Tampering with pieces of software is inhibited. Registry protection prevents changes made to keys and values in a central hierarchical database. Hardware protection prevents hackers from forcing various pieces of software from running on unauthorized pieces of hardware. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.

 
Web www.patentalert.com

< Configuring and organizing server security information

< Method and system for configuring and scheduling security audits of a computer network

> System and method for dynamically extending a DRM system using authenticated external DPR modules

> Graphical user interface for a portion of a display screen

~ 00607