How to Arm and Disarm Your System