BRIEF DESCRIPTION OF THE DRAWINGS
The present invention will be more fully understood and appreciated from the following detailed description, taken in conjunction with the drawings in which:
FIG. 1 is a simplified block diagram of prior art systems for blocking malicious content;
FIG. 2 is a simplified flowchart of a method for wrapping executable code within a safe portable executable file at a gateway computer, for delivery to a client computer, in accordance with a preferred embodiment of the present invention;
FIG. 3 is a simplified flowchart of a method for executing the safe portable executable at a client computer, in accordance with a preferred embodiment of the present invention;
FIG. 4 is a simplified block diagram of a gateway computer system for wrapping executable code within a safe portable executable file, in accordance with a preferred embodiment of the present invention;
FIG. 5 is a simplified illustration of executable codes running in different security contexts on a client computer, in accordance with a preferred embodiment of the present invention;
FIG. 6 is a screen shot of a Windows Task Manager identifying the three processes of FIG. 5, in accordance with a preferred embodiment of the present invention; and
FIG. 7 is a simplified illustration of the structure of a portable executable file, modified in accordance with a preferred embodiment of the present invention.