473,396 Members | 1,924 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

How did Remotesoft did Protecter software? Hiding codes...Wow!

Hi,

I saw this link:

http://www.remotesoft.com/salamander/protector.html

and the screenshots

http://www.remotesoft.com/salamander...ode_protection

I wonder how they did this:

Our protector is not an obfuscator, rather it converts the decompilable
Microsoft Intermediate Language code (MSIL or CIL) of your assemblies into
native format while keeping all .NET metadata intact, and thus it provides
the same level of protection as native C/C++ code.

Before:
IL_0000: ldstr "Hello World using C#!"
IL_0005: call void [mscorlib]System.Console::WriteLine(string)
IL_00a: ret

After:
00000000 mov eax,dword ptr ds:[20004000h]
00000006 mov ecx,dword ptr [eax]
00000008 mov eax,dword ptr ds:[200046C0h]
0000000e call dword ptr [eax]
00000020 ret

Basically that is what my boss want me to achieve. Yes, we are considering
that software now, but my curiousity, how did they do that?

How does a person converts IL to native format? That is amazing!

They can even hide resources, and strings. Wow!

Hmm.... what do you think, anyone?

Yeah my company is evaluating protector right now. Very impress! But as a
developer and hobbyist, I am super interested on how they did that?

Hmm.. i also wonder whether Protector or Salamander is done in C++ or .NET
itself?

Cheers.

--
Regards,
Chua Wen Ching
Visit us at http://www.necoders.com
Nov 16 '05 #1
1 1811
Hi,

Our company is considering purchasing a license for Salamander Protector as
well. Would appreciate if you could share the results of your evaluation and
if you eventually licensed it.

Neo

"Chua Wen Ching" wrote:
Hi,

I saw this link:

http://www.remotesoft.com/salamander/protector.html

and the screenshots

http://www.remotesoft.com/salamander...ode_protection

I wonder how they did this:

Our protector is not an obfuscator, rather it converts the decompilable
Microsoft Intermediate Language code (MSIL or CIL) of your assemblies into
native format while keeping all .NET metadata intact, and thus it provides
the same level of protection as native C/C++ code.

Before:
IL_0000: ldstr "Hello World using C#!"
IL_0005: call void [mscorlib]System.Console::WriteLine(string)
IL_00a: ret

After:
00000000 mov eax,dword ptr ds:[20004000h]
00000006 mov ecx,dword ptr [eax]
00000008 mov eax,dword ptr ds:[200046C0h]
0000000e call dword ptr [eax]
00000020 ret

Basically that is what my boss want me to achieve. Yes, we are considering
that software now, but my curiousity, how did they do that?

How does a person converts IL to native format? That is amazing!

They can even hide resources, and strings. Wow!

Hmm.... what do you think, anyone?

Yeah my company is evaluating protector right now. Very impress! But as a
developer and hobbyist, I am super interested on how they did that?

Hmm.. i also wonder whether Protector or Salamander is done in C++ or .NET
itself?

Cheers.

--
Regards,
Chua Wen Ching
Visit us at http://www.necoders.com

Nov 16 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

24
by: Uwe Mayer | last post by:
Hi, I have the following inter-class relationships: __main__: (in file LMCMain.py) imports module FileIO defines class LMCMain instanciats main = LMCMain(...) FileIO.py:
4
by: StressPuppy | last post by:
(posted this in VB group but then realized I probably should have posted here) I have a TabControl with several TabPages. Upon startup, I only want to show the first TabPage, hiding the rest....
0
by: Author Tarun Tyagi | last post by:
Hi, I am a Data Recovery Specialist and Professional Data Recovery Software Developer in New Delhi. I've placed the Complete SOURCE CODE of One of my Data Recovery Software for Sale (for...
8
by: Gawel | last post by:
Hajo, I consider usage of below tool. http://www.remotesoft.com/linker/ Do you have any bad/good experience with it? What are its limitations ? thanks
2
by: Joe_Black | last post by:
Hi all, I have an app that I want to have activation codes for, it has plugin dll files each of which have an activation code as well. I need to generate a unique code that is specific to the...
17
by: Bob Weiner | last post by:
What is the purpose of hiding intead of overriding a method? I have googled the question but haven't found anything that makes any sense of it. In the code below, the only difference is that...
2
by: craigkenisston | last post by:
So, I wanted to implement a very, very basic job posting capability to one of my website. I made some searches and I found there is a JOBS STARTER KIT !! Wow, "it's my lucky", I thought. I...
7
by: sam | last post by:
It can compile .net code to native code which can run without an installed .net framework. This would remove one of the greatest disadvantages from C#. Sounds quite interesting....
162
by: Sh4wn | last post by:
Hi, first, python is one of my fav languages, and i'll definitely keep developing with it. But, there's 1 one thing what I -really- miss: data hiding. I know member vars are private when you...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.