这样,能够识别签名的工具就可以有选择地为您授予软件安全特权,这是其他文件做不到的,它还可以检测代码是否被篡改过。
Tools that recognize your signature can then optionally grant your software security privileges it wouldn't otherwise have, and detect if the code has been tampered with.
Web浏览器上运行的任何代码都可能被恶意用户篡改或者完全绕开。
Any code that executes in a Web browser can be tampered with, or bypassed completely, by a malicious user.
因为单一的校验和技术比较容易被攻击代码屏蔽,所以有人提出更安全的方案:互联校验和网络,只有令整个网络失效,才能对付这种抗篡改技术。
Since a single checksum is relatively easy for an attacker to disable, stronger proposals rely on a network of inter-connected checksums, all of which must be disabled to defeat tamper resistance.
它还保护了公共密钥不能被篡改,从而防止网络欺诈,欺骗,和篡改代码的攻击。
It also ensures that public keys cannot be tampered with, thereby preventing phishing, spoofing, and code-tampering attacks.
另外,硬件虚存机制可以对内存部分区域提供写保护,以防止代码和数据被其它恶意的应用程序所篡改。
Also, the hardware virtual memory mechanisms allow areas of memory to be protected against writing. This protects code and data from being overwritten by rogue applications.
另外,硬件虚存机制可以对内存部分区域提供写保护,以防止代码和数据被其它恶意的应用程序所篡改。
Also, the hardware virtual memory mechanisms allow areas of memory to be protected against writing. This protects code and data from being overwritten by rogue applications.
应用推荐