473,386 Members | 1,610 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

Is it possible to hack *.DLL created from *.VB files ?

Hi everybody
I have about 50 code behind *.vb files from which i have created a single
*.dll file. This single *.dll file and all the *.aspx files i will put on a
clients computer. So i just wanted to know if they can hack it ? I know that
there should be a way to hack it but only i want to know if it is simple
enough. I mean if my client's programmer can just go to the web, download
some utility and hack it ?

Thanks in advance
Raja

Nov 18 '05 #1
2 3472
Not sure that they can change it with a sector editor and still have it run,
if that's what you mean. You could try changing a single byte of a string
within your DLL and see what happens.

At any rate, they can probably decompile and read your unobfuscated code
with Reflector:

http://www.aisto.com/roeder/DotNet/

"Ing. Rajesh Kumar" <iambad(Without This)@post.cz> wrote in message
news:uh**************@TK2MSFTNGP10.phx.gbl...
Hi everybody
I have about 50 code behind *.vb files from which i have created a single
*.dll file. This single *.dll file and all the *.aspx files i will put on
a
clients computer. So i just wanted to know if they can hack it ? I know
that
there should be a way to hack it but only i want to know if it is simple
enough. I mean if my client's programmer can just go to the web, download
some utility and hack it ?

Thanks in advance
Raja


Nov 18 '05 #2
It is possible to hack (reverse-engineer) any executable code, whether it's
..Net or machine language.

--
HTH,
Kevin Spencer
..Net Developer
Microsoft MVP
Big things are made up
of lots of little things.

"Ing. Rajesh Kumar" <iambad(Without This)@post.cz> wrote in message
news:uh**************@TK2MSFTNGP10.phx.gbl...
Hi everybody
I have about 50 code behind *.vb files from which i have created a single
*.dll file. This single *.dll file and all the *.aspx files i will put on a clients computer. So i just wanted to know if they can hack it ? I know that there should be a way to hack it but only i want to know if it is simple
enough. I mean if my client's programmer can just go to the web, download
some utility and hack it ?

Thanks in advance
Raja

Nov 18 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

11
by: Jim | last post by:
Hi, I keep getting form results emailed to me that would indicate a form from my web site is getting submitted with all fields blank or empty, but my code should preventing users from proceeding...
36
by: rbt | last post by:
Say I have a list that has 3 letters in it: I want to print all the possible 4 digit combinations of those 3 letters: 4^3 = 64 aaaa
0
by: Lachlan Hunt | last post by:
Hi everyone, I've just discovered a registry hack to get around the Windows XP SP2 security bug that prevents files being uploaded as text/html, and thus unable to validate local html files using...
4
by: Bruno van Dooren | last post by:
Hi, i have worked with visual studio for a long time, and would like to have a project template that represents a custom project that is used a lot. (Visual studio .NET 2003) the goal is that...
3
by: Kueishiong Tu | last post by:
I have a bunch of C programs from sun. I would like to port them over to PC. I am wondering if I can simply recompile and run them in Visual C++ .NET without having to making a lot of changes?...
9
by: Wayne Smith | last post by:
I've come up against a major headache that I can't seem to find a solution for but I'm sure there must be a workaround and I would really be grateful of any help. I'm currently building a web...
53
by: brave1979 | last post by:
Please check out my javascript library that allows you to create any layout for your web page, nested as deep as you like, adjusting to width and height of a browser window. You just describe it in...
2
by: Sin Jeong-hun | last post by:
Since Windows 2000, all user setting files should be stored separately in the user's application settings directory. But some users still want all the files to be created in the application folder,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.