Patent attributes
A method to secure data and hardware associated with a computing device is described. A request to initiate a secondary operating system is received. The secondary operating system may be partitioned from a primary operating system. In one embodiment, a reporting program may be executed on the secondary operating system and may also be isolated from the primary operating system. A determination may be made as to whether characteristics of the secondary operating system have been altered. The request to initiate the secondary operating system may be denied if characteristics of the secondary operating system have been altered. However, the secondary operating system may be initiated if characteristics of the secondary operating system have not been altered. In addition, the primary operating system may be initiated if characteristics of the secondary operating system have not been altered.