473,387 Members | 1,512 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

Dotfuscator and strong name assembly

Hi, I want to obfuscate my DLL assembly which also has a strong name. As I
know that the obfuscated assembly with strong name won't work, and have
tried using AssemblyDelaySign(True) and sn.exe -R my.dll key.snk but still
don't work.

Just want to make sure what is the proper way to achieve this? I thought
this might be a common task but just can't find any on the web which can
tell it more clearly.

Thanks for any advice.
Jul 21 '05 #1
1 3352
> Hi, I want to obfuscate my DLL assembly which also has a strong name. As I
know that the obfuscated assembly with strong name won't work, and have
tried using AssemblyDelaySign(True) and sn.exe -R my.dll key.snk but still
don't work.

Just want to make sure what is the proper way to achieve this? I thought
this might be a common task but just can't find any on the web which can
tell it more clearly.


Try Spices.Net Obfuscator (http://9rays.net/products/spices), it is enough
to define StrongNameKeyFile property of Spices.Net project to sign
obfuscated assembly after obfuscation.
--
Best regards,
Al Ponomarev
9Rays.Net

Jul 21 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Mário Sobral | last post by:
Hi, I created an assembly (let's call it assembly (B)) that returns a localized resource for a given key (similar to System.Globalization.ResourceManager). I checks if the caller assembly (let's...
20
by: Razzie | last post by:
Hey all, I'm really going through a small hell right now - I've completely lost it :) I made a project, using two interop libraries from exchange (created them as in this msdn article:...
8
by: Tamir Khason | last post by:
Following the code: Assembly myAssembly = Assembly.LoadFrom(FileName); foreach (Type myType in myAssembly.GetTypes()) {Do_whatever()}
1
by: ker chee huar | last post by:
Hi all! i am using Dotfuscator Community Edition for encrypt my .Net assembly. How can i include all my dependancy Dll to encrypt it because my project is multi-reference project! regards,...
1
by: kjon | last post by:
Hi, I want to obfuscate my DLL assembly which also has a strong name. As I know that the obfuscated assembly with strong name won't work, and have tried using AssemblyDelaySign(True) and sn.exe -R...
1
by: Tim F | last post by:
Problem: I'm receiving the error "File or assembly name XXXXX or one of its dependencies, was not found." when trying to execute code in an assmebly that has both a strong-name and has been...
0
by: Fabio | last post by:
Hi all! I'm doing some test of obfuscation of assembly marked with the strong name (Fw 2.0). Someone can tell me how does this work? I mean: if I have an exe and a couple of dll marked...
8
by: Wacom | last post by:
Hi all! I'm doing some test of obfuscation of assembly marked with the strong name (Fw 2.0). Someone can tell me how does this work? I mean: if I have an exe and a couple of dll marked...
6
by: raylopez99 | last post by:
Anybody use Strong Name Signing? I think this is used by default for Resource files, which is one reason perhaps I can't get my resource files to work (somehow the public key is messed up, perhaps...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.