473,399 Members | 2,478 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,399 software developers and data experts.

How to protect my code?

Jurnero
32
Hello!
I would like to know whether to use obfuscator to protect my code. What do you think about it. I have found many opinions here, but they seems outdated
Oct 5 '18 #1

✓ answered by JulsSmile

If you think about obfuscator, you can try ArmDot. It does not use undocumented features. Therefore, you will be deprived of surprises related with this features.

12 2764
Pasta code is a great obfuscator!
There are simple ways to confuse the code for reading by another programmer. Recently read one of the ways: Break your code into multiple files with as few functions as possible in each. In each file reuse the same variable names, but for utterly different meanings.
You can give variables an unexpected name. This is confusing! But it can be harmful for you too.
But if you want to use obfuscators, be careful. Some obfuscators complicate the subsequent maintenance of the code.
Oct 10 '18 #2
Jurnero
32
I think confusing variable names does not suit me. This will mislead me. The question is not to make the code simply unreadable. And to protect your code from being used by others.
Oct 12 '18 #3
Try to obfustace it!
Oct 14 '18 #4
If you think about obfuscator, you can try ArmDot. It does not use undocumented features. Therefore, you will be deprived of surprises related with this features.
Oct 15 '18 #5
Jurnero
32
Thanks, I'll look into this tool.
Thank you all for the answers!
Oct 16 '18 #6
donbock
2,426 Expert 2GB
Can you distribute only the executable code?
Then you don't have to obfuscate the source code.
Oct 16 '18 #7
Jurnero
32
Thanks for your reply. This is a good option. But not exactly what I need
Oct 17 '18 #8
JulsSmile, how does it work? I read, but do not understand completely
Oct 19 '18 #9
This program uses a virtual machine to convert code. You can read in detail in the official source.
Oct 23 '18 #10
Jurnero
32
Thank you all, the question is closed
Oct 30 '18 #11
use more private class
Oct 31 '18 #12
Jurnero
32
Thank. It is reasonable! I think it can help to some extent.
Although I think this is not enough to protect the program or game from hacking
Dec 13 '18 #13

Sign in to post your reply or Sign up for a free account.

Similar topics

15
by: Enzo | last post by:
Hi Ng, It's possible to protect the source code of a js file? With PHP? Thanks in advance! Enzo
2
by: weixiang | last post by:
Hi, After compiling with C#, the target exe file can still be reverse-compiled by ildasm. Is there someway to protect code from that method? I already used strong-name in my module. Thank...
15
by: Fady Anwar | last post by:
Hi while browsing the net i noticed that there is sites publishing some software that claim that it can decompile .net applications i didn't bleave it in fact but after trying it i was surprised...
17
by: seberino | last post by:
How can a proprietary software developer protect their Python code? People often ask me about obfuscating Python bytecode. They don't want people to easily decompile their proprietary Python app....
4
by: FAQ server | last post by:
----------------------------------------------------------------------- FAQ Topic - How do I protect my javascript code? ----------------------------------------------------------------------- ...
7
by: --== Alain ==-- | last post by:
Hi, Using the .NET reflector tool, i know that a DLL or EXE developed in ..NET platform can be decompiled and therefore code is available for all. I would like to know if exist a way how to...
22
by: teejayem | last post by:
Hi, I am new to programming with databases and was wanting some help. Is there any way to password protect an access database and access sent sql commands to it via vb.net code? Any help...
22
by: flit | last post by:
Hello All, I have a hard question, every time I look for this answer its get out from the technical domain and goes on in the moral/social domain. First, I live in third world with bad gov., bad...
2
by: jbowers | last post by:
I have a very long text string of numbers and some javascript code that is supposed to be used to manipulate it. I am trying to "decode" this string (represented as the variable "v" in the code...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.