{"id":1005,"date":"2017-06-12T10:21:41","date_gmt":"2017-06-12T10:21:41","guid":{"rendered":"http:\/\/www.adlice.com\/?p=1005\/"},"modified":"2022-12-21T10:32:34","modified_gmt":"2022-12-21T10:32:34","slug":"what-is-code-signing","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/es\/what-is-code-signing\/","title":{"rendered":"What is Code Signing?"},"content":{"rendered":"\n<p>When executing software downloaded from Internet, <strong>everyone was at least once confronted with such security warnings<\/strong>:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"414\" height=\"310\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Unknown_Publisher.jpg\" alt=\"\" class=\"wp-image-1006\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Unknown_Publisher.jpg 414w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Unknown_Publisher-300x225.jpg 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Unknown_Publisher-320x240.jpg 320w\" sizes=\"(max-width: 414px) 100vw, 414px\" \/><figcaption class=\"wp-element-caption\">Source : trishtech.com<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"342\" height=\"199\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/UAC_Unknown_Publisher.png\" alt=\"\" class=\"wp-image-1007\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/UAC_Unknown_Publisher.png 342w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/UAC_Unknown_Publisher-300x175.png 300w\" sizes=\"(max-width: 342px) 100vw, 342px\" \/><figcaption class=\"wp-element-caption\">Source : blogspot.ch<\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><strong>These binaries are not digitally signed<\/strong> and as such, Windows issues a warning about potential security issues of running these. But what does that really mean?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Code Signing and Digital Signature<\/h2>\n\n\n\n<p>A <strong>digital signature<\/strong> can be inserted in any executable file (.exe, .msi, etc.), library (.dll), or driver (.sys) to verify their <strong>authenticity<\/strong> and <strong>integrity<\/strong>.<\/p>\n\n\n\n<p>Such file will include a <strong>digital certificate<\/strong> which contains information about the software publisher, the date when the signing process took place, the time of validity and much more.<\/p>\n\n\n\n<p>A <strong>code signing certificate<\/strong> can be obtained from a reliable <strong>Certificate Authority (CA)<\/strong> such as Verisign for about two hundred dollars a year. From the point of view of the CA, <strong>granting a certificate means that it trusts the software publisher and thus, the files signed with the certificate can be trusted as well (chain of trust)<\/strong>.<\/p>\n\n\n\n<p>On the other hand, unsigned binaries are <strong>not necessarily malicious<\/strong> but the absence of a digital signature means that <strong>the file integrity cannot be guaranteed<\/strong> and it may have been altered in a malicious way, or distributed by an untrusted publisher.<\/p>\n\n\n\n<p>As we saw above, trust is the core of Code Signing. <strong>Certification Authorities have to make sure not to issue signing certificates to malware writers<\/strong>. For this purpose, they make a background check of the requester to check its legitimacy.<\/p>\n\n\n\n<p>Code signing certificates exist in two different classes: <strong>Standard and Extended Validation (EV)<\/strong>. EV signing certificates have a much <strong>higher level of credibility<\/strong> and <strong>require an extensive background check to be issued<\/strong>. They are also much more expensive and cannot be shared among computers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Example<\/h2>\n\n\n\n<p>Let\u2019s examine a software containing a digital signature. For this example, we will focus on <strong>Adlice PEViewer Portable x64<\/strong> (RogueKillerPE64.exe). At launch, the warning is different:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/what-is-code-signing\/openfile_known_publisher\/\" rel=\"attachment wp-att-1008\"><img decoding=\"async\" width=\"414\" height=\"310\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Known_Publisher.png\" alt=\"\" class=\"wp-image-1008\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Known_Publisher.png 414w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Known_Publisher-300x225.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Known_Publisher-320x240.png 320w\" sizes=\"(max-width: 414px) 100vw, 414px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>The Software Publisher is recognized as \u201cAdlice\u201d and, if you click on the link, the digital certificate with the confirmation of its validity is displayed.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/what-is-code-signing\/digital_certificate\/\" rel=\"attachment wp-att-1009\"><img decoding=\"async\" width=\"419\" height=\"489\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Digital_Certificate.png\" alt=\"\" class=\"wp-image-1009\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Digital_Certificate.png 419w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Digital_Certificate-257x300.png 257w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>Using Microsoft SignTool utility, we can obtain more information about the <strong>chain of trust<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted lang:default decode:false\">Signature Index: 0 (Primary Signature)\nHash of file (sha1): E63D964581A42E57C6BF711BF89B4D25B8F902AB\nSigning Certificate Chain:\n    Issued to: DigiCert Assured ID Root CA\n    Issued by: DigiCert Assured ID Root CA\n    Expires:   Mon Nov 10 02:00:00 2031\n    SHA1 hash: 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 \n        Issued to: DigiCert SHA2 Assured ID Code Signing CA\n        Issued by: DigiCert Assured ID Root CA\n        Expires:   Sun Oct 22 14:00:00 2028\n        SHA1 hash: 92C1588E85AF2201CE7915E8538B492F605B80C6 \n            Issued to: Adlice\n            Issued by: DigiCert SHA2 Assured ID Code Signing CA\n            Expires:   Thu Jun 28 14:00:00 2018\n            SHA1 hash: C8181FABBC35C7B433596F82CE687C6D453DB570\n<\/pre>\n\n\n\n<p>&nbsp;<br>Reading bottom to top, we can state that<strong> the Software Publisher (as shown above) is &#8220;Adlice&#8221; and that that the certificate was issued by DigiCert CA using the \u201cDigiCert SHA2 Assured ID Code Signing CA\u201d<\/strong> certificate which was itself generated using the \u201cDigiCert Assured ID Root CA\u201d certificate, making a three entities long chain of trust.