Jquery selector obfuscation (1); jquery selector Obfuscation
Summary: I was not familiar with jquery's selector. After many tests today, I have some answers to the confusion.
The quotation marks are separated by spaces to indicate selection.Internal elements of the previous ElementWithout spaces, all content is used to select the same (class) element.
For example, $ (". a. B") isClass = "a B",
$ (". A. B")
Http://www.oschina.net/project/tag/167/code-confusion?lang=19sort=view
Java obfuscation device Proguard
Proguard is a free Java class file for compression, optimization, and mixer. It deletes the classes, fields, methods, and properties that are not used. Maximize bytecode optimization by using short, meaningless names to rename classes, fields, and methods. Eclipse has integrated the Proguard. More Proguard Information
Last
Original: Open source. NET Obfuscation Confuserex IntroductionToday we introduce an open source. NET Obfuscation--confuserexhttp://yck1509.github.io/ConfuserEx/Due to the use of. NET obfuscation in the project, there are many online searches, such as Dotfuscator, Xeoncode, Foxit and so on.But most of the charges, of course, there are cracked version of the compan
List of commonly used tools [more common]
Obfuscation, encryption
Dotfuscator
vs Default with the tool, but a Community editionNot very strong
DotNET Reactor
used the form of nativecode and confusion
Xenocode PostBuild
Professional tools
{smartassembly}. Setup.msi
Anti-compilation Tool
Reflector
One of the most prestigious tools,
Software Security and copyright protection are important at any time, especially for enterprise-level development or some special applications. This article mainly discusses signature and obfuscation, principles, and ideas on how to secure development under the. NET platform.
Signature
Strong namingProgramSet to ensure that your assembly is unique without being tampered with or fraudulent use, even if the Assembly with the same name is different i
List of commonly used tools [more common]
Obfuscation, encryption
Dotfuscator
vs Default with the tool, but a Community editionNot very strong
DotNET Reactor
used the form of nativecode and confusion
Xenocode PostBuild
Professional tools
{smartassembly}. Setup.msi
Anti-compilation Tool
Reflector
One of the most prestigious tools,
Today we introduce an open source. NET Obfuscation--confuserexhttp://yck1509.github.io/ConfuserEx/Due to the use of. NET obfuscation in the project, there are many online searches, such as Dotfuscator, Xeoncode, Foxit and so on.But most of the charges, of course, there are cracked version of the company requirements can not use pirated software.Find a half-day finally found Confuserex, use up also line, hur
Source: javascriptOnlineObfuscator http://www.BizStruct.cn/JavascriptOnlineObfuscator
Objective of Javascript code obfuscation
Javascript is a script language for interpretation and execution. It is mainly used in browsers of clients in the Web field. Due to the characteristics of Javascript interpretation and execution, the Code must be downloaded to the client in plain text, debugging is easy, making it very difficult to protect Javascript code;
Di
Source: javascriptOnlineObfuscator http://www.BizStruct.cn/JavascriptOnlineObfuscator
Objective of Javascript code obfuscation
Javascript is a script language for interpretation and execution. It is mainly used in browsers of clients in the Web field. Due to the characteristics of Javascript interpretation and execution, the Code must be downloaded to the client in plain text, debugging is easy, making it very difficult to protect Javascript code;
Dif
Today we introduce an open source. NET Obfuscation--confuserexhttp://yck1509.github.io/ConfuserEx/Due to the use of. NET obfuscation in the project, there are many online searches, such as Dotfuscator, Xeoncode, Foxit and so on.But most of the charges, of course, there are cracked version of the company requirements can not use pirated software.Find a half-day finally found Confuserex, use up also line, hur
Software Security and copyright protection are important at any time, especially for enterprise-level development or some special applications. This article mainly discusses signature and obfuscation, principles, and ideas on how to secure development under the. NET platform.
Signature
That is, a strongly-named Assembly ensures that your assembly is unique without being tampered with or exploited. Even if the Assembly with the same name has different
Previously learned to confuse the encryption tool Xenocode, the following record of the xenocode2010 code confused operation steps, we refer to the use of itThe steps are as follows: 1, select Application Label 2, click Add button, load to confuse DLL, EXE file 3, if it is DLL file then select the second item in preset list box, select the first item 4, click Apply Button 5, select Prote CT Label 6, click t
The topic of code obfuscation for iOS application security is divided into the following chapters:
1.iOS Application Safety Code obfuscation design article
2.iOS Application Security Code obfuscation implementation Chapter
The security of iOS application is becoming more and more important with the exposure of various events. What can be done about the security
Today we introduce an open source. NET Obfuscation--confuserexhttp://yck1509.github.io/ConfuserEx/Due to the use of. NET obfuscation in the project, there are many online searches, such as Dotfuscator, Xeoncode, Foxit and so on.But most of the charges, of course, there are cracked version of the company requirements can not use pirated software.Find a half-day finally found Confuserex, use up also line, hur
Signature
That is, a strongly-named Assembly ensures that your assembly is unique without being tampered with or exploited. Even if the Assembly with the same name has different signatures.
Comparison of assembly structure before and after signature
Assume that the Assembly name is"WindowsApplication1", Assembly information comparison before and after signatureCopy codeThe Code is as follows:WindowsApplication1, Version = 1.0.0.0, Culture = neutral, PublicKeyToken = nullWindowsApplication1, Ver
Obfuscation is currently dominant in DOTNET protection. Name obfuscation is the most basic obfuscation protection technology.The DOTNET encryption and protection tool maxtocode has also added obfuscation protection-name obfuscation in recent updates.
Let's talk about name
my attention. Unlike the reflection we usually use, it implements direct modification of the assembly code, which is much more advanced than the binary file of the hexadecimal tool to modify the EXE/DLL. After all, it is the original.. Net code, which can be directly debugged to observe the implementation process. Please be careful. Find strings, a utility above systeminternal, which can extract the string content from the PE file.
The idea was open
List of commonly used tools [more common]
Obfuscators, encryption
Dotfuscator
Vs default tool, butCommunityVersionLow Intensity
DOTNET Reactor
Nativecode and obfuscation are used
Xenocode postbuild
Professional tools
{Smartassembly}. setup. MSI
Decompilation Tool
Reflector
One of the most prestigious tools, many open-source plug-ins
, such as the time limit and the number of times of use.
So how can we protect our programs from being modified?
During the past two days, compilation, decompilation, and obfuscation were performed. Summary:
1. Add a strong signature to the project. Procedure: Right-click the project, select Properties, find the signature tab, create a signature file, and enter the password.
2. After the project is released, the
1. Definition and distinction of the threecompression : Delete all comments in Javascript code, tick mark, line break symbol and useless space, thus compressing JS file size, optimize page loading speed.obfuscation : by encoding variable and function names into meaningless names (such as function (A,B,C,E,G), etc.), to prevent others from peeking and stealing Javascript source code, but also a certain compression effect.Encryption : The general use of the Eval method of encryption, the effect an
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.