Solved

.snk files for COM interop: best practices

Posted on 2006-11-29
5
304 Views
Last Modified: 2006-11-30
Our company makes several assemblies that must be used from COM applications. Should we generate .snk files for each assembly, or is it advisable to sign all of our COM-aware assemblies with a single .snk file?
0
Comment
Question by:k3n51mm
  • 2
  • 2
5 Comments
 
LVL 5

Assisted Solution

by:DEEPESH
DEEPESH earned 125 total points
ID: 18043200
It is advisable to generate snk for each assembly as they will be unique identifier for these objects, and when you register your >net component in registry through regasm, it plays major role in registry.
0
 
LVL 1

Author Comment

by:k3n51mm
ID: 18044818
one of our developers has come up with the idea that we should sign all of our software with the same key. I thought the .snk file was just key that was used to sign a component, and not the componenet's GUID. Can I get more of an explanation?
0
 
LVL 7

Accepted Solution

by:
Joe_Griffith earned 125 total points
ID: 18046122
One snk is all you should ever use. It has nothing to do with registering anything. I read somewhere that Microsoft only has 3 snk's for there entire line of products.
0
 
LVL 1

Author Comment

by:k3n51mm
ID: 18046678
Thanks Joe, can you point me to some documentation for this?
0
 
LVL 7

Expert Comment

by:Joe_Griffith
ID: 18047187
Sorry, no. Have no idea where I read that about MS. I've always used a single SNK. There is another school of thought, however...

The point of the SNK is to insure that your code has not been changed. Some people feel that you should use a separate snk for each assembly so that if one is compromised they won't all be. Seems dumb to me but you should control whatever snk's you create carefully.

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Replacing HTML tags in Textarea/Textbox 5 46
Recommendation vb6 to vb.net or others 14 105
DataGridView Events ? 3 37
Receiving a string from a WebService Push 21 31
Article by: Kraeven
Introduction Remote Share is a simple remote sharing tool, enabling you to see, add and remove remote or local shares. The application is written in VB.NET targeting the .NET framework 2.0. The source code and the compiled programs have been in…
Introduction When many people think of the WebBrowser (http://msdn.microsoft.com/en-us/library/2te2y1x6%28v=VS.85%29.aspx) control, they immediately think of a control which allows the viewing and navigation of web pages. While this is true, it's a…
This is a video that shows how the OnPage alerts system integrates into ConnectWise, how a trigger is set, how a page is sent via the trigger, and how the SENT, DELIVERED, READ & REPLIED receipts get entered into the internal tab of the ConnectWise …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now