473,395 Members | 1,726 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Reflector how can you secure your effort?

With the reflector tool .exe, .dll can be decompile?
how can we secure our work?
Nov 16 '05 #1
2 1463
1) Don't give anyone your code (may sound stupid but this is the only sure fire way - people call your functionality by remote invocation of some type).

After 1) it all comes down to can we make this cost more to reverse engineer than the benfit from reverse engineering it.

2) Obfuscate - Demeanor, Dotfuscator and there are others will mange your code to make it very unreadable and much harder to decompile

3) Compile teh sensitive bits in unmanaged code and use interop to talk to them - this makes things as hard as if you'd not moved to managed code

4) Don't bother - is your code actually that valuable in the details of each method or only in the architecture and structure of the code in general. The vast majority of applications fall into this category I would argue. For example, I don't think being able to rverse engineer Word would get me much because the real IP is in the structure of the code in the large, not in the small.

Regards

Richard Blewett - DevelopMentor

http://staff.develop.com/richardb/weblog

nntp://news.microsoft.com/microsoft.public.dotnet.languages.csharp/<#D*************@TK2MSFTNGP15.phx.gbl>

With the reflector tool .exe, .dll can be decompile?
how can we secure our work?

---
Incoming mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.760 / Virus Database: 509 - Release Date: 10/09/2004

[microsoft.public.dotnet.languages.csharp]
Nov 16 '05 #2
IMHO

If your library or program is valuable and complex, and rare. It will be
reverse-engineered no matter what you do.

Worrying about someone looking at your source code is paranoia.

Usually a casual snooper will use a reflection tool to see how good the
software really is, in many cases the software is not high quality and the
hacker could write the software better, and so he will not care about the
component.

Know this:
Most medium-large companies will not purchase software components, without
the full source code. Lets say that some one writes a razzle-dazzle
component and they decide to sell it to company XYZ. This company XYZ spends
6 months of development using your component. Then the worst happens, there
is a bug in the component, they try to contact the company who wrote the
component and it is out of business. As you can see, no smart developer
would ever allow this situation.

Write your software, and sell it with the source code. (You can always ask
twice the price, and include the source code.) Chances are they will find a
problem and teach the author a few ideas on how to build it better.

Bye!
Russ

If you are still not convinced, then you can purchase RemoteSoft's product,
and remove all the metadata from the assembly.
This will slow them down, but they'll still get it if it's good software.

"kids_pro" <ki******@yahoo.com> wrote in message
news:%2***************@TK2MSFTNGP15.phx.gbl...
With the reflector tool .exe, .dll can be decompile?
how can we secure our work?

Nov 16 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Ashish Jassra | last post by:
This is regarding a project where we have to built a secure website (HTTPS). kindly let me know 1) how is developing a secure website (https) different from developing a normal site (http). ...
68
by: Roman Ziak | last post by:
Hello, I just downloaded MS Visual Studio 2005 Express Beta. When I tried to compile existing valid project, I get a lot of warnings like 'sprintf' has been deprecated, 'strcpy' has been...
7
by: Augie | last post by:
Hi All. This might not be the correct place to ask this question... Then again I'm not sure where else to ask this... When you build a DLL to use with "OUR" code... How do you prevent others...
7
by: Seth | last post by:
I have noticed that the id of my session object changes when I switch from a non-secure to a secure connection. What I'm trying to do: I have a cookie that is built on the non-secure side of...
5
by: John A Grandy | last post by:
How to use the .NET Reflector to determine which .NET version and assembly was compiled in ?
40
by: Robert Seacord | last post by:
The CERT/CC has released a beta version of a secure integer library for the C Programming Language. The library is available for download from the CERT/CC Secure Coding Initiative web page at:...
7
by: Robert Seacord | last post by:
The CERT/CC has just deployed a new web site dedicated to developing secure coding standards for the C programming language, C++, and eventually other programming language. We have already...
68
by: Jack | last post by:
http://www.open-std.org/jtc1/sc22/wg14/ http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1135.pdf Has anyone gone through this? Is this useful? Will it make it to the next standard?
1
by: josephbubba | last post by:
Greetings, Question about how the NaN constant is defined in .NET. When I look at the C# definition for the System.Double NaN definition in Roeder's Reflector, it looks like this: public...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.