Skip to content

Commit 724bb49

Browse files
committed
Renamed the Signpath blog post for clarity
1 parent b8fc940 commit 724bb49

File tree

13 files changed

+26
-26
lines changed

13 files changed

+26
-26
lines changed

content/blog/2024-11-08-our-journey-with-signpath.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
2-
title: Our journey with SignPath
2+
title: Signing Windows executables - Our journey with SignPath
33
author: SeongTae Jeong
44
date: '2024-11-08'
5-
slug: our-journey-with-signpath
5+
slug: signing-windows-executables-our-journey-with-signpath
66
categories:
77
- db4s
88
tags:

docs/blog/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@
6868
<h2 class="archive-title">2024</h2>
6969

7070
<article class="archive-item">
71-
<a href="/blog/our-journey-with-signpath/" class="archive-item-link">Our journey with SignPath</a>
71+
<a href="/blog/signing-windows-executables-our-journey-with-signpath/" class="archive-item-link">Signing Windows executables - Our journey with SignPath</a>
7272
<span class="archive-item-date">
7373
2024-11-08
7474
</span>

docs/blog/index.xml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@
88
<language>en-us</language>
99
<lastBuildDate>Fri, 08 Nov 2024 00:00:00 +0000</lastBuildDate><atom:link href="/blog/index.xml" rel="self" type="application/rss+xml" />
1010
<item>
11-
<title>Our journey with SignPath</title>
12-
<link>/blog/our-journey-with-signpath/</link>
11+
<title>Signing Windows executables - Our journey with SignPath</title>
12+
<link>/blog/signing-windows-executables-our-journey-with-signpath/</link>
1313
<pubDate>Fri, 08 Nov 2024 00:00:00 +0000</pubDate>
1414

15-
<guid>/blog/our-journey-with-signpath/</guid>
15+
<guid>/blog/signing-windows-executables-our-journey-with-signpath/</guid>
1616
<description>Our Journey with SignPath: Code Signing for Windows Binaries When distributing software, code signing is essential to ensure our users can trust the software they download, especially on an operating system like Windows that displays security warnings for unsigned software.
1717
So for us, code signing is not just an option, but a necessity to validate software binaries, prevent tampering, and for the convenience of our users.
1818
A Little Background on This Journey It&amp;rsquo;s not difficult to code sign and notarize software binaries for Apple macOS.</description>

docs/blog/our-journey-with-signpath/index.html renamed to docs/blog/signing-windows-executables-our-journey-with-signpath/index.html

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@
66
<meta name="generator" content="Hugo 0.111.3">
77

88

9-
<title>Our journey with SignPath - DB Browser for SQLite</title>
10-
<meta property="og:title" content="Our journey with SignPath - DB Browser for SQLite">
9+
<title>Signing Windows executables - Our journey with SignPath - DB Browser for SQLite</title>
10+
<meta property="og:title" content="Signing Windows executables - Our journey with SignPath - DB Browser for SQLite">
1111

1212

1313
<link href='/favicon.ico' rel='icon' type='image/x-icon'/>
@@ -65,7 +65,7 @@
6565
<span class="article-duration">2 min read</span>
6666

6767

68-
<h1 class="article-title">Our journey with SignPath</h1>
68+
<h1 class="article-title">Signing Windows executables - Our journey with SignPath</h1>
6969

7070

7171
<span class="article-date">2024-11-08</span>

docs/categories/db4s/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@
6868
<h2 class="archive-title">2024</h2>
6969

7070
<article class="archive-item">
71-
<a href="/blog/our-journey-with-signpath/" class="archive-item-link">Our journey with SignPath</a>
71+
<a href="/blog/signing-windows-executables-our-journey-with-signpath/" class="archive-item-link">Signing Windows executables - Our journey with SignPath</a>
7272
<span class="archive-item-date">
7373
2024-11-08
7474
</span>

docs/categories/db4s/index.xml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@
88
<language>en-us</language>
99
<lastBuildDate>Fri, 08 Nov 2024 00:00:00 +0000</lastBuildDate><atom:link href="/categories/db4s/index.xml" rel="self" type="application/rss+xml" />
1010
<item>
11-
<title>Our journey with SignPath</title>
12-
<link>/blog/our-journey-with-signpath/</link>
11+
<title>Signing Windows executables - Our journey with SignPath</title>
12+
<link>/blog/signing-windows-executables-our-journey-with-signpath/</link>
1313
<pubDate>Fri, 08 Nov 2024 00:00:00 +0000</pubDate>
1414

15-
<guid>/blog/our-journey-with-signpath/</guid>
15+
<guid>/blog/signing-windows-executables-our-journey-with-signpath/</guid>
1616
<description>Our Journey with SignPath: Code Signing for Windows Binaries When distributing software, code signing is essential to ensure our users can trust the software they download, especially on an operating system like Windows that displays security warnings for unsigned software.
1717
So for us, code signing is not just an option, but a necessity to validate software binaries, prevent tampering, and for the convenience of our users.
1818
A Little Background on This Journey It&amp;rsquo;s not difficult to code sign and notarize software binaries for Apple macOS.</description>

docs/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ <h2 id="windows-code-signing-policy">Windows Code-Signing Policy</h2>
121121
<h2 class="archive-title">2024</h2>
122122