<\/p>\n\n\n\n<p>The digital certificate also contains the <strong>checksum of the file (SHA1 hash)<\/strong>. The content of this field is used to check the file for unauthorized modifications (integrity check) by comparison with the live file checksum. <strong>If both hashes are not equal, the system detects that the file has been altered<\/strong>, invalidating the signature and issuing a warning.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/what-is-code-signing\/invalid_digital_certificate\/\" rel=\"attachment wp-att-1010\"><img decoding=\"async\" width=\"419\" height=\"489\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Invalid_Digital_Certificate.png\" alt=\"\" class=\"wp-image-1010\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Invalid_Digital_Certificate.png 419w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Invalid_Digital_Certificate-257x300.png 257w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Malware and Code Signing<\/h2>\n\n\n\n<p>Since several years, Microsoft has strongly encouraged developers to digitally sign theirs products. With release of Windows Vista and spreading of Windows rootkits, <strong>kernel-mode drivers cannot be loaded if not signed<\/strong>.<\/p>\n\n\n\n<p>So, can digitally signed files be blindly trusted? The answer is no. <strong>There are malware in the wild that are digitally signed<\/strong>. For example, <a href=\"https:\/\/virustotal.com\/en\/file\/81fdbf04f3d0d9a85e0fbb092e257a2dda14c5d783f1c8bf3bc41038e0a78688\/analysis\/\">this sample of Razy Ransomware<\/a>&nbsp;is signed by a certificate issued by Comodo Certification Authority.<\/p>\n\n\n\n<p>Certification Authorities can be abused with sophisticated crafted requests to pass background check but, most of the time, <strong>digitally-signed malware are using signing certificated that are stolen from developers and organisations<\/strong>.<\/p>\n\n\n\n<p>Stolen certificates are detrimental to users who may be infected trusting an executable that should not be, but also to the organisation that was stolen, because of <strong>administrative cost<\/strong> and <strong>bad reputation<\/strong>.<\/p>\n\n\n\n<p>Signing certificates must be <strong>password-protected<\/strong> and kept in a safe place.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Code Signing Policy changes<\/h2>\n\n\n\n<p>Code Signing Policy changes in Windows 10 Anniversary Edition (1607) and the implication on Adlice Tools. With the release of Windows 10 version 1607, <strong>Microsoft now requires kernel-mode drivers to be signed using EV certificates<\/strong>.<\/p>\n\n\n\n<p>As we saw above, EV certificates are more secure because they need higher levels of requirement to be obtained and because the probability to be stolen is virtually null since they are tied to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hardware_security_module\">hardware devices (HSM)<\/a>. However, their <strong>high cost<\/strong> is an impediment to independent developers and small companies. We, at Adlice Software, are in this case.<\/p>\n\n\n\n<p>Since 2014, RogueKiller makes use of <strong>kernel-mode code<\/strong> to effectively detect rootkits. Because we don\u2019t use an EV signing certificate, <strong>RogueKiller kernel-mode driver may fail to load on Windows 10 version 1607 and higher<\/strong>. The tool will still run, but its capabilities will be weakened.<\/p>\n\n\n\n<p>If you face this situation and want the driver to load, <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/manufacture\/desktop\/disabling-secure-boot\">disabling Secure Boot<\/a> is required.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Code signing is an <strong>invaluable approach<\/strong> to better protect users from malicious contents, to authenticate the publisher of an executable and to protect a file from unwanted modifications.<\/p>\n\n\n\n<p>For the time being, <strong>a digital signature in a file does not mean it\u2019s safe<\/strong>. In the future, if EV certificates become cheaper and more straightforward to obtain, we can make the assumption it could become true.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Code signing is required to load drivers in Windows. Also, they tell users if an application can be trusted and launched. Learn how it works.<\/p>\n","protected":false},"author":1,"featured_media":1013,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[557,556,86],"class_list":["post-1005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analysis","tag-code","tag-digital-signature","tag-windows","category-36","description-off"],"views":2877,"yoast_score":74,"yoast_readable":60,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/es\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Code Signing ? | Trust &amp; Validation on Windows \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"Code signing is required to load drivers in Windows. Also, they tell users if an application can be trusted and launched. Learn how it works.