Recognizing that for the majority of its useful life, however, the machine is in an operational context, and is not being modified, the present invention provides a second ???operational??? service context, where system resources, key content, user accounts, and other data are all protected from any changes.