Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Since it was first posed back in 2008, this question has now become the second most popular question of all time on StackOverflow.
Top 5 results: "Code Complete (2nd Edition)", "The Pragmatic Programmer: From Journeyman to Master", "Structure and Interpretation of Computer Programs", "The C Programming Language", "Introduction to Algorithms".
Full Details Here"
Link to Original Source
The scheme Apple outlined in the patent application would rely on a cryptographic key generated prior to the hardware reaching the user. As an application launches, the technology would inject code into the app's executing code stream, generate data that's sent to a digital rights management module, then compare that signed data with the key. If they match, the application continues to open. If not, it's stopped in its tracks.
Such checks could be done on a very frequent basis, said Apple's patent application.