Sorry, guy.
I am not sure it would help in cases like that. Sure enough, the
digitally signing is an extra measure of protection. But the app that
was hacked is already encrypted, app central has password protection for
logging in, and there could be said a few things more techie about the
matter. A hacker who knows to get through these steps, might know how to
bypass signature stuff in an app.


David

On 1/17/2015 12:16 PM, Felix G. wrote:
Hi,
yes, Version 8.5.9 is good.
To make sure only digitally signed apps will ever run, we can do the following:
1. In the Window-Eyes control Panel, go to Apps / App Management / App Manager.
2. Make sure the Checkbox "Show more Options" is checked.
3. Activate the "security" button.
4. Set the security Level to "allow only trusted apps."
5. In the list of apps, go to one from GW Micro.
6. Check the "Publisher trusted" Checkbox.
(Repeat steps 5 and 6 for any other Publisher that you trust. Any
other apps will not run.)
7. Activate the "OK" button.
8. Activate the "Close" button to Close App Manager.
Now anything that hasn't been digitally signed by a trusted Publisher
will not run. For example, this would have protected against the
recent Problem.
Kind regards,
Felix Grützmacher
If you reply to this message it will be delivered to the original sender only. 
If your reply would benefit others on the list and your message is related to 
GW Micro, then please consider sending your message to [email protected] so 
the entire list will receive it.

GW-Info messages are archived at http://www.gwmicro.com/gwinfo. You can manage 
your list subscription at http://www.gwmicro.com/listserv.



If you reply to this message it will be delivered to the original sender only. 
If your reply would benefit others on the list and your message is related to 
GW Micro, then please consider sending your message to [email protected] so 
the entire list will receive it.

GW-Info messages are archived at http://www.gwmicro.com/gwinfo. You can manage 
your list subscription at http://www.gwmicro.com/listserv.

Reply via email to