473,408 Members | 1,784 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,408 software developers and data experts.

can a code-behind self-destruct?

Is there a way for a code-behind to delete the dll after an expiration, or
if a user doesn't enter the right password. ie, lets say i license
something to someone for 3 months. After that time, I want the dll
(representing the c.behind) to become corrupt, or delete itself so it
cannot be hacked by anyone.... Any ideas
Nov 19 '05 #1
6 1188
2 DLL's, one to check and call the other. Then sure, you could in theory.
But why not just have it not work instead of deletion?

--
Curt Christianson
Owner/Lead Developer, DF-Software
Site: http://www.Darkfalz.com
Blog: http://blog.Darkfalz.com
"Jason Shohet" <__******@yahoo.com> wrote in message
news:Ol**************@TK2MSFTNGP09.phx.gbl...
Is there a way for a code-behind to delete the dll after an expiration, or
if a user doesn't enter the right password. ie, lets say i license
something to someone for 3 months. After that time, I want the dll
(representing the c.behind) to become corrupt, or delete itself so it
cannot be hacked by anyone.... Any ideas

Nov 19 '05 #2
it would prevent hacking the dll... which I assume some people must be able
to do.

"Curt_C [MVP]" <software_AT_darkfalz.com> wrote in message
news:e%******************@TK2MSFTNGP15.phx.gbl...
2 DLL's, one to check and call the other. Then sure, you could in theory.
But why not just have it not work instead of deletion?

--
Curt Christianson
Owner/Lead Developer, DF-Software
Site: http://www.Darkfalz.com
Blog: http://blog.Darkfalz.com
"Jason Shohet" <__******@yahoo.com> wrote in message
news:Ol**************@TK2MSFTNGP09.phx.gbl...
Is there a way for a code-behind to delete the dll after an expiration,
or if a user doesn't enter the right password. ie, lets say i license
something to someone for 3 months. After that time, I want the dll
(representing the c.behind) to become corrupt, or delete itself so it
cannot be hacked by anyone.... Any ideas


Nov 19 '05 #3
If they are smart enough to hack it, they are smart enough to make a copy of
it before it "self destructs".

--
Curt Christianson
Owner/Lead Developer, DF-Software
Site: http://www.Darkfalz.com
Blog: http://blog.Darkfalz.com
"Jason Shohet" <__******@yahoo.com> wrote in message
news:OW**************@TK2MSFTNGP15.phx.gbl...
it would prevent hacking the dll... which I assume some people must be
able to do.

"Curt_C [MVP]" <software_AT_darkfalz.com> wrote in message
news:e%******************@TK2MSFTNGP15.phx.gbl...
2 DLL's, one to check and call the other. Then sure, you could in theory.
But why not just have it not work instead of deletion?

--
Curt Christianson
Owner/Lead Developer, DF-Software
Site: http://www.Darkfalz.com
Blog: http://blog.Darkfalz.com
"Jason Shohet" <__******@yahoo.com> wrote in message
news:Ol**************@TK2MSFTNGP09.phx.gbl...
Is there a way for a code-behind to delete the dll after an expiration,
or if a user doesn't enter the right password. ie, lets say i license
something to someone for 3 months. After that time, I want the dll
(representing the c.behind) to become corrupt, or delete itself so it
cannot be hacked by anyone.... Any ideas



Nov 19 '05 #4
Plus, simply deleting it does not make it gone. You can also use one of the
manual file retrieval programs to get it back.

If you don't store any secrets in your application, then there would be
little need to remove it. You can always obfuscate your code before
shipping and strongly name your assemblies.

"Curt_C [MVP]" <software_AT_darkfalz.com> wrote in message
news:#K**************@tk2msftngp13.phx.gbl...
If they are smart enough to hack it, they are smart enough to make a copy of it before it "self destructs".

--
Curt Christianson
Owner/Lead Developer, DF-Software
Site: http://www.Darkfalz.com
Blog: http://blog.Darkfalz.com
"Jason Shohet" <__******@yahoo.com> wrote in message
news:OW**************@TK2MSFTNGP15.phx.gbl...
it would prevent hacking the dll... which I assume some people must be
able to do.

"Curt_C [MVP]" <software_AT_darkfalz.com> wrote in message
news:e%******************@TK2MSFTNGP15.phx.gbl...
2 DLL's, one to check and call the other. Then sure, you could in theory. But why not just have it not work instead of deletion?

--
Curt Christianson
Owner/Lead Developer, DF-Software
Site: http://www.Darkfalz.com
Blog: http://blog.Darkfalz.com
"Jason Shohet" <__******@yahoo.com> wrote in message
news:Ol**************@TK2MSFTNGP09.phx.gbl...
Is there a way for a code-behind to delete the dll after an expiration, or if a user doesn't enter the right password. ie, lets say i license something to someone for 3 months. After that time, I want the dll
(representing the c.behind) to become corrupt, or delete itself so it
cannot be hacked by anyone.... Any ideas



Nov 19 '05 #5
Thanks to both of you.
can you elaborate on the obfuscation capabilities, or where I can look to
see how to do it. Thats something I haven't looked in to. I'll try to
look up some info on how this is done as well;
When you mention strongly naming assemblies (dll's), are you referring to
the Inherits="...." line in the aspx?
Nov 19 '05 #6
Here is an article on Obfuscation,
http://msdn.microsoft.com/msdnmag/is...n/default.aspx.
"Jason Shohet" <__******@yahoo.com> wrote in message
news:uY**************@TK2MSFTNGP14.phx.gbl...
Thanks to both of you.
can you elaborate on the obfuscation capabilities, or where I can look to
see how to do it. Thats something I haven't looked in to. I'll try to
look up some info on how this is done as well;
When you mention strongly naming assemblies (dll's), are you referring to
the Inherits="...." line in the aspx?

Nov 19 '05 #7

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

51
by: Mudge | last post by:
Please, someone, tell me why OO in PHP is better than procedural.
9
by: bigoxygen | last post by:
Hi. I'm using a 3 tier FrontController Design for my web application right now. The problem is that I'm finding to have to duplicate a lot of code for similar functions; for example, listing...
242
by: James Cameron | last post by:
Hi I'm developing a program and the client is worried about future reuse of the code. Say 5, 10, 15 years down the road. This will be a major factor in selecting the development language. Any...
4
by: jason | last post by:
Hello. Newbie on SQL and suffering through this. I have two tables created as such: drop table table1; go drop table table2; go
16
by: Dario de Judicibus | last post by:
I'm getting crazy. Look at this code: #include <string.h> #include <stdio.h> #include <iostream.h> using namespace std ; char ini_code = {0xFF, 0xFE} ; char line_sep = {0x20, 0x28} ;
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.