Browse by Tags

Tagged Content List
  • Blog Post: What's the Difference, Part Five: certificate signing vs strong naming

    Both strong naming and digital signatures use public key cryptography to provide evidence about the origin of an assembly, so that you can apply security policy to determine what permissions are granted to the assembly . They differ most importantly not in their mathematical details, but in what problems...
  • Blog Post: Alas, Smith and Jones

    We have a feature in C# which allows you to declare a " friend assembly ". If assembly Smith says that assembly Jones is its friend, then code in Jones is allowed to see "internal" types of Smith as though they were public(*). It's a pretty handy feature for building a "family" of assemblies that share...
Page 1 of 1 (2 items)