Definitions
Sorry, no definitions found. Check out and contribute to the discussion of this word!
Etymologies
Sorry, no etymologies found.
Support
Help support Wordnik (and make this page ad-free) by adopting the word code-signing.
Examples
-
Steve Jobs locks down his devices: Since 2008, Apple has implemented a safeguard called "code-signing" to prevent hackers from running any of their own commands on its mobile operating system.
Forbes.com: News Andy Greenberg 2011
-
Steve Jobs locks down his devices: Since 2008, Apple has implemented a safeguard called "code-signing" to prevent hackers from running any of their own commands on its mobile operating system.
Forbes.com: News Andy Greenberg 2011
-
"The combination of Apple's code-signing system, sandboxing and its curated App Store eliminates the threat of malicious mobile codes for the foreseeable future," Jaquith writes.
-
Engineers who write for just about any mobile operating system today have to spend time and cash obtaining security keys and code-signing certificates.
Google's Open Source Android OS Will Free the Wireless Web By Daniel Roth 2008
-
Engineers who write for just about any mobile operating system today have to spend time and cash obtaining security keys and code-signing certificates.
Google's Open Source Android OS Will Free the Wireless Web 2008
-
The iPad uses a DRM system called "code-signing" to limit which apps it can run.
-
The iPad uses a DRM system called "code-signing" to limit which apps it can run.
-
Google can easily switch off malicious applications through use of a code-signing system.
-
"We obviously won't know how Flash will work until the public release later this year, but at some level Flash CS5 will have to implement the Apple code-signing utility on Windows, thus distributing a competing method of compiling Apple certificates and device provisioning profiles into a signed binary," he writes.
InformationWeek - All Stories And Blogs Thomas Claburn 2010
-
To execute code, a cryptographic code-signing mechanism would need a valid digital signature, reducing the ability to insert malicious payloads.
Comments for The Next Web Tweets that mention First iPhone Hack Since 2008 E 2010
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.