A method of identifying applications installed on a customer computer
system by collecting signature information associated with installed
binaries. The binaries are precisely identified by comparing the
collected signature information to previously stored signatures. In a
specific implementation the signatures comprise MD5 signatures.