473,799 Members | 2,868 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

dotfuscator...? ??

I have a .exe file which is generated by dotfuscator.
How can I use it in deployment project?
Please provide instruction as details as possible.

Thanks in advance

Jul 21 '05 #1
0 1078

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
1900
by: Robbie De Sutter | last post by:
Hello, When I use the dotfuscator (Community Edition), all my delegate functions no longer work. I understand the reason why (the function in my delegate no longer exists under the name I try to called it due to the obfuscation process), but I don't know how to solve the problem except by excluding the classes I delegate to...
10
3761
by: Darren | last post by:
OK, I'm trying to understand the need for this. If I understand correctly without this anyone can reverse engineer and obtain the source code of my application - is this correct? And this tool will prevent this? Why isn't this tool automatically executed by default whenever I build my apps? My company is building corporate applications and don't want our source code available to anyone. I assume there is a Dotfuscator that
0
1428
by: venky | last post by:
How can i integrate dotfuscator with my solution projects. Like when i build projects in my solution using visual studio.net, i want to be build using dotfuscator. Like i have a setup project which takes the dll from some directory. Before i run the setup project, i want the dlls to be built using dotfuscator and i don't want any manual operation. How can u integrate with build process or setup process? I am dotfuscator community...
3
3991
by: Tom Bean | last post by:
I am using Dotfuscator Community Edition to obfuscate an application for Pocket PC written in C#. When I made the first pass with Dotfuscator, the app threw a MissingManifestResourceException. Of course, since the app has been obfuscated, the only information I got about what caused the error pointed to resource aq. The Dotfuscator listing window had WARNINGs about all the forms in my app, so I excluded them on the 'Rename' tab and...
3
4683
by: Alan Mok | last post by:
Hi All, I am a newbie to dotfuscator. I am trying to dotfuscate my application. Everything seems ok except that when I try to run a method that has the following command poMsgObj.GetType()).GetMethod(psAfterMsg).Invoke(poMsgObj,new string {asSelectedValue}; I got an error saying "Object reference not set to an instance of an
1
1592
by: Dave Goebel | last post by:
PreEmptive Solutions wants to let you know that we have added a new product to the Dotfuscator line. The new Dotfuscator Standard Edition is a significant improvement to the Community Edition you are currently using. The Standard Edition adds important features required for any type of production environment. These features include tools to aid in debugging and stack trace analyzation , C++ support, additional obfuscation options,...
2
2304
by: Tina | last post by:
I have a dll created from an asp.net component I wrote. I want to distribute it to other developers but I'm told it can be reverse engineered. I read the docs on dotfuscator thinking that this could add protection. The docs say that to run it from vs.net to run it from the external tools menu then follow the gui. The External Tools dialog box comes up, I highlight Dot&Fuscator Community Edition, Hit OK and nothing happens. What am I...
1
1294
by: Tina | last post by:
I found the dotfuscator GUI interface. It wants me to open an xml file. My component project has no xml file. Also, is there a specific forum for dotfuscator issues? It's not mentioned in any of the security forums. thanks, T
8
7614
by: Wacom | last post by:
Hi all! I'm doing some test of obfuscation of assembly marked with the strong name (Fw 2.0). Someone can tell me how does this work? I mean: if I have an exe and a couple of dll marked w/strong name and I obfuscate the dll when I run the exe it crashes because cannot load the
1
4667
by: dongarbage | last post by:
The subject says it all :) I have Visual Studio 2005, it comes with community edition of dotfuscator. I'd like to use dotfuscator in a post-build event. However, I get an error when I call dotfuscator. I can run it from the command line and it always pops up a gui even when \q option is used. Is there a way to get dotfuscator community edition to work as a post-build event? Also, is there a way to get it to run from the command line...
0
9688
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9546
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10491
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10268
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
10031
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
7571
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6809
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5467
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5593
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.