Concerned About Your Business Cyber Security?

(877) 321--7374

Digging into Authenticode Certificates, (Mon, Jun 4th)

I was speaking with a client about securing desktop operating systems, and his immediate comment to me was “of course, we could limit execution to only signed code” as one of his first planned steps to restrict malware execution.  By “signed” he of course refers to authenticode signing, where a software author can “sign” their code with a trusted certificate, just like we use certificates to websites.  You commonly see certificates on .exe, .cab, .dll, .ocx, .xpi, and .ps1 files – really anything that can be executed can be signed.

Ready For ASuperheroI.T. Solution?

Real Time Web Analytics