The restriction of particular resources includes providing a digital
signature for unauthorized resources based on a structure-related
parameter of the resource. Thus, attempts at circumventing recognition of
such resource will likely result in altering the overall functionality of
the resource. Further, such digital signatures are encoded in a critical
file required for loading of a resource, thus ensuring that the identity
of the resource is considered before execution thereof. Enforcement of
the resource restriction includes generating a verification signature for
a resource that requests loading. The verification signature is compared
to the signature coded into the critical file, and a positive match
results in the resource being blocked from loading.