473,386 Members | 1,841 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

how can i protect against decompilers

i saw something named obfuscator and its decompiling the source code of my
program which written in c# and my program includes mysql root password
inside of it
is there anyway to protect my program against this decompilers.
Thanks
Nov 16 '05 #1
4 1732
Dm.
i has some expirience working with:
9Rays (Spices), RemoteSoft (Salamander) and PreEmptive Solutions
(DotFuscator), Demeanor.

I found that all above obfuscators just do renaming of custom properties,
classes, and method names.
Some provide good strings encryption and even some refactoring.
Here is an hidden problem for commercial applications.

..Net is not translatable to java-like opcodes - its an assembler for virtual
machine, so all the main calls and method names will remain (it helps with
orientation).
For example, if you're using Licensing Class - the only thing you need to do
to brake 'licensed' application is replace 'throw' with 'ret' (in MSIL),
and it will not die on left license; as general licensing logic is:
'validate or die' - this is very breakable.

So the obfuscators are good to complicate code insight, but not enough to
make real protection in most cases.
The way is custom loaders with advanced polymorphic logic, but you will
loose interpretability.

Regards,
Dm.
i saw something named obfuscator and its decompiling the source code of my
program which written in c# and my program includes mysql root password
inside of it
is there anyway to protect my program against this decompilers.
Thanks

Nov 16 '05 #2
"Tolga Tanriverdi" <to***@sylveria.gen.tr> wrote in message
news:Oj**************@TK2MSFTNGP14.phx.gbl...
i saw something named obfuscator and its decompiling the source code of my
program which written in c# and my program includes mysql root password
inside of it
is there anyway to protect my program against this decompilers.


You should not encode secrets into your compiled code. Do you have
individual clients access the database directly? Run the request through a
service layer instead of accessing the database directly.

--
Mickey Williams
Author, "Visual C# .NET Core Ref", MS Press
www.neudesic.com
www.servergeek.com
Nov 16 '05 #3
Dm. <nn****@yahoo.ca> wrote:

<snip>
.Net is not translatable to java-like opcodes - its an assembler for virtual
machine, so all the main calls and method names will remain (it helps with
orientation).


In what way is that not like Java? It's *exactly* like Java - you can
use ildasm instead of javap and you get to see the IL rather than the
byte code, but that's all.

<snip>

--
Jon Skeet - <sk***@pobox.com>
http://www.pobox.com/~skeet
If replying to the group, please do not mail me too
Nov 16 '05 #4
SB
Note that even if you wrote your app in straight C, a string password can be
found pretty easily. Again, don't put passwords in exes unless you are
trying to keep out pre-schoolers.

-sb

"Tolga Tanriverdi" <to***@sylveria.gen.tr> wrote in message
news:Oj**************@TK2MSFTNGP14.phx.gbl...
i saw something named obfuscator and its decompiling the source code of my
program which written in c# and my program includes mysql root password
inside of it
is there anyway to protect my program against this decompilers.
Thanks

Nov 16 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

11
by: siliconmike | last post by:
Is there a way to protect data files from access by root ? I have a data-centered website and would like to protect data piracy from any foot-loose hosting company employee. Any ideas? ...
1
by: MrNobody | last post by:
I happened accross a web site today for a company that demos their C# decompiler, called Salamander (Just google "Salamander decompiler"). I uploaded my assembly and to my horror everything was...
15
by: Fady Anwar | last post by:
Hi while browsing the net i noticed that there is sites publishing some software that claim that it can decompile .net applications i didn't bleave it in fact but after trying it i was surprised...
9
by: Dakkar | last post by:
i saw something named obfuscator and its decompiling the source code of my program which written in c# and my program includes mysql root password inside of it is there anyway to protect my...
3
by: yservel | last post by:
Hi everybody. I was just wondering how did editors were protecting their source code from decompilers and reverse engeneering. I heard one method of source code protection was by obfuscation: ...
0
by: Bank of America | last post by:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta...
10
by: FAQ server | last post by:
----------------------------------------------------------------------- FAQ Topic - How do I protect my javascript code? ----------------------------------------------------------------------- ...
3
Nepomuk
by: Nepomuk | last post by:
Hi everyone! I was wondering, how many of you have used a Java Decompiler so far and what experiences did you make? I've used the DJ Java Decompiler 3.9 (which uses JAD) a bit lately and found it...
10
by: Alain R. | last post by:
Hi, I already asked about this topic few months ago, but i did not get any answer which satisfied me, therefore i'm asking it again. I would like to know how i can protect my code (C#.NET)...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.