Creating certificate for briefcase link

after typing the command ~jarSinger$ keytool -import -alias company -
file ComapnyCer.cer -keystore raystore -storepass abcdefg below
certificate was generated and not able to proceed further need some
Owner: CN=jones
Issuer: CN=jones
Serial number: 4df73f68
Valid from: Tue Jun 14 16:30:56 IST 2011 until: Mon Sep 12 16:30:56
IST 2011
Certificate fingerprints:
MD5: E0:CA:09:16:42:CB:D4:DB:B6:26:DC:D3:84:6F:B5:72
SHA1: DF:1D:85:EF:1A:8A:80:FF:E0:F2:5A:69:18:77:95:60:4B:5E:77:FD
Signature algorithm name: SHA1withDSA
Version: 3

Not able to follow the below steps
7: Create the Policy File

The policy file grants the SSignedApplet.jar file signed by the alias
company permission to create demo.ini (and no other file) in the
user's home directory.

Ray creates the policy file in his home directory using either
policytool or an ASCII editor.

keystore "/home/ray/raystore";

// A sample policy file that lets a program
// create demo.ini in user's home directory
// Satya N Dodda

grant SignedBy "company" {
permission java.util.PropertyPermission
"user.home", "read";
"${user.home}/demo.ini", "write";

8: Run the Applet in Applet Viewer

Applet Viewer connects to the HTML documents and resources specified
in the call to appletviewer, and displays the applet in its own
window. To run the example, Ray copies the signed JAR file and HTML
file to /home/aURL/public_html and invokes Applet viewer from his home
directory as follows:

Note: Type everything on one line and put a space after
The option tells Applet Viewer to
run the applet referenced in the SignedApplet.html file with the policy file.
Note: The Policy file can be stored on a server and specified in the
appletviewer invocation as a URL.
Running an Application with a Policy File

This application invocation restricts MyProgram to a sandbox-like
environment the same way applets are restricted, but allows access as
specified in the polfile policy file.

java MyProgram