473,395 Members | 1,681 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

How are you protecting your dot net apps from reverse engineering?

Hi all. I was wondering if you are just relying on the dotfuscator that is
included in VS2005 or do you use another method to protect your apps from
reverse engineering?

TIA

Robert
Apr 12 '06 #1
8 1339
I think Preemptive's .NET Obfuscator is one of the most popular
(probably due to inclusion of the community edition).

The Professional edition does an excellent job but I've only worked at
one place that could afford nearly $2000 for a license.

I've heard good things about RemoteSoft's Salamander obfuscator but
haven't used it myself - it's also much cheaper than Preemptive's
http://www.remotesoft.com/salamander/obfuscator.html

Apr 12 '06 #2
Thanks for the reply and link Jason.

Robert
"Jason Hales" <ja*********@yahoo.com> wrote in message
news:11**********************@e56g2000cwe.googlegr oups.com...
I think Preemptive's .NET Obfuscator is one of the most popular
(probably due to inclusion of the community edition).

The Professional edition does an excellent job but I've only worked at
one place that could afford nearly $2000 for a license.

I've heard good things about RemoteSoft's Salamander obfuscator but
haven't used it myself - it's also much cheaper than Preemptive's
http://www.remotesoft.com/salamander/obfuscator.html

Apr 13 '06 #3
Try Xenocode Postbuild. I like it a lot!!!

Apr 13 '06 #4
Anything can be decompiled. Therefore, my strategy is to continually stay
ahead of the competition in terms of what I create. As long as I keep moving
forward, anything that might be copied or stolen from me is already obsolete
in my toolbox.

Just a thought.

--
HTH,

Kevin Spencer
Microsoft MVP
Professional Numbskull

Show me your certification without works,
and I'll show my certification
*by* my works.

<in**@devdept.com> wrote in message
news:11**********************@j33g2000cwa.googlegr oups.com...
Try Xenocode Postbuild. I like it a lot!!!

Apr 13 '06 #5
Thanks for the info.

Robert
<in**@devdept.com> wrote in message
news:11**********************@j33g2000cwa.googlegr oups.com...
Try Xenocode Postbuild. I like it a lot!!!

Apr 13 '06 #6
Good point Kevin... but you have to try.

Robert
"Kevin Spencer" <ke***@DIESPAMMERSDIEtakempis.com> wrote in message
news:%2****************@TK2MSFTNGP05.phx.gbl...
Anything can be decompiled. Therefore, my strategy is to continually stay
ahead of the competition in terms of what I create. As long as I keep
moving forward, anything that might be copied or stolen from me is already
obsolete in my toolbox.

Just a thought.

--
HTH,

Kevin Spencer
Microsoft MVP
Professional Numbskull

Show me your certification without works,
and I'll show my certification
*by* my works.

<in**@devdept.com> wrote in message
news:11**********************@j33g2000cwa.googlegr oups.com...
Try Xenocode Postbuild. I like it a lot!!!


Apr 13 '06 #7
> Good point Kevin... but you have to try.

You mean *you* have to try. I certainly don't have to, and I don't.

--
;-),

Kevin Spencer
Microsoft MVP
Professional Numbskull

Show me your certification without works,
and I'll show my certification
*by* my works.

"Robert Johnson" <jo*******@sbcglobal.net> wrote in message
news:%2****************@TK2MSFTNGP03.phx.gbl...
Good point Kevin... but you have to try.

Robert
"Kevin Spencer" <ke***@DIESPAMMERSDIEtakempis.com> wrote in message
news:%2****************@TK2MSFTNGP05.phx.gbl...
Anything can be decompiled. Therefore, my strategy is to continually stay
ahead of the competition in terms of what I create. As long as I keep
moving forward, anything that might be copied or stolen from me is
already obsolete in my toolbox.

Just a thought.

Apr 13 '06 #8
What protection measures to take really depends on your comfort level.

If you think "well, I better do something", then obfuscators are fine,
defending casual users.

If you think "God, I really need to protect my code", then try native
compilation.

I wrote my salamander decompiler in java languages, before release, I
tried obfuscation, but didn't meet my goals, so I converted java source
code to C++ (for this I developed our java to C++ Octopus translator),
and recompiled it to native executables. Today, I still develop in Java
for the decompiler, but generate native code for release.

This is made possible for C#/VB.NET/MC++, with our native compiler:

http://www.remotesoft.com/linker

Huihong


Robert Johnson wrote:
Hi all. I was wondering if you are just relying on the dotfuscator that is
included in VS2005 or do you use another method to protect your apps from
reverse engineering?

TIA

Robert


Apr 13 '06 #9

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

18
by: Alan Sheehan | last post by:
Hi pythonistas, I am looking for methods of deploying applications with end users so that the python code is tamper proof. What are my options ? I understand I can supply .pyc or .pyo files...
17
by: Rich S. | last post by:
Hello Just like everyone else, I am excited about how easily one can create Windows applications with the .NET platform, but for shareware, I have some serious reservations 1. Your code can be...
15
by: Fady Anwar | last post by:
Hi while browsing the net i noticed that there is sites publishing some software that claim that it can decompile .net applications i didn't bleave it in fact but after trying it i was surprised...
2
by: Jacky Luk | last post by:
I saw an old thread in this group which addressed the issue of reverse compilation. After some study, I draw a conclusion that "reverse compilation" is completely blocked off in win32 environment...
7
by: Bobby C. | last post by:
My company is in the process of getting ready (well actually QTR 2 2004) to roll out a rewritten version of a vertical market application for the municipal market (small and medium sized cities). ...
22
by: flit | last post by:
Hello All, I have a hard question, every time I look for this answer its get out from the technical domain and goes on in the moral/social domain. First, I live in third world with bad gov., bad...
6
by: Herby | last post by:
Hi, Im interested in Reverse Engineering C++ source code into a form more comprehensible than the source itself. I want to write a basic one myself, obviously i need to write a parser for the...
7
by: Gui | last post by:
Hi folks, I have unpacked an all-in-one exe produced by InstallShield. I've made the necessary changes and now I'm ready to repack the files. How can I do that? Which program should I use? ...
2
by: _DD | last post by:
Is there any practical way to protect .NET demo programs from being reverse-engineered? This will be for a one-shot thing, and I'm far from making any money on this, so I'd prefer an economical...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.