Code

No Image

Why should you sign your binaries

One of the larger questions facing the software industry is: How can I trust code that is published on the Internet? Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of a cryptographic hash.[Wikipedia] This means that code signing can provide several valuable features: – provide identity of the software when deploying – as can be seen in the picture below, it is reassuring to know that the binary comes from the producer of the software. – provide proof of the authenticity that the code has not been altered in any way – in some programming languages, it can also be used to help prevent namespace conflicts. Almost every code signing implementation will provide some sort of digital signature mechanism to verify the identity of the author or build system, and a checksum to verify that the object has not been modified. It can also be used to provide versioning information about an object or to store other meta data about an object. There are multiple ways to sign code. Microsoft has put together all available methods in this…


No Image

Truecrypt shutdown – 5 questions that must be asked

If you visit www.truecrypt.org you see this text below. If you install the software, you see it quite a couple of times. The domain www.truecrypt.org  is only redirecting now to www.truecrypt.sourceforge.net. There are many articles written on this topic, especially on “WHY?”. WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues This page exists only to help migrate existing data encrypted by TrueCrypt. The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform. And when you try to download it: Download: WARNING: Using TrueCrypt is not secure You should download TrueCrypt only if you are migrating data encrypted by TrueCrypt. TrueCrypt 7.2sigkey If you use TrueCrypt on other platform than Windows, click here. So, you can still use it. And it works as expected, only that you will get from time to time some warnings. So far, so good…   But the biggest question is WHY did they…


No Image

Finally, officially CSSLP certified

(ISC)2 requires that a candidate meets some requirements before he/she receives the right to call himself/herself (ISC)2 certified.     Receiving the (ISC)² credential is a several-step process: Required Experience – possessing the required number of years for the appropriate credential Study – taking advantage of the educational materials (ISC)² makes available for you to review and refresh your knowledge before taking the credential examination Application – validating your education and/or experience Examination – sitting and passing the appropriate exam Code of Ethics – committing to and abiding by principles and guidelines set forth by (ISC)² Endorsement Process – attesting to your eligibility requirements After that you get :    Maintaining your membership requires the following: Remain in Good Standing – to remain in good standing as a member of (ISC)² a credential holder must abide by the (ISC)² Code of Ethics Earn Continuing Professional Education Credits (CPEs) – Credential holders must earn the minimum number of Continuing Professional Education credits (CPEs) annually during each year of the three-year certification cycle. Although members may earn more than the minimum number of CPE credits required for credential maintenance for the three-year cycle, they are still required to earn and submit the minimum annual number to maintain their certification in “good standing.” Pay…



%d bloggers like this:

By continuing to use the site, you agree to the use of cookies and to its Privacy Policy more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close