A computer system comprises a security computer having a security database and
at least one workstation computer on which software is accessible for execution.
The database includes security values that the workstation computers use to verify
whether their copy of software is authentic (i.e., unmodified such as might occur
from action of a virus). The database can also be used verify whether the software
can be run on a particular workstation computer.