473,804 Members | 3,742 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How to protect a dll

I wrote a dll and now I want to protect from mass distribution. What
is the most COST software for doing this, or can it easily be done in
vb.net.
Nov 20 '05
19 3024
* do*****@telus-dot-net.no-spam.invalid (Doknjas) scripsit:
Obfuscation will help protect your intellectual property, but it won't
prevent someone from distributing the latest version of your software
free. All they have to do is decompile, and step through one line at
a time to remove license checks or other checks, and presto - free
code.


I am still waiting for somebody to show me a sample where this has been
done.

--
Herfried K. Wagner [MVP]
<URL:http://dotnet.mvps.org/>
Nov 20 '05 #11
> Cor Ligthertwrote:
[quote:843e7a223 3]Obfuscation will help protect your intellectual
property, but it won't
prevent someone from distributing the latest version of your software free. All they have to do is decompile, and step through one line at a time to remove license checks or other checks, and presto - free
code.

The ability to decompile and step through line-by-line will always
ensure that anyone who wants your software without paying will have
it without paying.

However in my country there is a law, that when you steal a car, the
car is
still be stolen when you repaint it. However maybe that is not
everywhere
the same.

Cor[/quote:843e7a223 3]

Yes, of course - I live in one of the civilized countries also. I'm
just saying there is no safeguard for people wanting to break the
law. It is unfortunately incredibly easy to steal software,
especially software written in .NET.

Nov 20 '05 #12
> Herfried K. Wagner [MVP]wrote:
"]* do*****@telus-dot-net.no-spam.invalid (Doknjas) scripsit:
Obfuscation will help protect your intellectual property, but it won't prevent someone from distributing the latest version of your software free. All they have to do is decompile, and step through one line at a time to remove license checks or other checks, and presto - free
code.

I am still waiting for somebody to show me a sample where this has
been
done.

--
Herfried K. Wagner [MVP]
<URL:http://dotnet.mvps.org/>[/quote:502c6bd43 1]

I see your point, but I'm just saying that (to the original poster),
you're deluding yourself if you think you can protect your .NET app
from being available to someone wanting it. Obfuscation protects
someone from understanding your intellectual approach somewhat, but
the 2-step mindlessly simple process of (a) running the app through a
decompiler and (b) stepping through the resulting source code in
Visual Studio line by line to identify and remove license checks
(even though obfuscation makes them unreadable) is so straightforward
that there is no point in worrying about protecting against it.

Nov 20 '05 #13
Read through the posts and then decided that I'll encrypt my code at
the source level with blowfish encryption. I'll lose some efficiency
but all in all that should make it at least misreable for someone to
figure it out.

I wish this issue would be resolved in the new framework release. We
can always pray.

Had a good laugh "..paint a diff...color." We are a country persons
obscured from a genetically criminal pool = True and Old complaint.
That's why we have the most $$$ floating through our economy....even
when it is bad....
Nov 20 '05 #14
Read through the posts and then decided that I'll encrypt my code at
the source level with blowfish encryption. I'll lose some efficiency
but all in all that should make it at least misreable for someone to
figure it out.

I wish this issue would be resolved in the new framework release. We
can always pray.

Had a good laugh "..paint a diff...color." We are a country persons
obscured from a genetically criminal pool = True and Old complaint.
That's why we have the most $$$ floating through our economy....even
when it is bad....
Nov 20 '05 #15
* pe***@mclinn.co m (Peter) scripsit:
Read through the posts and then decided that I'll encrypt my code at
the source level with blowfish encryption. I'll lose some efficiency
but all in all that should make it at least misreable for someone to
figure it out.


Hopefully, it's not decrypted when loaded into memory...

--
Herfried K. Wagner [MVP]
<URL:http://dotnet.mvps.org/>
Nov 20 '05 #16
* pe***@mclinn.co m (Peter) scripsit:
Read through the posts and then decided that I'll encrypt my code at
the source level with blowfish encryption. I'll lose some efficiency
but all in all that should make it at least misreable for someone to
figure it out.


Hopefully, it's not decrypted when loaded into memory...

--
Herfried K. Wagner [MVP]
<URL:http://dotnet.mvps.org/>
Nov 20 '05 #17
Sorry to be late :)

Steps to protect your software:

1. Don't tell anybody you made it, not even to your mather

2. Don't allow anyone to uses your computer

3. Don't distribute your software (it comes from 1.)

4. Don't connect to internet using the computer where your software resides.

5. Place lots of intruder alarms in your computer room

hope this helps a bit?

Peter wrote:
I wrote a dll and now I want to protect from mass distribution. What
is the most COST software for doing this, or can it easily be done in
vb.net.


Nov 20 '05 #18
Sorry to be late :)

Steps to protect your software:

1. Don't tell anybody you made it, not even to your mather

2. Don't allow anyone to uses your computer

3. Don't distribute your software (it comes from 1.)

4. Don't connect to internet using the computer where your software resides.

5. Place lots of intruder alarms in your computer room

hope this helps a bit?

