Comparison of several software encryption/shelling tools

Source: Internet
Author: User

Several.. Net encryption/shelling tools. NET programmers all know that ,. NET is a huge progress across the age. It has a high development efficiency, strong functionality, interface view, durability, and a new language. C # It has been submitted to industry specifications, and the CLR has a wide range of common public transportation library resources, all these features indicate that it is inevitable to become a mainstream programming language. However, it also has a disadvantage, that is, the compiled assembly can be completely decompiled into the source code, which provides a good opportunity for some criminals to think about it, the result of your hard work has been given to others, so how to protect our intellectual property rights has become a big problem. Once decompiled, the Intellectual Property Rights we obtain after hard work are easily exploited by others. Therefore, we need to select a good encryption tool to protect our intellectual property rights. We believe that, as a mature encryption tool, it should have the following basic parameters: 1: Program Encryption: obfuscation of source code, protection of applications and their dynamic link libraries 2: ease of operation: user-friendly, easy to operate 3: Efficiency of program execution after encryption: requirements are basically unaffected 4: supported Operating Systems: Xp, window2003, Win7, WinSta, winCE5: have a good authorization management system 1) set the expiration date 2) Limit the number of days available for a software installation 3) Limit the number of users of the software 5: the stability of the program after encryption is not affected, that is, the source program does not report errors or exceptions. 6: good after-sales service common encryption tools Advantages 1: plug-ins can be embedded in VS 20082: can integrate the license authorization system into your application, expansion of its authorization function has a complete authorization management system disadvantages 1: If the deployment environment is a virtual host, you need to authorize the system administrator to access the normal 2: does not support the WinCE Operating System 1: software vendors outside China may not be able to keep up with after-sales services 2: 360 suspicious programs detected by anti-virus software 1: There are quite a lot of development documents and it is troublesome to use 2: it uses electronic authorization, if the network is disconnected, problems may occur. 3. Other Windows CE encryption tools are not supported. 1. dotfuscator Community Edition: Something recommended by Microsoft, but some people think it is very bad and attackers can crack it. 2. XenoCode: Someone has the best obfuscator, but some netizens can crack it. After comparison, I think the NET Reactor is a relatively good DOTNET encryption tool attachment: Software encryption software shelling:

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.