473,382 Members | 1,329 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,382 software developers and data experts.

.NET Obfuscation using Dotfuscator for Source Code Protection

..NET Obfuscation using Dotfuscator for Source Code Protection
http://msdotnetsupport.blogspot.com/...cator-for.html
Feb 8 '08 #1
0 1057

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

10
by: Darren | last post by:
OK, I'm trying to understand the need for this. If I understand correctly without this anyone can reverse engineer and obtain the source code of my application - is this correct? And this tool will...
159
by: petantik | last post by:
Are there any commercial, or otherwise obfuscators for python source code or byte code and what are their relative advantages or disadvantages. I wonder because there are some byte code protection...
2
by: Vikram | last post by:
Hi, I need some advice on making the choice for a good code obfuscator. I have looked at Dotfuscator from Preemptive. Some of the disadvantages they list with their dotfuscator product are: ...
6
by: MrNobody | last post by:
How would you handle this situation: I have a series of classes which are to be later loaded using reflection: but the class to be used can vary depending on strings from a text file. So this...
3
by: ..:: Kevin ::.. | last post by:
Is it possible to perform obfuscation on code automatically as part of a build in Visual Studio 2003? For example, instead of building code in release mode, is it possible to create a custom...
10
by: John T. | last post by:
Hi all Figure this scenario: - My Company develops an assembly (a controls DLL) - Since an obfuscation software is too expensive, my Company engages a consultant and delegates him the...
1
by: Tina | last post by:
I have written an ASCX control with 99% of the logic in a spearate class in it's own dll assembly. I want to ship the ascx control and the dll to other users but I need to protect my code in the...
0
by: Dutt | last post by:
..NET Obfuscation using Dotfuscator for Source Code Protection...
1
by: Greg | last post by:
If a company is putting together an SDK where all of their soon-to-be shipping assemblies have been signed and obfuscated, will those assemblies be usless without specifying the items (Namespaces,...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.