Feb 21, 2024
In some situations you may need to sign an application with two different signatures (hashing algorithms). This is usually when you want to sign an application that will be used on Windows 7 and Windows 10.
Read MoreMar 21, 2020
Jurisdiction of Incorporation Requirements for the Application
Read MoreApr 28, 2025
Hash algorithms are utilized for integrity checks. They can verify that nothing has changed on a certificate, that a file downloaded correctly, that a signed document hasn't been tampered with, and more. Although your Code Signing Certificate may be signed by GlobalSign to verify its integrity, when you sign code, you may also specify the hash algorithm used when validating the digital signature on your program or driver. This is called the file digest (/fd).
Read MoreJan 31, 2025
Article Purpose: This article provides step-by-step instructions for installing your certificate in WebLogic BEA.
Read MoreFeb 19, 2024
Java Keytool can be used to generate Java keystores, certificate signing requests (CSRs), convert certificate formats, and other certificate related functions. Keytool is bundled with Oracle's JDK. This article will walk through generating a CSR as well as generating a private key if one is not already available.
Read MoreMar 18, 2025
This article provides step-by-step instructions for installing your intermediate certificate in Microsoft Management Console (MMC). If this is not the solution you are looking for, please search for you solution in the search bar above.
Read MoreMar 21, 2020
Using a Doing Business As (Trade Name) Organization Name in the Application
Read MoreCheck your certificate installation for SSL issues and vulnerabilities.