Abstract:
Tampering with pieces of software is inhibited. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires protection from tampering is also provided. Another process for determining whether the hardware resources, such as the central processing unit or the cache memory on a computing machine, belong to a class for which inhibiting software tampering is possible, is also provided.
Abstract:
Tampering with pieces of software is inhibited. Service protection inhibits tampering by allowing various unauthorized services to execute. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.
Abstract:
Dynamically adapting the layout of a document to a particular output device. The layout of a document can be adapted to a particular output device so that the document fully utilizes the capabilities of the output device. A layout generator interrogates the output device to determine the capabilities of the output device. Based upon the capabilities of the output device, the layout generator selects a style sheet to accommodate the particular output device. The style sheet assigns values to format properties such as font properties, color and background properties, and text properties. The layout of the document is adapted to the particular output device by rendering the document on the output device using the values defined in the style sheet.
Abstract:
Tampering with pieces of software is inhibited. Registry protection prevents changes made to keys and values in a central hierarchical database. Hardware protection prevents hackers from forcing various pieces of software from running on unauthorized pieces of hardware. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.
Abstract:
Tampering with pieces of software is inhibited. Installation setup protection inhibits tampering during the installation of various pieces of software. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.
Abstract:
Tampering with pieces of software is inhibited. Hardware protection prevents hackers from forcing various pieces of software from running on unauthorized pieces of hardware. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.
Abstract:
Dynamically adapting the layout of a document to a particular output device. The layout of a document can be adapted to a particular output device so that the document fully utilizes the capabilities of the output device. A layout generator interrogates the output device to determine the capabilities of the output device. Based upon the capabilities of the output device, the layout generator selects a style sheet to accommodate the particular output device. The style sheet assigns values to format properties such as font properties, color and background properties, and text properties. The layout of the document is adapted to the particular output device by rendering the document on the output device using the values defined in the style sheet.