It should be understood that the originally calculated hash value need not be stored in the FVT and that functions other than a hash function may be utilized without departing in scope from the invention. [0021] In yet another variation, the signature value is encrypted when the software or data is known to be trusted and then the encrypted signature value is also stored in the FVT. [0022] To achi