To install a black box on a computing device, an administrator has access
to the computing device and queries same for machine properties thereof.
The administrator sends the machine properties of the computing device to
a black box server as part of a request for a new black box for the
computing device. The black box server in response constructs the new
black box based in part on the machine properties so as to tie the new
black box to the computing device, and delivers the new black box to the
administrator. The administrator thereafter installs the new black box on
the computing device. The administrator may include an activation
provider running on the computing device and an activation manager in
communication with the activation provider. The administrator may also
deactivate the black box if it determines that the black box is no longer
trustworthy.