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/what-is-code-signing\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Code Signing ? | Trust &amp; Validation on Windows \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"Code signing is required to load drivers in Windows. Also, they tell users if an application can be trusted and launched. Learn how it works.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/what-is-code-signing\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-12T10:21:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:32:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/what-is-code-signing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-code-signing\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"What is Code Signing?\",\"datePublished\":\"2017-06-12T10:21:41+00:00\",\"dateModified\":\"2022-12-21T10:32:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-code-signing\/\"},\"wordCount\":842,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-code-signing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg\",\"keywords\":[\"code\",\"digital signature\",\"windows\"],\"articleSection\":[\"Analysis\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/what-is-code-signing\/\",\"url\":\"https:\/\/www.adlice.com\/what-is-code-signing\/\",\"name\":\"What is Code Signing ? | Trust & Validation on Windows \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-code-signing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-code-signing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg\",\"datePublished\":\"2017-06-12T10:21:41+00:00\",\"dateModified\":\"2022-12-21T10:32:34+00:00\",\"description\":\"Code signing is required to load drivers in Windows. Also, they tell users if an application can be trusted and launched. Learn how it works.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-code-signing\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/what-is-code-signing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adlice.com\/what-is-code-signing\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg\",\"width\":1000,\"height\":563},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/what-is-code-signing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Code Signing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/#website\",\"url\":\"https:\/\/www.adlice.com\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/es\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Code Signing ? | Trust & Validation on Windows \u2022 Adlice Software","description":"Code signing is required to load drivers in Windows. Also, they tell users if an application can be trusted and launched. Learn how it works.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/what-is-code-signing\/","og_locale":"es_ES","og_type":"article","og_title":"What is Code Signing ? | Trust & Validation on Windows \u2022 Adlice Software","og_description":"Code signing is required to load drivers in Windows. Also, they tell users if an application can be trusted and launched. Learn how it works.","og_url":"https:\/\/www.adlice.com\/what-is-code-signing\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2017-06-12T10:21:41+00:00","article_modified_time":"2022-12-21T10:32:34+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"Escrito por":"tigzy","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/what-is-code-signing\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/what-is-code-signing\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"What is Code Signing?","datePublished":"2017-06-12T10:21:41+00:00","dateModified":"2022-12-21T10:32:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/what-is-code-signing\/"},"wordCount":842,"commentCount":0,"publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/what-is-code-signing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","keywords":["code","digital signature","windows"],"articleSection":["Analysis"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/what-is-code-signing\/","url":"https:\/\/www.adlice.com\/what-is-code-signing\/","name":"What is Code Signing ? | Trust & Validation on Windows \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/what-is-code-signing\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/what-is-code-signing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","datePublished":"2017-06-12T10:21:41+00:00","dateModified":"2022-12-21T10:32:34+00:00","description":"Code signing is required to load drivers in Windows. Also, they tell users if an application can be trusted and launched. Learn how it works.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/what-is-code-signing\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/what-is-code-signing\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adlice.com\/what-is-code-signing\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","width":1000,"height":563},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/what-is-code-signing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/es\/"},{"@type":"ListItem","position":2,"name":"What is Code Signing?"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/#website","url":"https:\/\/www.adlice.com\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/es\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/posts\/1005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/comments?post=1005"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/posts\/1005\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/media\/1013"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/media?parent=1005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/categories?post=1005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/tags?post=1005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}