Description: The analysis of basic vulnerabilities of software is conducted. Actuality of providing of protecting from the unauthorized change of information is certain. Researches of methods of authentication of software are conducted, as one of ways of decision of the put task. It is certain that analysable information must possess specific parameters, allowing to specify the measure of recognition of the program. Expedience and possibility of the use of R/S of analysis for establishment of integrity and authenticity of software is well-proven, here as the probed description frequency of appearance of operators was utillized.
Keywords: authentication, defence, software, R/S analysis