Tampering with pieces of software is inhibited. Registry protection
prevents changes made to keys and values in a central hierarchical
database. Hardware protection prevents hackers from forcing various
pieces of software from running on unauthorized pieces of hardware. The
obfuscation of a software image so as to becloud the comprehension of
hackers in reverse engineering pieces of software comprising the software
image is provided. Image verification ensures the originality of the
pieces of software to be installed.