From http://blog.didierstevens.com/my-software/: The author explains how he uses these tools to fight malware in the PDF mentioned at http://blog.didierstevens.com/programs/authenticode-tools/.