473,395 Members | 1,348 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

how to secure asp.net code?

I am writing a web site for my client using asp.net. But I don't want him to
able to read the code and reuse it in future. How can I protect the code
and still give him a copy? Any idea? just wild guess like compiling the
project into .exe, component or dll. I have no idea. Please advise!

Isabella
Nov 18 '05 #1
4 1020
RAW
Encapsulate your code in a dll you can just put all your function in the dll
and you can call it or send parameters to it when you need it
but the truth is there is nothing secure in a computer

"Isabella" <is**********@hotmail.com> wrote in message
news:ua**************@TK2MSFTNGP10.phx.gbl...
I am writing a web site for my client using asp.net. But I don't want him to able to read the code and reuse it in future. How can I protect the code
and still give him a copy? Any idea? just wild guess like compiling the
project into .exe, component or dll. I have no idea. Please advise!

Isabella

Nov 18 '05 #2
You need an obfuscator. There are lots of them:

http://www.google.ca/search?q=asp.ne...e+Google&meta=

"Isabella" <is**********@hotmail.com> wrote in message
news:ua**************@TK2MSFTNGP10.phx.gbl...
I am writing a web site for my client using asp.net. But I don't want him to able to read the code and reuse it in future. How can I protect the code
and still give him a copy? Any idea? just wild guess like compiling the
project into .exe, component or dll. I have no idea. Please advise!

Isabella

Nov 18 '05 #3
While using DLL's are the first step in protecting intellectual property...
any "binary" that runs under the CRL can be automatically 'decompiled',
becouse they are basicaly IL (intermediate language) that is interpreted by
the .net framework before (or during) running the code.

But there is a lot of third-party programs called 'obfuscators' to counter
that posibility.

Look the previous answer of Ken Cox for more references on this.

Bye

"RAW" <de****@terra.com> escribió en el mensaje
news:OM****************@TK2MSFTNGP09.phx.gbl...
Encapsulate your code in a dll you can just put all your function in the dll and you can call it or send parameters to it when you need it
but the truth is there is nothing secure in a computer

"Isabella" <is**********@hotmail.com> wrote in message
news:ua**************@TK2MSFTNGP10.phx.gbl...
I am writing a web site for my client using asp.net. But I don't want him
to
able to read the code and reuse it in future. How can I protect the

code and still give him a copy? Any idea? just wild guess like compiling the
project into .exe, component or dll. I have no idea. Please advise!

Isabella


Nov 18 '05 #4
_
On Sat, 22 Nov 2003 14:07:40 -0500, "Ken Cox [Microsoft MVP]"
<BA************@sympatico.ca> wrote:
You need an obfuscator. There are lots of them:

http://www.google.ca/search?q=asp.ne...e+Google&meta=


You forgot to mention that there's a free obfuscator available at
www.abderaware.com - hth!
--
Abderaware
Fine Components For .NET
Turn on, tune in, download.
zane a@t abderaware.com
Nov 18 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: debedb | last post by:
Hi all, I have a link, <A onClick="javascript:foo()">. The foo() function does w = window.open('', fieldid+'mywindow', prop); w.document.open(); d = w.document; And proceeds to write...
68
by: Roman Ziak | last post by:
Hello, I just downloaded MS Visual Studio 2005 Express Beta. When I tried to compile existing valid project, I get a lot of warnings like 'sprintf' has been deprecated, 'strcpy' has been...
3
by: Bill | last post by:
I'm running a C#.Net application that is using the HttpWebRequest to upload an xml file to a https site with FIPS complicancy turned on. On the "GetRequestStream()" method I get: "The underlying...
8
by: todd.freed | last post by:
Hey all, I have been racking my brain all morning to find a solution to this, and I am having no luck. Our webpage is created with Visual Studio C# and ASP.Net, hosted in-house using HTTPS with...
14
by: Usman | last post by:
Hi I'm working on an application that contains classes for licensing, authentication etc, including all the algorithms of encryption/decryption etc. I wanted to secure this code, but after...
40
by: Robert Seacord | last post by:
The CERT/CC has released a beta version of a secure integer library for the C Programming Language. The library is available for download from the CERT/CC Secure Coding Initiative web page at:...
7
by: Robert Seacord | last post by:
The CERT/CC has just deployed a new web site dedicated to developing secure coding standards for the C programming language, C++, and eventually other programming language. We have already...
5
by: walterbyrd | last post by:
I honestly don't know. But, I have seen articles and posts about how PHP is terribly insecure. I don't usually see comparisons to other common web languages. I think the big vulnerablity is...
0
by: amitvps | last post by:
Secure Socket Layer is very important and useful for any web application but it brings some problems too with itself. Handling navigation between secure and non-secure pages is one of the cumbersome...
3
by: zr | last post by:
Hi, Does usage of checked iterators and checked containers make code more secure? If so, can that code considered to be reasonably secure?
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.