Peter wrote:
I wrote a dll and now I want to protect from mass distribution. What
is the most COST software for doing this, or can it easily be done in
vb.net.


Nov 20 '05 #19
pe***@mclinn.co m (Peter) wrote in message news:<dc******* *************** ****@posting.go ogle.com>...
I wrote a dll and now I want to protect from mass distribution. What
is the most COST software for doing this, or can it easily be done in
vb.net.


We offer two products that may help protect your .NET intellectual
property. We use them ourselves to protect shipping versions of our
products. You can download free trial versions of both of them from
our website at http://www.junglecreatures.com/ Our Decompiler.NET
product serves both as a decompiler and language translator, and an
obfuscator. The decompiler feature will help you understand how
exposed your obfuscated code may be. Our Deploy.NET product,
compresses your assemblies into a single encrypted archive resource
embedded in loader application that displays your version info. This
adds a second level of protection on disk by loading the unencrypted
obfuscated code in memory only for execution. This doesn't prevent a
memory dump of process memory, but it makes it much more difficult for
someone to hack your obfuscated code using a debugger. Deploy.NET will
take advantage of secure computing hardware when it is available so it
will be possible soon to load the executable unencrypted code into a
memory space held private by the OS that supports execution but not
read, and prevents other processes for loading concurrently with the
protected application.

Go ahead and try both products for free by downloading them from
http://www.junglecreatures.com/

Jonathan Pierce
President
Jungle Creatures, Inc.
http://www.junglecreatures.com/
Nov 20 '05 #20

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
384
by: YK | last post by:
All, What is the best way to protect IL code? --------------------------------------------------- Typical scenario: Visual Studio .NET 2003 includes Dotfuscator Community Edition, which intends to protect IL code. However, many .NET applications use data binding in UI forms. For example: Employee e = new Employee();
11
3371
by: siliconmike | last post by:
Is there a way to protect data files from access by root ? I have a data-centered website and would like to protect data piracy from any foot-loose hosting company employee. Any ideas? Thanks Mike
3
14001
by: Parham | last post by:
Hello, How to protect structures(Tables,SP,Views and Functions) of a SQL Server Database?(Password protect a database file) I have a SQL database that will distribute with my application, I want to protects it's structure from my appliction users. Only my application can access the database. Thanks
29
2787
by: Frank Millman | last post by:
Hi all I am writing a multi-user accounting/business system. Data is stored in a database (PostgreSQL on Linux, SQL Server on Windows). I have written a Python program to run on the client, which uses wxPython as a gui, and connects to the database via TCP/IP. The client program contains all the authentication and business logic. It has dawned on me that anyone can bypass this by modifying the program. As it is written in Python, with...
3
3334
by: Narlen | last post by:
Hi there, I don't know much about web design but I proudly managed to password protect a page on my site. Later I realized that everyone looking at the source in any web browser can see the password. Is there a way to improve this code so that instead of the password people viewing the page source would only see bullets instead of the characters of the password (or hide it alltogether?) Thank you for your help.
15
5091
by: Fady Anwar | last post by:
Hi while browsing the net i noticed that there is sites publishing some software that claim that it can decompile .net applications i didn't bleave it in fact but after trying it i was surprised that i could retrieve my code from my applications after i compile it so i need to know to prevent this from happening to my applications Thanx in advance
22
5835
by: teejayem | last post by:
Hi, I am new to programming with databases and was wanting some help. Is there any way to password protect an access database and access sent sql commands to it via vb.net code? Any help would be much appreciated. Thanks in advanced.
10
539
by: FAQ server | last post by:
----------------------------------------------------------------------- FAQ Topic - How do I protect my javascript code? ----------------------------------------------------------------------- With clientside Javascript you can't as your code is distributed in source form and is easily readable. With JScript, there is the Script Encoder (see MSDN), but this is nothing more than obfuscation. Disabling the right mouse button also does...
7
2347
by: =?Utf-8?B?TWlrZQ==?= | last post by:
Hi. I have an ASP.NET 2.0 web application which contains an Images directory with all website images. How can I prevent other websites from creating img tags with the source as my images? I want to prevent other websites from serving my image. For example - How can I prevent another website from doing this? <img src="http://mywebsitename/images/image1.jpg" Is this possible? Thanks
3
4399
by: Sin Jeong-hun | last post by:
It seems like the Protect() uses the Windows accout information to encrypt data. If I know the user name and the password, can I decrypt it on another PC? If it is not, how about the exported key? On Windows Vista, if file encryption is used, Windows suggests to back up the key. If I import the key on another PC, then can I decrypt a data protected by the Protect() method? Or it is impossible by any means?
0
9571
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10561
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10318
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
10069
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9132
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7608
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6845
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5505
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4277
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.