Methods and devices are disclosed for discouraging unauthorized
modifications to set top boxes and gateways. Resource information is
received that describing the number of disk drives and/or the capacity of
each disk drive. A processor communicates with a database that stores
configuration information. The processor compares the resource
information to the configuration information. When the resource
information differs from the configuration information, then the
processor detects unauthorized modifications to the set top box.