Methods and devices are disclosed for discouraging unauthorized modifications to set top boxes and gateways. Resource information is received that describing the number of disk drives and/or the capacity of each disk drive. A processor communicates with a database that stores configuration information. The processor compares the resource information to the configuration information. When the resource information differs from the configuration information, then the processor detects unauthorized modifications to the set top box.

 
Web www.patentalert.com

< Database system configured for automatic failover with no data loss

> Provision of electronic mail services via a cable services network

> System for maintaining patient medical records for participating patients

~ 00533