't like it or don't need it, or they like a competitive product better, I can at least respect you for arriving at an informed opinion. But so many of the commenters here don't know the difference between an exploit or a virus, don't understand how the things spread, and haven't evaled the product.