. NET Reactor Learning Series (ii) functional descriptions of the---. net reactor interface

Source: Internet
Author: User
Tags compact stack trace

After installing. NET reactor, you can find the Help document Reactor_help.chm in the installation directory, there is no Chinese version, which details the features and usage scenarios of. NET reactor. This series of articles is written based on this help document.

The. NET reactor has three main panels:

Menu Panel:

- Documents

    • It's normal. Create an operating environment, open an operating environment, load assemblies, and more

-Run

    • Protect Assembly-Performs a protection operation on the currently selected assembly
    • Create a license file-Create a license file based on the user's configuration

-Tools

    • Hardware ID Tool Generator-Create a HID.exe file to generate the corresponding encoding based on the machine hardware
    • License Examiner-License checking tool
    • License invalidation tool-license deprecation tools
    • Stack Trace deobfuscator-do not introduce
    • ShareIt Module Generator-project configuration Sharing tool

-Protection configuration-configures how the program needs to be protected (equivalent to a configuration template)

-Help

The task panel is equivalent to the Quick Action Panel main panel main panels include loading assemblies, settings, license management,. NET Methods View
Load Assemblies: the consolidated functionality is configured here and must have a main assembly, which is the integration of additional assemblies into this assembly. Additional assemblies can be embedded in a way or in an integrated manner. If you choose an integrated approach, it is recommended that only consolidation (not protected) be checked. The following quick settings are some of the configurations for consolidating protection. Settings are divided into general settings, protection settings, software restriction settings, and Popup interface settings
General Settings
mainly include compression configuration, interface style configuration, generate the target file configuration, start whether to display the loading interface configuration. To know the specific features of the configuration can be configured with the mouse click, the following description panel will appear corresponding instructions.
  • Automatic Exception handling-Auto Catch error
  • Compression-Compressed files reduce footprint and bandwidth in network environments
  • Show Loading screen-protected file startup displays the load progress bar (because the protected file starts with the. NET reactor injected code, including the find certificate, etc.)
  • Digital Certificate-Certificate protection
  • Enable Visual styles-whether the system interface style is enabled
  • Force Admin privileges-requires system administrator privileges to run
  • Merge assemblies-whether to allow consolidated DLLs
  • Embed assemblies-whether to allow embedded DLLs
  • Strong Name Key Pair File-Strong signed assembly
  • Target File-Generate directory
Protection Settings

Protection options for the main configuration software

The necrobit feature prevents programs from being deserialized (for example,. NET reflector), but does not support the. NET Compact Framework

  • Anti tampering-prevent hackers from using tools to modify your software, binary integrity checks before running
  • Resource Encryption & Compression-compresses and encrypts managed resources, and the runtime automatically extracts and decrypts resources
  • Suppress Decompilation/anti ILDASM-prevent decompile and disassembly
  • Native exe file-Generate a local x86 EXE as a root embedded program to prevent decompile
  • Pre-jit Methods-by native EXE File and Necrobit plug-ins, some small methods such as Getters/setters Direct Machine code to prevent the assembly from being modified
  • Necrobit-replace CIL code with encrypted code to prevent decompile
  • Obfuscation-replace variable names, method names, and so on to confuse code
      • Create Mapping File                           + Nbsp; -allows you to create a mapped file that has obfuscated fields corresponding to the field
      • Enabled                   &NBSP ;                             -  to confuse non-punlic Class and member names
      • obfuscate public Types                      &NBSP ;-confusing names of all types and members
      • Incremental obfuscation                     &N bsp;-intelligently specify the name of the confusion
      • exclusions                                               -exclude a type without confusion
      • use Unprintabl E characters                -confusing with garbled
  • Control Flow Obfuscation-a way to confuse
  • String encryption-encrypted string
  • Strong name Reomoval Protection-strong named protection
Software restriction Settings

This setting restricts the use of the software. This includes limiting usage times, limiting usage time, and so on. When the limit is reached, expired information pops up and requires a license

Note: This configuration is not valid for the Compact Framework, Silverlight, and Mono

  • Expire when all Expired-if all files expire, stop software use
  • Inbuilt lock-evaluation Period-limit software continuous use time
  • Inbuilt lock-expiration Date-Limit software usage days
  • Inbuilt lock-number of Uses-Limit number of software usage
  • Max number of Instances-limit software concurrency (same machine)
  • Nag screen-If there is no license, the software prompts for relevant restrictions when it starts, such as "You have used 1 times, use up to 10 times"
  • Run another process after expiration-expired whether to execute other programs, usually run the payment procedure
  • Run without License File-whether a license is required
  • Shut down process after expiration-whether to close processes when they expire
  • Static License filename-Sets the suffix name of the license, when empty, to search for *.license licenses by default, to prevent conflicts from being allowed. LIC is the suffix name.
pop-up interface settings
software uses the interface box related configuration that pops up the prompt when it expires, as
Certificate Management

When the client software is used out of date, you need to purchase a license file at this point. This interface is used to generate licenses. The build license can also be configured to set the past time of the license, the number of uses, whether it is specific to the computer, etc.

Where a specific computer needs to use HID tools to obtain a specific computer hardware corresponding encoding, and then configure, HID tool in the Tools->hardware ID tool Generator, generate HID.exe, and then run HID.exe A hardware-corresponding encoding file is generated in the same directory.

. net method to view the name of the execution method that primarily views the DLL

. NET Reactor Learning Series (ii) functional descriptions of the---. net reactor interface

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.