Managing and controlling the execution of software programs with a
computing device to protect the computing device from malicious
activities. A protector system implements a two-step process to ensure
that software programs do not perform malicious activities which may
damage the computing device or other computing resources to which the
device is coupled. In the first phase, the protector system determines
whether a software program has been previously approved and validates
that the software program has not been altered. If the software program
is validated during the first phase, this will minimize or eliminate
security monitoring operations while the software program is executing
during the second phase. If the software program cannot be validated, the
protector system enters the second phase and detects and observes
executing activities at the kernel level of the operating system so that
suspicious actions can be anticipated and addressed before they are able
to do harm to the computing device.