|
by: Weird-beard |
last post by:
Is there a uml reverse engineering tool for php? I am using argo uml,
but it only has support for java reverse engineering, I remember that
poseidon is same too.
Thanks.
|
by: xiao zhang yu |
last post by:
me was sorry if this question are present before
DotNet, no matter VB.Net or C# all they are compiled to IL,
and yes, that IL will totally same as "open-sourse",
every IL will easy to decompile and get the source nicety,
although there have comeout with some "obfuscators" solution,
but the structure still remain exactly same as the source after obfuscate.
me unable to understand what the benefit will IL bring to me,
is that benefit of...
|
by: Martin |
last post by:
Hi,
I am trying to reverse engineer some software in C. Ideally I would
like to use a free program that would scan for function calls and map
the route of function calls in programs in a tree structure.
ie.
main() defined in a.c
|
----------------> init_comms() defined in b.c
|
by: bluekarthik |
last post by:
Hi ,
Hi, has anyone tried reverse engineering a .drv / .dll file ?
Plz tell me some techniques to reverse engineer .drv / .dll files !!
karthik bala guru
|
by: seash |
last post by:
H
I developed an windows form application(visual c#), i want to protect it against copying(only licensed should be able to use) and i heard a topic like reverse engineering(c# decompilers) etc...Is there any free code available on net
---need hel
----seash
|
|
by: Sérgio Almeida |
last post by:
greetings
it is possible to use reverse engineering on a .NET Dll?
If so, how?
TIA
Almeida
|
by: Fady Anwar |
last post by:
Hi while browsing the net i noticed that there is sites publishing some
software that claim that it can decompile .net applications i didn't bleave
it in fact but after trying it i was surprised that i could retrieve my code
from my applications after i compile it so i need to know to prevent this
from happening to my applications
Thanx in advance
|
by: mary |
last post by:
Hi, for my thesis at the university I'm working on a Visual c++ 6.0
source code, to understand better it I need to extract the UML
graphics: Class Diagram, Object Diagram, Use Case Diagram, State
Diagram, Sequence Diagram, Collaboration Diagram, Activity Diagram.
I've installed Visio 2003 and I'm trying to reverse engineering my
project to get the conceptual design of it. When I start Visio, it
exstracts and decodes correctly the...
|
by: Herby |
last post by:
Hi,
Im interested in Reverse Engineering C++ source code into a form more
comprehensible than the source itself.
I want to write a basic one myself, obviously i need to write a parser
for the source code.
Although this has some overlap with say a compiler it would also seem
significantly different too.
|
by: Gui |
last post by:
Hi folks,
I have unpacked an all-in-one exe produced by InstallShield. I've made
the necessary changes and now I'm ready to repack the files.
How can I do that? Which program should I use?
For unpacking I used IsXunpack. But which one should I use to repack
the files into an all-in-one exe again? Maybe I should use
InstallShield itself, but how?
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|