During pre-boot (i.e., the period of time prior to initiating operation of
the workstation operating system), a networked workstation performs an
intrusion detection hashing function on selected workstation executable
program(s). A computed hash value calculated by the hashing operation is
compared against a trusted hash value that is downloaded from a server in
order to detect illicit (i.e., authorized) changes to the selected
workstation executable programs.