473,397 Members | 2,028 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,397 software developers and data experts.

Prevent people from using my dll's

How do I prevent other people from using the dll's I create? I looked at
identity permissions but it looks like those are more for identifying an
assembly.

Any help would be great. Thanks!!
Jul 19 '05 #1
3 2991
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Brian Mitchell wrote:
How do I prevent other people from using the dll's I create? I looked at
identity permissions but it looks like those are more for identifying an
assembly.

Any help would be great. Thanks!!


You have two chioces:

1. Create an activex with license and use the activex

2. You can encrypt the dll's with a command line compression program or a
compression library with a secret password. And then just before loading
the dll you can decrypt to a random temp file and load it. You can either
delete or leave the temp file since its name wont make any sence anyway.

Winrar is a good candidate. It has UNRAR library you can freely use.

Enjoy.

Agron.

- --
Verify this digital signiture at http://www.mandrakesecure.net/cks/
Generate your own digital signiture with http://www.gnupg.org/
My email account does not receive messages without GNUPG signature. Best
spam killer so far.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/AANdqIgG2rIGbvcRAr7MAJ9WNRUK73xkTJx8pkVwTIOifBYPyQ CeL+ob
6RGB3IrhVJ8ZUT8KRcLSUco=
=orAS
-----END PGP SIGNATURE-----
Jul 19 '05 #2
Thank you very much for the support!!
"agron" <ag******@7kosova.com> wrote in message
news:zs*******************@news01.bloor.is.net.cab le.rogers.com...
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Brian Mitchell wrote:
How do I prevent other people from using the dll's I create? I looked at
identity permissions but it looks like those are more for identifying an
assembly.

Any help would be great. Thanks!!


You have two chioces:

1. Create an activex with license and use the activex

2. You can encrypt the dll's with a command line compression program or a
compression library with a secret password. And then just before loading
the dll you can decrypt to a random temp file and load it. You can either
delete or leave the temp file since its name wont make any sence anyway.

Winrar is a good candidate. It has UNRAR library you can freely use.

Enjoy.

Agron.

- --
Verify this digital signiture at http://www.mandrakesecure.net/cks/
Generate your own digital signiture with http://www.gnupg.org/
My email account does not receive messages without GNUPG signature. Best
spam killer so far.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/AANdqIgG2rIGbvcRAr7MAJ9WNRUK73xkTJx8pkVwTIOifBYPyQ CeL+ob
6RGB3IrhVJ8ZUT8KRcLSUco=
=orAS
-----END PGP SIGNATURE-----

Jul 19 '05 #3
Hi Brian,

You could use a StrongNameIdentity LinkDemand, which will prevent
assemblies without a specific strong name from linking against your
assembly. If you then use a keypair that you keep private, nobody but you
will be able to link against this assembly.

-Shawn

--

--------------------------------------------------
This posting is provided "AS IS" with no warranties, and confers no rights
"Brian Mitchell" <Ma********@hotmail.com> wrote in message
news:ea**************@TK2MSFTNGP11.phx.gbl...
How do I prevent other people from using the dll's I create? I looked at
identity permissions but it looks like those are more for identifying an
assembly.

Any help would be great. Thanks!!

Jul 19 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: kjon | last post by:
Hi, I've developed a couple of DLL assemblies component to be used with my main exe application. Since I need to distribute all the exe and dlls to the user PC, how can I prevent the user, who...
6
by: patrick t music-images dt nl | last post by:
Hi, I'm evaluating Visual Studio and the .NET concept for his company, which is currently using Borland C++ Builder. Now I tried to create components/controls etc. in .NET and I can reuse it...
3
by: Brian Mitchell | last post by:
How do I prevent other people from using the dll's I create? I looked at identity permissions but it looks like those are more for identifying an assembly. Any help would be great. Thanks!!
22
by: alecjames1 | last post by:
I have a form which the user must complete before closing. I have disabled the window x button and use my own exit button. When selected it checks to see if the user has completed the entries...
4
by: Chris | last post by:
Hi, I think I'm having some problems here with garbage collection. Currently, I have the following code: public struct Event { public int timestamp;
5
by: NEWSGROUPS | last post by:
I have some users that continuously end task on my database when a search takes to long. In turn corrupting the application. Is there any way to prevent this? The Microsoft KB for Methods That Can...
1
by: Andreas Bergmeier | last post by:
We have a com dll inside the bin directory of a WebApplication. In asp.net 1.1 this dll stays only in the bin directory and just the interop wrapper is copied to the temporary asp.net files. In...
4
by: eighthman11 | last post by:
this is probably very simple but I don't know. Is there a way to prevent two people from signing on to an Access Application using the some login information???? I can't have two people on the...
12
by: Queez | last post by:
I have a .NET assembly (ScanControl.dll), which accesses a scanner on my client's local machine and allows them to scan a page (Scan()). I have an ASP.NET web application with a page which will...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.