473,387 Members | 1,470 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

Verifying an Authenticode signed file

I am putting together a system that uses Authenticode to verify that critical files are not tampered with. This is one of the purposes for Authenticode. At run-time, I use CAPICOM to verify that the Authenticode signature is still present and is still valid - thus ensuring that the file remains unaltered.

Now... along comes Windows Vista. Microsoft's own documentation for CAPICOM explicitly states that CAPICOM is no longer supported as of Windows Vista. What do they recommend instead? A new low-level library which doesn't appear to have verification capability OR use .Net to replace CAPICOM.

So I've been researching .Net and how to validate Authenticode signed files... and what do I find? All the .Net users recommend using CAPICOM for this because (according to a Microsoft employee) ".Net doesn't have Authenticode verification yet... we're looking at that for version 3". Version 3 seems to be available yet still no Authenticode verification.

Anybody have any suggestions on how to verify Authenticode signatures on Windows Vista, when CAPICOM is retired?

For the nonce, it seems that CAPICOM does still function in Vista - but Microsoft lists it as "not supported" so I can only assume that some day it will no longer function. What do I do then?
Jul 26 '07 #1
0 1795

Sign in to post your reply or Sign up for a free account.

Similar topics

4
by: HD | last post by:
Hi, I was wondering if there is a way of verifying information that is in the registry of the user's computer??? Or is there a way of checking if a file is on the c:\ of the user's computer?? I...
4
by: Reinhold Schalk | last post by:
Hello, somewhere i've read that using strong names does assure two things: 1. Assure that the content of the assembly is not modified (that's ok in my opinion) 2. Assure that the assembly is...
5
by: Holger Klawitter | last post by:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi there, triggered by the recent questions about sorting, I started digging into my problems with upper('ä')='ä' when using LC_CTYPE and LANG =...
7
by: Hulo | last post by:
In a C program I am required to enter three numbers (integers) e.g. 256 7 5 on execution of the program. C:\> 256 7 5 There should be spaces between the three numbers and on pressing "enter",...
5
by: Mitchell Vincent | last post by:
I've recently started signing all EXEs that come out of here. I would like to verify the signature at startup to detect any changes to the EXE itself. Is something like that possible? I'm using...
2
by: Krish | last post by:
I want to programatically verify a Authenticode signed file. How do I do this?
1
by: schneider | last post by:
Hello, I'm looking for info on applying a Autenticode/Cert to my .NET libs. Anyone know of a link. Also any information on purchasing them from sources and what specific type of cert to...
0
by: steven acer | last post by:
Hi i'm trying to sign a file and verify its signature with a DSA key. But i don't know if i'm doing it the right way !. I tried 2 different ways but i either got an error or simply the...
7
by: wanni | last post by:
Hi All, I have a signed XML file which i want to use in my JavaScript. Before doing any operation using XML file data , i want to verify XML file signature (to verify file is not tempered with third...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.