Software loading is effected by means of a header 40 and software modules
STUB1, STUB2 etc. The header 40 calls each stub in appropriate order,
installing the stub in a loader region 42, executing the stub and then
removing it. The STUBS may be encrypted and may be installed at random or
pseudo-random locations in the region 42. Generic breaches of security,
such as "riding the loader" are prevented because the stubs appear only
transiently and at unpredictable positions. Security may be further
improved by selecting each stub from a group of alternatives which are
differently coded but functionally equivalent.