473,378 Members | 1,355 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,378 software developers and data experts.

ClickOnce Code Security

I am in the process of creating a C# ClickOnce application that will be
deployed in the coming months. I was initially thinking of deploying it
through Windows Installation but due to the need of regular updates to the
program on the client end, ClickOnce led itself to be the better candidate.

With the initial Windows Installation I was planning on using obfuscation
built in Visual Studio to make the code unable to be reverse engineered (to a
certain extent). I was wondering how "secure" or "un-reverse engineerable"
ClickOnce deployment applications are. I found a reference through the
ClickOnce information pages that said "the application is put in an
obfuscated folder." I'm not exactly sure what that means and how secure that
is.

Any information on this matter would be greatly appreciated.
Thanks.
Apr 24 '06 #1
1 1751
The only aspect of the client-side target folder that might properly be
described as "obfuscated" is its name. Your assemblies will not be
automatically obfuscated at any point in the ClickOnce process. If you
would like to apply obfuscation, you will need to do so "manually",
including using mage or mageui to generate your manifests instead of doing
so via the VStudio UI.
"Mr. Beck" <Mr****@discussions.microsoft.com> wrote in message
news:4A**********************************@microsof t.com...
I am in the process of creating a C# ClickOnce application that will be
deployed in the coming months. I was initially thinking of deploying it
through Windows Installation but due to the need of regular updates to the
program on the client end, ClickOnce led itself to be the better
candidate.

With the initial Windows Installation I was planning on using obfuscation
built in Visual Studio to make the code unable to be reverse engineered
(to a
certain extent). I was wondering how "secure" or "un-reverse
engineerable"
ClickOnce deployment applications are. I found a reference through the
ClickOnce information pages that said "the application is put in an
obfuscated folder." I'm not exactly sure what that means and how secure
that
is.

Any information on this matter would be greatly appreciated.
Thanks.

Apr 24 '06 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: markoueis | last post by:
Is there any way to embed a ClickOnce Application into the browser? I love the way ClickOnce works, but the problem is I would like it to display the windows form in the browser. I could use a...
5
by: Danny Tuppeny | last post by:
I've been playing around with ClickOnce today, and it's all good stuff. Except, that if I change my application to NOT be full trust (which seems to make very little difference to the user prompt,...
11
by: moondaddy | last post by:
I have a .net 2.0 smarclient app and am trying to deploy it to IIS where users can access it from. I created an application folder in IIS where I'm trying to deployee to. 1) When the...
0
by: dave | last post by:
For some reason in my visual C# 2005 express installation, when ever i publish even a simple app, in the properties, the "sign the clickonce manifest" and the "enable the clickonce security...
3
by: steven deng | last post by:
I want to know when a clickonce app exits. I have code snippet below. But the Exited event is not triggered. If I change the process to Notepad.exe(see comment line), it works fine. Any suggestion...
6
by: Irfan | last post by:
hi, After installing the application in the client machine using ClickOnce, i would like that the client be able to change the database path in the Application.Config file. However, clickonce...
3
by: =?Utf-8?B?Tmlrb2xheSBQb2Rrb2x6aW4=?= | last post by:
Good noon, community! Would you be so kind and help me solve my problem. I need Deploy application through ClickOnce technology. I've configuration file where I assign sensitive data about...
3
by: Ryan Liu | last post by:
hi, I like the Publish function comes with VS2008. But 3 questions remain: how to make update path to be flexiable? Because I will give those updates to my cutomers, and different cutomer will...
3
by: =?Utf-8?B?S2VuIExlbWlldXg=?= | last post by:
My clickonce app fails when the install button on the publish.htm page is clicked. User is prompted with a "Cannot Start Application" dialog. Details provided from the dialog are: PLATFORM...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.