The present invention prompts a user to accept, install and execute
unauthenticated computer applications. When the user accepts the
application, information relating to the application files may be added
to a prompt exclusion list (PEL). In this way, further downloads or
execution of the same applications may be performed without prompting the
user. The integrity of the application is checked before it is run. If
the integrity does not match the stored integrity, the application is
terminated. A revocation list is maintained that denies any applications
on the revocation list from executing even if they contain signed
certificates and are from trusted sources.