Tampering with pieces of software is inhibited. Hardware protection
prevents hackers from forcing various pieces of software from running on
unauthorized pieces of hardware. The obfuscation of a software image so
as to becloud the comprehension of hackers in reverse engineering pieces
of software comprising the software image is provided. Image verification
ensures the originality of the pieces of software to be installed.