A method for selectively preventing the downloading and execution of undesired
Executable Objects in a computer. The method comprises when an Executable Object
is detected at a gateway, analyzing the header of the Executable Object, determining
the resources of the computer that the Executable Object needs to utilize, comparing
the resources of the computer that the Executable Object needs to utilize with
a Security Policy and if the resources of the computer that the Executable Object
needs to utilize are included in the list of the resources prohibited for use by
the Security Policy, preventing the Executable Object from passing through the
gateway, thereby preventing it from reaching the computer which has initiated its downloading.