A computer system includes a security subsystem which is able to
trustfully track which files or storage areas of a storage device have
been altered since a last virus scan. The trusted information can then be
used to accelerate scans for undesirable code or data such as viruses and
invalid or corrupt registry entries. In the case of viruses, files or
storage areas which have been altered are scanned against a super-set of
virus definitions. Unaltered files or storage areas are scanned against a
subset of virus definitions.