NET reactor encryption source software security-net reactor use tutorial

Source: Internet
Author: User

The last introduction uses Xenocode PostBuild for. NET to confuse the encryption source code to ensure the software security, this article will discuss uses the Eziriz. NET Reactor to confuse the source code of the encryption software, to share the NET Reactor use method for the user who has never used the software encryption, That is the usual use of net reactor tutorial.

Or that sentence, with tool encryption can not absolutely ensure that software security, but can hinder most people to crack out of the software source code, in a certain program to ensure software security.

The main functions of Eziriz. NET Reactor include: Necrobit IL (to unmanaged code), anti-ILDASM (anti-compiler), obfuscation code, merging, compressing source, supporting command line, etc., supporting all. NET frameworks and almost all development languages, such as C #, C++.net , vb.net, Delphi.NET, J #, and so on.

NET reactor tutorial (encrypted source code example)

1. Open Eziriz. NET Reactor, which is shown in main interface 1:

Figure 1

2. Click Open on the right of Main Assembly, select the software file to encrypt, EXE or DLL can be.

3, tick the Quick Settings to encrypt the items, each meaning is as follows:

Necrobit: Converting an assembly to unmanaged code;

Native EXE file: Raw cost machine EXE files;

Anti ILDASM: Anti-compilation;

Obfuscation: confusion;

Create Mapping file: creating map files;

Anti tampering: tamper proof;

String encryption: Encrypted characters;

Compress & Encrypt Resources: Compress and encrypt resource;

Control Flowobfuscation: Confuses the controlling flow.

4. Usually tick "necrobit, Anti ILDASM, obfuscation, Anti tampering and String Encryption", 2 shows:

Figure 2

5, select the Protect in the Actions menu, the encryption is started, after the encryption is completed in the source file in the same directory to generate an encrypted file, the file as a software release program to ensure software security on a certain program.

6, if you want to set the specific, then select the Settings tab, according to the need to set up, 3 shows:

Figure 3

7. You can also create a License (visa) file, select the License Manager tab, and click New on the right of Master Key to generate a fresh key,4 as shown:

Figure 4

Click Create License to enter a file name to generate a visa file.

The above is a simple net reactor tutorial, to the 6th step has been completed encryption, the next two steps are optional, according to the need to choose.

NET reactor encryption source software security-net reactor use tutorial

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.