By using this site, you agree to our updated Privacy Policy and our Terms of Use. Manage your Cookies Settings.
459,510 Members | 1,153 Online
Bytes IT Community
+ Ask a Question
Need help? Post your question and get tips & solutions from a community of 459,510 IT Pros & Developers. It's quick & easy.

ClickOnce Code Security

P: n/a
I am in the process of creating a C# ClickOnce application that will be
deployed in the coming months. I was initially thinking of deploying it
through Windows Installation but due to the need of regular updates to the
program on the client end, ClickOnce led itself to be the better candidate.

With the initial Windows Installation I was planning on using obfuscation
built in Visual Studio to make the code unable to be reverse engineered (to a
certain extent). I was wondering how "secure" or "un-reverse engineerable"
ClickOnce deployment applications are. I found a reference through the
ClickOnce information pages that said "the application is put in an
obfuscated folder." I'm not exactly sure what that means and how secure that
is.

Any information on this matter would be greatly appreciated.
Thanks.
Apr 24 '06 #1
Share this Question
Share on Google+
1 Reply


P: n/a
The only aspect of the client-side target folder that might properly be
described as "obfuscated" is its name. Your assemblies will not be
automatically obfuscated at any point in the ClickOnce process. If you
would like to apply obfuscation, you will need to do so "manually",
including using mage or mageui to generate your manifests instead of doing
so via the VStudio UI.
"Mr. Beck" <Mr****@discussions.microsoft.com> wrote in message
news:4A**********************************@microsof t.com...
I am in the process of creating a C# ClickOnce application that will be
deployed in the coming months. I was initially thinking of deploying it
through Windows Installation but due to the need of regular updates to the
program on the client end, ClickOnce led itself to be the better
candidate.

With the initial Windows Installation I was planning on using obfuscation
built in Visual Studio to make the code unable to be reverse engineered
(to a
certain extent). I was wondering how "secure" or "un-reverse
engineerable"
ClickOnce deployment applications are. I found a reference through the
ClickOnce information pages that said "the application is put in an
obfuscated folder." I'm not exactly sure what that means and how secure
that
is.

Any information on this matter would be greatly appreciated.
Thanks.

Apr 24 '06 #2

This discussion thread is closed

Replies have been disabled for this discussion.