|
|
The only solution to trojan horse programs
There is only one solution to trojan horses that really works.
The only solution to trojan horse programs
It's all about trust. Cryptographic signatures are a very strong method of establishing trust, but you can still trick people into believing that your electronic identity is trustworthy. It probably doesn't need to go that far in most cases. Just be smart about what you trust. P2P is an extremely untrustworthy source. Don't get applications from it. Period.
The only solution to trojan horse programs
One needs to be able to trust the people who sign the code to be who they say they are. Therefore, you need to be able to trust the certificating authority only to issue certificates to the right people. And this doesn't always happen: 'VeriSign, Inc.... issued two VeriSign Class 3 code-signing digital certificates to an individual who fraudulently claimed to be a Microsoft employee. The common name assigned to both certificates is "Microsoft Corporation".' In other words, no matter what system is in place, it only takes a little social engineering to circumvent it. |
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysNo new commentsLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.09 seconds |
|