CR is the leader in the hard task of repairing a bug present in a growing number of sharewares and exploited by a polymorph virus known as the "30th day" virus. As its name implies, the virus manifests itself only once you have run the infected software for a certain period of time; usually 30 days suffice to trigger it. To protect these buggy sharewares from this virus, CR uses techniques that other anti-virus vendors such as McAfee, Norton, Sophos, Thunderbyte and F-Proot seem to ignore.
Also, many developers have used CR in the past to test their softwares for Y2K compliance.
Recently, we have worked hard adapting CR to the well kwown Y10K bug (aka "bug of the year 10000"). Developers can now use CR to test conformity of their programs against this ever-threatening bug.