Net reactor encryption source code to ensure software security-net reactor tutorial,-netreactor

Source: Internet
Author: User

Net reactor encryption source code to ensure software security-net reactor tutorial,-netreactor

The last time we used Xenocode Postbuild. NET obfuscation encryption source code to ensure software security, this article will discuss the use of Eziriz. NET Reactor obfuscated with the source code of the encryption software. for users who have never used the software encryption, share the net reactor usage method, that is, the net reactor usage tutorial.

In other words, tool encryption cannot absolutely ensure software security, but can prevent most people from cracking the software source code and ensure software security in certain programs.

Eziriz. NET Reactor's main functions include: NecroBit IL (converted to unmanaged code), ILDASM (Anti-compiler), obfuscation code, merging, compressing source code, supporting command lines, etc.. NET Framework and almost all development languages, such as C #, C ++. NET, VB. NET, Delphi. NET, J #, and so on.

 

Net reactor tutorial (example of encryption source code)

1. Open Eziriz. NET Reactor. The main interface 1 is shown below:

Figure 1

2. Click Open on the Right of Main Assembly, and select the software file to be encrypted, exe or dll.

 

3. Select the items to be encrypted under Quick Settings. The meaning of each item is as follows:

NecroBit: converts an assembly into unmanaged code;

Native Exe File: generate the local Exe File;

Anti ILDASM: decompilation;

Obfuscation: Obfuscation;

Create Mapping File: Creates a map File;

Anti-Tampering: Anti-Tampering;

String Encryption: Encrypted character;

Compress & Encrypt Resources: compresses and encrypts Resources;

Control FlowObfuscation: obfuscated Control flow.

 

4. Check "NecroBit, Anti ILDASM, Obfuscation, Anti Tampering, and String Encryption", as shown in Figure 2:

Figure 2

5. Select Protect from the menu of Actions to start encryption. After encryption is completed, an encrypted file is generated in the same directory of the source file, this file can be used as a software release program to ensure software security.

 

6. If you want to set the Settings, select the Settings tab and set it as needed, as shown in 3:

Figure 3

7. You can also create a License (Visa) file, select the License Manager tab, and click New on the right of the Master Key to generate a New Key, as shown in Figure 4:

Figure 4

Click Create License and enter a file name to generate a Visa file.

 

The above is a simple net reactor tutorial. Encryption has been completed in step 1. The next two steps are optional and can be selected as needed.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.