Current location - Quotes Website - Signature design - Identification virus of digital signature
Identification virus of digital signature
How to distinguish digital signature attacks? There are two ways:

1. To view the details of digital signature, we should view the details of digital signature, just click the "Details" button.

We will find the difference between the normal EXE and the infected EXE digital signature.

Details of digital signature of common EXE.

The tampered EXE digital signature information is invalid.

Method 2, use the digital signature verification program sigcheck.exe (you can find this tool, one of the components of the famous system toolkit Sysinternals Suite. )

The result of abnormal digital signature is:

C:\ Documents and Settings \ Li Tiejun \? \modify.exe:

Verified: unsigned

Date of filing:15: 46 May 23, 2008

Publisher: Not applicable

Description: Not applicable

Product: Not applicable

Version: Not applicable

File version: not applicable

The result of ordinary digital signature is:

C:\ Documents and Settings \ Li Tiejun \? \che.exe:

Verified: signed

Date of signature:16: 28, April 29, 2008

Publisher: Not applicable

Description: Not applicable

Product: Not applicable

Version: Not applicable

File version: not applicable