02-25-2014
That can't be right. Don't the individual files have their own headers/signature and trailer?
--ahamed
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi, ive just been given a HP UX c180 to play with, along with a few external hd`s, can anyone recommend me a good place to start learning unix please as i havent got a clue what im doing when it comes to unix.
Either web links or book recomendations would be great.
I would like to set it up with... (1 Reply)
Discussion started by: Leviathan40
1 Replies
2. UNIX for Dummies Questions & Answers
I'm trying to write a script, named "worfo" which will read a file in and return, on the screen, the number of words in the file. Also, I am looking to do several extras with this script. I need to allow it to accept the option "-n" which will use all non-alpha characters to delimit words. Also,... (2 Replies)
Discussion started by: adawg1283
2 Replies
3. Shell Programming and Scripting
please give the difference between AIX shell scripting and Unix shell scripting. (2 Replies)
Discussion started by: haroonec
2 Replies
4. AIX
I have moved the etc/passwd file and we are now unable to get in to Unix - any suggestions? (2 Replies)
Discussion started by: vbagwell
2 Replies
5. Shell Programming and Scripting
I have a irritating problem with a "if"-statement or what you should call it, in sed. I would love some help here since I am very, very stuck.
I have this statement that I want to do:
if line contains a:
do this
if none of the lines contained a:
do this
The problem with this... (8 Replies)
Discussion started by: hjalle
8 Replies
6. UNIX for Dummies Questions & Answers
hi there
i am very new to the world of CRON. i would like to know from below the ground up how i can learn abouot cron. where the best tutorials lie. i have an assignment that requires i set up a cron job to download a price file. am i in control of where the price file is downloaded to? (eg to... (2 Replies)
Discussion started by: buzzby
2 Replies
7. Shell Programming and Scripting
Hi
How to call a shell scripting through a Perl scripting? Actually I need some value from Shell scripting and passes in the Perl scripting. So how can i do this? (2 Replies)
Discussion started by: anupdas
2 Replies
8. What is on Your Mind?
Hi all,
I would like to start developping some good scripting skills. Do you think it would be best to start with shell scripting or Perl? I already got a fundation, really basics, in perl. but I am wondering what would be best to be good at first.
Can you please help me determine which one to... (14 Replies)
Discussion started by: Pouchie1
14 Replies
9. Web Development
i am going to study any one of the scripting languages mentioned above(shell 0r perl scripting) . Which is having more scope for a fresher? (1 Reply)
Discussion started by: Anna Hussie
1 Replies
10. IP Networking
Hello my friends , i am totally stuck in ssh port forwarding topic
i had learn iptables and other networking topic without any problem but ssh port forwarding is headache
1. local port = what is this ? is this incoming traffic or outgoing traffic
2. remote port = same as above
3. dynamic... (2 Replies)
Discussion started by: rink
2 Replies
LEARN ABOUT CENTOS
signcode
Mono(signcode) Mono(signcode)
NAME
signcode - Digitally sign an PE executable using an X.509 certificate.
SYNOPSIS
signcode [options] filename
DESCRIPTION
Digitally sign an PE executable (CLR assembly, Win32 EXE or DLL) using an X.509 certificate and it's associated private key. The signature
is compatible with Authenticode(r) and can be validated with chktrust (either on Windows or on any platform supported by Mono).
OPTIONS
-spc spcfile
The Software Publisher File (spc) that contains the X.509 certificate chain used to digitally sign the PE executable.
-v pvkfile
The Private Key File (pvk) that contains the private key used to digitally sign the PE executable. This private key must match the
public key inside the publisher X.509 certificate.
-a md5 | sha1
The hash algorithm used in the digital signature of the PE executable. The default algorithm is MD5.
-$ individual | commercial
Add information about the publisher, i.e. if the signature is generated by an individual or a commercial entity.
-n description
Add a textual description of the signed file.
-i url Add a URL associated to the publisher or the signed file.
-t url URL to a timestamp service to countersign the PE executable. Countersignature is required if you want the PE executable signature to
be valid after the publisher certificate expires. The countersignature proves that the publisher had a valid (non-expired) certifi-
cate when the PE executable was signed.
-tr # Number of retries to get a timestamp for the countersignature.
-tw # Delay (in seconds) between the retries to get a timestamp for the countersignature.
-k name
CryptoAPI key container name (when not using -v).
-p name
CryptoAPI provider name (when not using -v).
-y # CryptoAPI provider type (when not using -v or -p).
-ky signature | exchange | #
CryptoAPI key type (when not using -v).
-r localMachine | currentUser
CryptoAPI key location (when not using -v).
-help , -h , -? , /?
Display help about this tool.
OTHER CODE SIGNING TECHNOLOGIES
Assemblies are PE files that can also be strongnamed using the sn.exe tool. The order of code signature is important if a file requires
both an Authenticode and a strongname signature. Strongname must be applied before the Authenticode signature. Applying a strongname after
the Authenticode signature, like re-signing an assembly (e.g. delay-sign), will invalidate the Authenticode signature.
KNOWN RESTRICTIONS
signcode cannot generate Authenticode signatures for CAB files.
AUTHOR
Written by Sebastien Pouliot
COPYRIGHT
Copyright (C) 2003 Motus Technologies. Copyright (C) 2004 Novell. Released under BSD license.
MAILING LISTS
Visit http://lists.ximian.com/mailman/listinfo/mono-devel-list for details.
WEB SITE
Visit http://www.mono-project.com for details
SEE ALSO
chktrust(1),makecert(1),cert2spc(1)
Mono(signcode)