Browse by Tags

Tagged Content List
  • Blog Post: Use the right tool for the job

    Consider the following scheme: I have some client software which I sell. When the client software starts up for the first time, it obtains a “token” from the user. The token string can be anything; the user can choose their name, their cat’s name, their password, the contents of some disk file, whatever...
  • Blog Post: What's the Difference, Part Five: certificate signing vs strong naming

    Both strong naming and digital signatures use public key cryptography to provide evidence about the origin of an assembly, so that you can apply security policy to determine what permissions are granted to the assembly . They differ most importantly not in their mathematical details, but in what problems...
Page 1 of 1 (2 items)