.TP
.I -af | -addfulltrust assemblyname
Add the specified assembly to the fully trusted assembly list in the
.TP
.I -af | -addfulltrust assemblyname
Add the specified assembly to the fully trusted assembly list in the
assembly containing the custom permissions must be in the fully trusted
list. Note that this requirement is recursive (all assemblies required
by the specified assembly must also be in the list). The assembly must be
assembly containing the custom permissions must be in the fully trusted
list. Note that this requirement is recursive (all assemblies required
by the specified assembly must also be in the list). The assembly must be
will deserialize the XML policy must be in a fully trusted assembly.
.TP
.I -hash algo [-hex hash | -file assemblyname]
will deserialize the XML policy must be in a fully trusted assembly.
.TP
.I -hash algo [-hex hash | -file assemblyname]
(from itself) to be satisfied. Any change to the assembly will require the
policy to be updated (as the hash value will have changed).
.TP
.I -pub [-cert certificate | -file signedfile | -hex rawdata]
(from itself) to be satisfied. Any change to the assembly will require the
policy to be updated (as the hash value will have changed).
.TP
.I -pub [-cert certificate | -file signedfile | -hex rawdata]
signed an assembly in order to be satisfied. The certificate can be referenced
as a file (binary DER), a signed file (containing the certificate) or with
the hexadecimal value of the certificate. Note that files outside the
policy must also be protected against tempering.
.TP
.I -strong -file filename [name | -noname] [version | -noversion]
signed an assembly in order to be satisfied. The certificate can be referenced
as a file (binary DER), a signed file (containing the certificate) or with
the hexadecimal value of the certificate. Note that files outside the
policy must also be protected against tempering.
.TP
.I -strong -file filename [name | -noname] [version | -noversion]
assembly to be satisfied. Use -noname if the assembly name isn't known
(or important) and -version if the version isn't known (or important) in
the resolution.
.TP
.I -site hostname
assembly to be satisfied. Use -noname if the assembly name isn't known
(or important) and -version if the version isn't known (or important) in
the resolution.
.TP
.I -site hostname
be satisfied. Existing zones are MyComputer, Internet, Intranet, Trusted
and Untrusted.
be satisfied. Existing zones are MyComputer, Internet, Intranet, Trusted
and Untrusted.
.TP
This will list all machine level code groups, then remove the code group
labeled 1.6, list again all code groups (missing 1.6), reset the policy
.TP
This will list all machine level code groups, then remove the code group
labeled 1.6, list again all code groups (missing 1.6), reset the policy