473,394 Members | 1,752 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,394 software developers and data experts.

stop other stealing .net files, encryption?

Hi'

I'm about currently working for someone building them a .net web app.

I'm about to launch it onto his servers.

There is another .net developer working on something else.

I have no interest in his worl but he has shown an interest in my work, because i think he's worried about his job security and is tryin to push me out.

He has full ftp access and will no doubtly try and copy my code.
There are chunks of code on there (most of it) that is the same as other projects i have made and would not be good for other people to have.

My question is how can i fix this?
Can i stop him accessing the individual .aspx files? OR
Can i run a script to jumble the code to make it unreadable i.e remove white space and change variable names to something else?
What is the standard way of doing this?
What would you do?
p.s changing his ftp access is not an option.

I'm really worried , please help me out.

Thanks
Apr 9 '08 #1
6 865
Plater
7,872 Expert 4TB
Develope your web application on a private computer and PUBLISH the pre-compiled website to the real server.
that way if he has access to the real server, he will not get any of the backend files.
Then you just have to worry about keeping him out of the private computer.
Apr 9 '08 #2
thanks, i was unaware of PUBLISH, but i found that you can decompile this easily wihtout any problems.

i found Spices.Obfuscator that encripts the output but it costs money. does anyone know a free/open source method to secure your work?

Thanks
Apr 9 '08 #3
Plater
7,872 Expert 4TB
I want to say microsoft has one that can be attached to visual studio. Not sure if it's free or not.

I would not say "decompiling" it is easy per say, but it is doable. I mean all it does is compile all your code into a DLL, so you're at the same risks as you would a "compiled" windows application.
Apr 10 '08 #4
do you Obfuscate your work?
Apr 10 '08 #5
Plater
7,872 Expert 4TB
Nope. I don't do anything really "mission critical" that I would worry about what people find when stealing.
Apr 10 '08 #6
thanks so much for your help plater.

does anyone else obfscate? which progs do you use? does it make it a complete pain to update?
Apr 11 '08 #7

Sign in to post your reply or Sign up for a free account.

Similar topics

4
by: Ed J | last post by:
I need some sort of file encryption that I can invoke from my PHP web pages, to protect sensitive files uploaded/downloaded by clients. I use https (SSL) for the upload/download, but once the...
5
by: el_roachmeister | last post by:
I am an ASP, selling hosted software and am concerned that someone will steal my source code and resell it? I did a google search and it seems unlikely since it is typically easier to write one's...
5
by: xxdecieverxx | last post by:
Im making a site... i need to know how to make a window... such as jus a normal windo where i can write text on my site and also have a scro bar on it... almost exactly like this window im typing...
3
by: theintrepidfox | last post by:
Dear Group I'd be grateful if you can give me some advice on the following. An application I wrote uses an MSDE backend and I wonder whether there's a way (even for the system administrator) of...
2
by: Robert Misiak | last post by:
Is it possible to display a window on top without it stealing focus? (and I'm not talking about stealing focus from my application - I'm talking about it stealing focus from any application.) ...
8
by: carriolan | last post by:
Hi I have an MS Access based application almost ready for distribution to the public and I find that even though I have compiled it into an MDE file, tables and queries can still be be imported if...
44
by: Jeff | last post by:
Hi I have a library mde that is used with some customer databases and I found out that another developer discovered it while doing some maintenance work on an old database for the same customer...
2
by: Tom Baxter | last post by:
Hi everyone, I have a small block of code that encrypts a database connection string in a ..config file, but I'm not sure where the encryption key comes from. There is no problem with this code...
2
by: Mohit | last post by:
Hi Experts, I am working on a windows application that generates few text files and saves it onto the disk. Now I want that only my application can read the files i.e. I don't want the user to...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.