B
Bill
I know how to sign my assemblies with a private key, so that the .exe of my
application tries to use only strong-named assemblies... Thus a hacker
cannot alter a dll, because the .exe will not recognize it after that.
BUT, what if the hacker alters the .exe and makes it to not ask for
strong-named assemblies, but ask for any assembly. Then the hacker can alter
whatever dll in the app he wants (and among them, my activation dll!).
Is there any solution to that? Is there a way for the dlls to work to ask
for a strong-named .exe as well? (thus completing the circle of trust....)
Thanks in advance for your help,
Bill
application tries to use only strong-named assemblies... Thus a hacker
cannot alter a dll, because the .exe will not recognize it after that.
BUT, what if the hacker alters the .exe and makes it to not ask for
strong-named assemblies, but ask for any assembly. Then the hacker can alter
whatever dll in the app he wants (and among them, my activation dll!).
Is there any solution to that? Is there a way for the dlls to work to ask
for a strong-named .exe as well? (thus completing the circle of trust....)
Thanks in advance for your help,
Bill