I often write some .dll component for other people. Because of CLR, I often
find easily access to all source code of my .DLL file by using some kind of
reflector.
Is there an easy to protect my .NET .DLL class source code?
regards,
Guoqi Zheng http://www.ureader.com 5 1357
'Guoqi,
There must be at least a dozen obfuscator products in the marketplace now.
One of them, "Dotfuscator" ( I think its a "Community Edition") ships with
Visual Studio.Net, so you should already have it.
I'd suggest starting with that.
Peter
--
Co-founder, Eggheadcafe.com developer portal: http://www.eggheadcafe.com
UnBlog: http://petesbloggerama.blogspot.com
"guoqi zheng" wrote: I often write some .dll component for other people. Because of CLR, I often find easily access to all source code of my .DLL file by using some kind of reflector.
Is there an easy to protect my .NET .DLL class source code?
regards,
Guoqi Zheng http://www.ureader.com
There are two things you can do - one is to obfuscate it and hence make the
reversed .NET code almost unreadable.
The other is to use ngen.exe and compile the assembly to native code - in
which case it is converted to binary. The drawback is that ngen targets the
native code to the processor architecture that you are running it on - so you
might lose out on processor-specific enhancements of .NET JIT compiler and
also the code wouldn't work on a different processor architecture (such as
64-bit).
Regards
Pandurang
--
blog: www.thinkingMS.com/pandurang
"guoqi zheng" wrote: I often write some .dll component for other people. Because of CLR, I often find easily access to all source code of my .DLL file by using some kind of reflector.
Is there an easy to protect my .NET .DLL class source code?
regards,
Guoqi Zheng http://www.ureader.com
NGen is no good in code protection, as it still requires the original
(unprotected) assemlies to be present. Our salamander suite offers a
series of products, including obfuscator, protector and native compiler
for code protection and deployment without installing the .NET
Framework.
Huihong http://www.remotesoft.com
Pandurang Nayak (nospam) wrote: There are two things you can do - one is to obfuscate it and hence make the reversed .NET code almost unreadable.
The other is to use ngen.exe and compile the assembly to native code - in which case it is converted to binary. The drawback is that ngen targets the native code to the processor architecture that you are running it on - so you might lose out on processor-specific enhancements of .NET JIT compiler and also the code wouldn't work on a different processor architecture (such as 64-bit).
Regards Pandurang
-- blog: www.thinkingMS.com/pandurang
"guoqi zheng" wrote:
I often write some .dll component for other people. Because of CLR, I often find easily access to all source code of my .DLL file by using some kind of reflector.
Is there an easy to protect my .NET .DLL class source code?
regards,
Guoqi Zheng http://www.ureader.com
free for use http://www.aspose.com/Products/Aspose.Obfuscator/
"guoqi zheng" <no@sorry.com> wrote in message news:e1******************************@ureader.com. .. I often write some .dll component for other people. Because of CLR, I often find easily access to all source code of my .DLL file by using some kind of reflector.
Is there an easy to protect my .NET .DLL class source code?
regards,
Guoqi Zheng http://www.ureader.com This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics
by: dam |
last post by:
Hi,
since there are tools that can decompile assemblies and
show ENTIRE SOURCE CODE (!?) is there any way for
developers to protect their work ?
Or, is famoues .NET framework just for...
|
by: YK |
last post by:
All,
What is the best way to protect IL code?
---------------------------------------------------
Typical scenario:
Visual Studio .NET 2003 includes Dotfuscator Community Edition, which...
|
by: Enzo |
last post by:
Hi Ng,
It's possible to protect the source code of
a js file? With PHP?
Thanks in advance!
Enzo
|
by: Boni |
last post by:
Dear all,
in order to protect my assembly component from decompilation I implemented
following schema:
I created mixed mode C++ project wich has managed cProxy class and unmanaged
cMemLoader....
|
by: Noone Here |
last post by:
AIUI, it was not all that long ago when the threat to personal users,
was attachments that when executed compromised machines with keyloggers,
trojans, etc.
Now it seems that the big problem is...
|
by: Usman |
last post by:
Hi
I'm working on an application that contains classes for licensing,
authentication etc, including all the algorithms of encryption/decryption
etc. I wanted to secure this code, but after...
|
by: Bayazee |
last post by:
hi
can we hide a python code ?
if i want to write a commercial software can i hide my source code from
users access ?
we can conver it to pyc but this file can decompiled ... so ...!!
do you...
|
by: FAQ server |
last post by:
-----------------------------------------------------------------------
FAQ Topic - How do I protect my javascript code?
-----------------------------------------------------------------------
...
|
by: flit |
last post by:
Hello All,
I have a hard question, every time I look for this answer its get out
from the technical domain and goes on in the moral/social domain.
First, I live in third world with bad gov., bad...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
| |