contents

business
 
Rusonyx Partners with Comodo

Comodo has announced a partnership with Rusonyx, one of Russian Web Hosting Service providers, to provide Code Signing Certificates that verify the identity of the publisher and assure the content integrity of downloadable code. With Code Signing Certificates, users are protected from maliciously modified code and from hackers that corrupt the code during the download process, as these tactics are often used to steal sensitive user information.

The Internet has become the main distribution channel for software vendors around the world. At the same time, the dangers involved in downloading a product from the Internet have increased. When a user downloads a product via the Internet, they often risk acquiring malicious code that includes spyware, viruses, and Trojans. These programs can damage valid programs, destroy data and allow hackers access to a user's personal information.

Software developers can obtain from Rusonyx a Code Signing Certificate for their executable code after going through a stringent application and verification process designed by Comodo. Code Signing Certificates provide key features and include:
- Digitally signed - 32-bit or 64-bit Portable Executable (.exe, .ocx, .dll or other) or .cab files;
- Ensures authenticity - assures users that they know where the code came from;
- Ensures integrity - verifies that code has not been tampered with since publication;
- Microsoft Authenticode - industry standard coupled with trusted Comodo infrastructure;
- Vista compatible - Code Signing Certificates are supported by all versions of Vista.

Customers who download digitally signed Active X controls, dynamic link libraries, .cab files, HTML content or other code from a verified publisher's site can be confident that code comes from its author and hasn't been altered or corrupted since it was created and signed.

Code Signing Certificates, through the use of digital signatures, enables software developers to include information about themselves and their code so end users can be confident that code really comes from the programmer and has not been altered or corrupted since it was created and signed. If the code has been tampered with, the digital signature will not be valid and will alert customers that the code has been altered and is not trustworthy.



write your comments about the article :: 2008 Computing News :: home page