Operating System Corruption: Steps to Recovery