123123
<article class="archive-item">
124-
<a href="/blog/our-journey-with-signpath/" class="archive-item-link">Our journey with SignPath</a>
124+
<a href="/blog/signing-windows-executables-our-journey-with-signpath/" class="archive-item-link">Signing Windows executables - Our journey with SignPath</a>
125125
<span class="archive-item-date">
126126
2024-11-08
127127
</span>

docs/index.xml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@
88
<language>en-us</language>
99
<lastBuildDate>Fri, 08 Nov 2024 00:00:00 +0000</lastBuildDate><atom:link href="/index.xml" rel="self" type="application/rss+xml" />
1010
<item>
11-
<title>Our journey with SignPath</title>
12-
<link>/blog/our-journey-with-signpath/</link>
11+
<title>Signing Windows executables - Our journey with SignPath</title>
12+
<link>/blog/signing-windows-executables-our-journey-with-signpath/</link>
1313
<pubDate>Fri, 08 Nov 2024 00:00:00 +0000</pubDate>
1414

15-
<guid>/blog/our-journey-with-signpath/</guid>
15+
<guid>/blog/signing-windows-executables-our-journey-with-signpath/</guid>
1616
<description>Our Journey with SignPath: Code Signing for Windows Binaries When distributing software, code signing is essential to ensure our users can trust the software they download, especially on an operating system like Windows that displays security warnings for unsigned software.
1717
So for us, code signing is not just an option, but a necessity to validate software binaries, prevent tampering, and for the convenience of our users.
1818
A Little Background on This Journey It&amp;rsquo;s not difficult to code sign and notarize software binaries for Apple macOS.</description>

docs/sitemap.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
<loc>/categories/db4s/</loc>
1515
<lastmod>2024-11-08T00:00:00+00:00</lastmod>
1616
</url><url>
17-
<loc>/blog/our-journey-with-signpath/</loc>
17+
<loc>/blog/signing-windows-executables-our-journey-with-signpath/</loc>
1818
<lastmod>2024-11-08T00:00:00+00:00</lastmod>
1919
</url><url>
2020
<loc>/tags/signpath/</loc>

docs/tags/signpath/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@
6868
<h2 class="archive-title">2024</h2>
6969

7070
<article class="archive-item">
71-
<a href="/blog/our-journey-with-signpath/" class="archive-item-link">Our journey with SignPath</a>
71+
<a href="/blog/signing-windows-executables-our-journey-with-signpath/" class="archive-item-link">Signing Windows executables - Our journey with SignPath</a>
7272
<span class="archive-item-date">
7373
2024-11-08
7474
</span>

docs/tags/signpath/index.xml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@
88
<language>en-us</language>
99
<lastBuildDate>Fri, 08 Nov 2024 00:00:00 +0000</lastBuildDate><atom:link href="/tags/signpath/index.xml" rel="self" type="application/rss+xml" />
1010
<item>
11-
<title>Our journey with SignPath</title>
12-
<link>/blog/our-journey-with-signpath/</link>
11+
<title>Signing Windows executables - Our journey with SignPath</title>
12+
<link>/blog/signing-windows-executables-our-journey-with-signpath/</link>
1313
<pubDate>Fri, 08 Nov 2024 00:00:00 +0000</pubDate>
1414

15-
<guid>/blog/our-journey-with-signpath/</guid>
15+
<guid>/blog/signing-windows-executables-our-journey-with-signpath/</guid>
1616
<description>Our Journey with SignPath: Code Signing for Windows Binaries When distributing software, code signing is essential to ensure our users can trust the software they download, especially on an operating system like Windows that displays security warnings for unsigned software.
1717
So for us, code signing is not just an option, but a necessity to validate software binaries, prevent tampering, and for the convenience of our users.
1818
A Little Background on This Journey It&amp;rsquo;s not difficult to code sign and notarize software binaries for Apple macOS.</description>

docs/tags/windows/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@
6868
<h2 class="archive-title">2024</h2>
6969

7070
<article class="archive-item">
71-
<a href="/blog/our-journey-with-signpath/" class="archive-item-link">Our journey with SignPath</a>
71+
<a href="/blog/signing-windows-executables-our-journey-with-signpath/" class="archive-item-link">Signing Windows executables - Our journey with SignPath</a>
7272
<span class="archive-item-date">
7373
2024-11-08
7474
</span>

docs/tags/windows/index.xml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@
88
<language>en-us</language>
99
<lastBuildDate>Fri, 08 Nov 2024 00:00:00 +0000</lastBuildDate><atom:link href="/tags/windows/index.xml" rel="self" type="application/rss+xml" />
1010
<item>
11-
<title>Our journey with SignPath</title>
12-
<link>/blog/our-journey-with-signpath/</link>
11+
<title>Signing Windows executables - Our journey with SignPath</title>
12+
<link>/blog/signing-windows-executables-our-journey-with-signpath/</link>
1313
<pubDate>Fri, 08 Nov 2024 00:00:00 +0000</pubDate>
1414

15-
<guid>/blog/our-journey-with-signpath/</guid>
15+
<guid>/blog/signing-windows-executables-our-journey-with-signpath/</guid>
1616
<description>Our Journey with SignPath: Code Signing for Windows Binaries When distributing software, code signing is essential to ensure our users can trust the software they download, especially on an operating system like Windows that displays security warnings for unsigned software.
1717
So for us, code signing is not just an option, but a necessity to validate software binaries, prevent tampering, and for the convenience of our users.
1818
A Little Background on This Journey It&amp;rsquo;s not difficult to code sign and notarize software binaries for Apple macOS.</description>

0 commit comments

Comments
 (0)