Click here to Skip to main content
15,922,894 members
Home / Discussions / C#
   

C#

 
AnswerRe: How to paste outside of my application Pin
BillWoodruff26-Aug-13 13:46
professionalBillWoodruff26-Aug-13 13:46 
GeneralRe: How to paste outside of my application Pin
Mahmoud EL-Shazly27-Aug-13 11:51
Mahmoud EL-Shazly27-Aug-13 11:51 
GeneralRe: How to paste outside of my application Pin
Bernhard Hiller27-Aug-13 20:38
Bernhard Hiller27-Aug-13 20:38 
GeneralRe: How to paste outside of my application Pin
Mahmoud EL-Shazly28-Aug-13 0:42
Mahmoud EL-Shazly28-Aug-13 0:42 
GeneralRe: How to paste outside of my application Pin
DaveyM6928-Aug-13 1:35
professionalDaveyM6928-Aug-13 1:35 
GeneralRe: How to paste outside of my application Pin
Mahmoud EL-Shazly1-Oct-13 20:01
Mahmoud EL-Shazly1-Oct-13 20:01 
AnswerRe: How to paste outside of my application Pin
Bernhard Hiller26-Aug-13 20:52
Bernhard Hiller26-Aug-13 20:52 
AnswerRe: How to paste outside of my application Pin
OriginalGriff27-Aug-13 3:42
mveOriginalGriff27-Aug-13 3:42 
GeneralRe: How to paste outside of my application Pin
Mahmoud EL-Shazly27-Aug-13 14:17
Mahmoud EL-Shazly27-Aug-13 14:17 
QuestionStrongname vs Obfuscation - resistant to tampering? Pin
devvvy26-Aug-13 13:01
devvvy26-Aug-13 13:01 
AnswerRe: Strongname vs Obfuscation - resistant to tampering? Pin
Abhinav S26-Aug-13 19:09
Abhinav S26-Aug-13 19:09 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
devvvy26-Aug-13 20:02
devvvy26-Aug-13 20:02 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
Eddy Vluggen26-Aug-13 23:15
professionalEddy Vluggen26-Aug-13 23:15 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
Dave Kreskowiak27-Aug-13 2:12
mveDave Kreskowiak27-Aug-13 2:12 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
devvvy27-Aug-13 2:19
devvvy27-Aug-13 2:19 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
Dave Kreskowiak27-Aug-13 2:42
mveDave Kreskowiak27-Aug-13 2:42 
AnswerRe: Strongname vs Obfuscation - resistant to tampering? Pin
jschell27-Aug-13 9:36
jschell27-Aug-13 9:36 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
devvvy27-Aug-13 12:44
devvvy27-Aug-13 12:44 
AnswerRe: Strongname vs Obfuscation - resistant to tampering? Pin
Keld Ølykke29-Aug-13 7:17
Keld Ølykke29-Aug-13 7:17 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
devvvy29-Aug-13 19:37
devvvy29-Aug-13 19:37 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
Matty2229-Aug-13 21:32
Matty2229-Aug-13 21:32 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
Keld Ølykke30-Aug-13 0:27
Keld Ølykke30-Aug-13 0:27 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
Matty2230-Aug-13 3:12
Matty2230-Aug-13 3:12 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
Keld Ølykke30-Aug-13 5:09
Keld Ølykke30-Aug-13 5:09 
GeneralRe: Strongname vs Obfuscation - resistant to tampering? Pin
Keld Ølykke29-Aug-13 23:59
Keld Ølykke29-Aug-13 23:59 
If understand you right, you are asking whether I think MD5 hashes are great to verify that a downloaded file is authentic - e.g. like described here http://www.openoffice.org/dev_docs/using_md5sums.html[^]. I like this tech.

However, I don't think most users are able or care to do these checks. The problem here is that the user needs to authenticate the file herself, that is, to match the public available hash code of the file with a calculation she has to initiate.


If you ask me whether you should use strong name signing, my answer is yes. Not because it is a very strong security, but because it is a mechanism that runs by default for most users.

Again most users will not check the public available hash'es of the assemblies that they load, so whether they have been decompiled and compiled again by an evil person is not a question that can be answered by your users.



> Are you aware of alternatives than strong name and md5?

Not really for files. Sorry. I guess it is hard to enforce.
Between servers it is pretty common to know each others certificates / public keys. Messages are signed when sent and authenticated when received.
If you have code running at both server and client, you could add server authentication on the client side e.g. if your code is downloading files the files your code can authenticate the files against server certificates.

I think there is a gap here in the user experience that needs to be filled by a good standard and a handful of products.

Kind Regards,

Keld Ølykke

modified 30-Aug-13 6:41am.

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.