|
by: Kerem Gümrükcü |
last post by:
Hi,
how can i protect a assembly against disassembling with ILDASM and
other products like that. i have a dll with some encryption methods
implemented and i dont want them to be exposed, to...
|
by: Mitchell Vincent |
last post by:
I'm sure this has been discussed here plenty of times before (feel free
to point me to the thread!) but I want to learn as much as possible
about the single most talked about issue with .NET...
|
by: Tim Mulholland |
last post by:
This thread is intended to be more of a discussion thread - because i value
the opinions of the posters in this newsgroup, and especially the MVPs like
Nicholas Paladino and Jon Skeet (thanks to...
|
by: Vortex Soft |
last post by:
http://www.junglecreatures.com/
Try it and tell me what's happenning in the Microsoft Corporation.
Notes:
VB, C# are CLS compliant
|
by: BH |
last post by:
I heard there are tools that can disassemble a .NET DLL or EXE into source
code in high level language of the choice. I'm not talking about
disassembling into the .NET Intermediate Language but...
|
|
by: Mohit Gupta |
last post by:
How do I protect the code. ILDASM disambles the code, so as Reflector and
other tools available.
This means that whatever code I write can easily be copied by anybody else.
How do i protect it.
|
by: RossettoeCioccolato |
last post by:
The version of dumpbin that ships with VC8 will disassemble x86 code. Is
there a version of dumpbin that ships with VC8 that is able to disassemble
AMD64 object code? Or is there some other...
|
by: Bayazee |
last post by:
hi
can we hide a python code ?
if i want to write a commercial software can i hide my source code from
users access ?
we can conver it to pyc but this file can decompiled ... so ...!!
do you...
|
by: Elliot |
last post by:
My codes contain several URLs which are supposed to be not disclosed.
As some programs such as Luxx Roxxxx's .NET Reflector can 'disclose' my
codes almost completely.
Any suggestion to 'hide'...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated ...
|
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|