A model restricts un-trusted data/objects from running on a user's machine
without permission. The data is received by a protocol layer that reports
a MIME type associated with the DATA, and caches the data and related
cache file name (CFN). A MIME sniffer is arranged to identify a sniffed
MIME type based on the cached data, the CFN, and the reported MIME type.
Reconciliation logic evaluates the sniffed MIME type and the CFN to
determine a reconciled MIME type, and to update the CFN. A class ID
sniffer evaluates the updated CFN, the cached data, and the reconciled
MIME type to determine an appropriate class ID. Security logic evaluates
the updated CFN, the reported class ID, and other related system
parameters to build a security matrix. Parameters from the security
matrix are used to intercept data/objects before an un-trusted
data/object can create a security breach on the machine.