473,382 Members | 1,400 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,382 software developers and data experts.

Protecting code when distributing demo programs

_DD
Is there any practical way to protect .NET demo programs from being
reverse-engineered? This will be for a one-shot thing, and I'm far
from making any money on this, so I'd prefer an economical solution if
that's available.

I'm thinking a combination of code 'obfuscation' and maybe a timeout,
but I don't know what is available for either. I'm open to other
suggestions in addition to those.
Jun 27 '08 #1
2 1140
On Apr 24, 6:14*am, _DD <_...@nospam.comwrote:
Is there any practical way to protect .NET demo programs from being
reverse-engineered? *This will be for a one-shot thing, and I'm far
from making any money on this, so I'd prefer an economical solution if
that's available.

I'm thinking a combination of code 'obfuscation' and maybe a timeout,
but I don't know what is available for either. I'm open to other
suggestions in addition to those.
obfuscation is your best bet. But if you have no commercial license
you will have to use the community version provided in the IDE
Jun 27 '08 #2
On Thu, 24 Apr 2008 03:14:26 -0700, _DD <_D*@nospam.comwrote:
Is there any practical way to protect .NET demo programs from being
reverse-engineered?
With what kind of reliability?

In general, the answer is "no". The basic issue is that the more value
you put on not having the code reverse-engineered, the more value someone
else will put on actually doing so. Since it is literally impossible to
protect your code from reverse-engineering unless you simply don't provide
access to it, it's a losing battle on your part.

You can use obfuscators, and these will provide a small margin of
protection against the casual inspector. But beyond that, you'll never be
able to justify a cost for any attempt to block reverse-engineering that
is high enough to protect against a sufficiently motivated hacker.

If you don't want people to see your code, don't give it to them.

Pete
Jun 27 '08 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: NEWS | last post by:
Can I install Python on a networked server and have any user run Python programs without having to go through the 9Mb client install? What are my options for distributing Python programs to my...
18
by: Adrian B. | last post by:
Does anyone know of a framework or library that will enable me to use publish/subscribe comms? I want to create a server (using Python) running on a Unix box that will accept client connections...
4
by: Jonathan Henderson | last post by:
Obfuscators aren't only used for protecting intellectual property. See the hacker demo at this link: http://www.preemptive.com/documentation/NetHackerDemo.html For those who don't know what...
25
by: Steve Lefevre | last post by:
Hey folks - I'm working on an access database that I'm hoping to be able to sell to small/medium sized business. I would like to do some trial and demoing, but I'm worried about client's ability...
1
by: Bob | last post by:
Help wanted Does anyone know of any books out there that addresses the problems of marketing an Access Database program with front/back end arrangement. What I am looking for is a book that...
9
by: Lucas | last post by:
Hi, I have an ASP.Net application and I'd like to know about how to protect it from Software Piracy. Are there some alternatives to do that? Thanks a lot LucasC
7
by: Bobby C. | last post by:
My company is in the process of getting ready (well actually QTR 2 2004) to roll out a rewritten version of a vertical market application for the municipal market (small and medium sized cities). ...
4
by: pcnerd | last post by:
I've been playing around with VB since version 3. I now have VB6 Learning Edition. I'm thinking about getting VB.NET Express Edition. I have a lot of demo programs for version 3 thru version 6. I...
22
by: flit | last post by:
Hello All, I have a hard question, every time I look for this answer its get out from the technical domain and goes on in the moral/social domain. First, I live in third world with bad gov., bad...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.