Definitions

Sorry, no definitions found. Check out and contribute to the discussion of this word!

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word code-signing.

Examples

  • Steve Jobs locks down his devices: Since 2008, Apple has implemented a safeguard called "code-signing" to prevent hackers from running any of their own commands on its mobile operating system.

    Forbes.com: News Andy Greenberg 2011

  • Steve Jobs locks down his devices: Since 2008, Apple has implemented a safeguard called "code-signing" to prevent hackers from running any of their own commands on its mobile operating system.

    Forbes.com: News Andy Greenberg 2011

  • "The combination of Apple's code-signing system, sandboxing and its curated App Store eliminates the threat of malicious mobile codes for the foreseeable future," Jaquith writes.

    7 Steps to Stronger Enterprise iPhone Security 2010

  • Engineers who write for just about any mobile operating system today have to spend time and cash obtaining security keys and code-signing certificates.

    Google's Open Source Android OS Will Free the Wireless Web By Daniel Roth 2008

  • Engineers who write for just about any mobile operating system today have to spend time and cash obtaining security keys and code-signing certificates.

    Google's Open Source Android OS Will Free the Wireless Web 2008

  • The iPad uses a DRM system called "code-signing" to limit which apps it can run.

    Publishers Weekly - Children's Books News 2010

  • The iPad uses a DRM system called "code-signing" to limit which apps it can run.

    Publishers Weekly - Children's Books News 2010

  • Google can easily switch off malicious applications through use of a code-signing system.

    gHacks Technology News 2010

  • "We obviously won't know how Flash will work until the public release later this year, but at some level Flash CS5 will have to implement the Apple code-signing utility on Windows, thus distributing a competing method of compiling Apple certificates and device provisioning profiles into a signed binary," he writes.

    InformationWeek - All Stories And Blogs Thomas Claburn 2010

  • To execute code, a cryptographic code-signing mechanism would need a valid digital signature, reducing the ability to insert malicious payloads.

    Comments for The Next Web Tweets that mention First iPhone Hack Since 2008 E 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.