摘要 |
The computer (A) includes an operating system (B), security software (E) and a hash database (F). When the operating system tries to open a first file (K) in order to execute it, the security software checks to see whether a first hash for the file is stored in the database before allowing the operating system to execute the file. |