Java obfuscator logging guard
Java obfuscators retroguard-v2.3.1JavaCodeThe. Class generated after compilation containsSource codeAll information in (excluding comments), especially when debugging information is saved. Therefore, a normally compiled java. Class file can be decompiled very easily. There are many decom
* { native
(2) introduce the Gson package
##---------------Begin: proguard configuration for Gson ---------- # Gson uses generic type information stored in a class file when working with fields. Proguard # removes such information by default, so configure it to keep all of it. -keepattributes Signature # Gson specific classes -keep class sun.misc.Unsafe { *; } -keep class com.google.gson.stream.** { *; } -keep class com.google.gson.examples.android.model.** { *; } -keep class
Introduction:Front-end code is a direct burst in the browser, many web attacks are directly debug business logic to find vulnerabilities to attack, in addition to some like "for nothing" molecular violence to steal other people's web page simple modification to profit, overall is the front-end logic is too easy to read, This article mainly based on JavaScript obfuscator introduce the basic idea of front-end confusion.First, JavaScript
Because of the requirements of the project, the C code needs to be confused. The. NET and Java obfuscation tools are now very useful. But there are not many C obfuscation tools.Find a Stunnix C + + obfuscator http://www.stunnix.com/There are few tutorials on the web, only slowly groping.The official website can download the trial version.1. Open after installation that's it.2. There are only three main menu
This is a page prepared for the English readers, simplified Chinese and links to sites not reproduced
PowerBuilder PBD obfuscator 2010.05.4
Pbobfuscator v2010.05.4
Keyword:
Obfuscator, pbprotect, PowerBuilder obfuscator, decomplier, pbguard, PowerBuilder protect, depb, shudepb, decompiler, pbkiller, pbprotect
My-site: http://www.mis2erp.com/soft/PowerbuilderP
Proguard is a cool obfuscator and shrinking tool (shrinker, please let me know if you have a better translation method ). In addition to obfuscation and protection of your code, it can also automatically detect and delete unused classes, methods, and data members, and remove the package hierarchy, minimize your jar package.Another notable significance of using proguard is that it can automatically delete unused parts, so you can safely use module-Leve
Free. netframework obfuscation tool Babel obfuscator GuiThe GUI tool of Babel obfuscatorThis tools support Babel obfuscator 1.3 and later:Most of the tools I found that can be used to obfuscate Silverlight Code are not free. but the Babel obfuscator by Albert to ferrazzoli is an open source. net obfuscator that can be
Android_Proguard code obfuscator
1. obfuscators Overview
Is an important protection method.
Obfuscators are integrated into android build systems, so you do not have to call them manually. At the same time, obfuscators run only when building applications in release mode, so you do not have to deal with obfuscation code when building a program in debug mode. This document describes how to enable and configure obfuscators, and decode the stack trace
Obfuscator. SCX, obfuscator, which can be downloaded.
Work logic:(1) Select the source directory and source file (PRG/VCX/SCX ).Note:: Variables are obfuscated only when they are defined by local or lparameters..(2) select the target directory (which must not have the same name as the source file)(3) copy the source directory file to the target directory, and then enable obfuscation.
This logic avoids m
Spices. NET obfuscator controls are used to prevent your. NET software from being reverse-engineered, tampered with, or unauthorized to use by hackers, competitors, or prying eyes, and this tool is available. NET code obfuscation, protection and optimization, etc., to fully protect your. NET code and data security. Spices.net Obfuscator re-build your. NET assembly is a new format that cannot be disassembled
Spices. NET obfuscator controls are used to prevent your. NET software from being reverse-engineered, tampered with, or unauthorized to use by hackers, competitors, or prying eyes, and this tool is available. NET code obfuscation, protection and optimization, etc., to fully protect your. NET code and data security. Spices.net Obfuscator re-build your. NET assembly is a new format that cannot be disassembled
Http://msdn.microsoft.com/zh-cn/library/ms227241.aspx
. Net obfuscator -- dotfuscator community edition by preemptive Solutions
Independent GUI Quick Start
Content type: Devdiv2. Transform: orcas2mtps.xslt. -->
This section describes how to use the independent GUI of dotfuscator. For a complete guide to the dotfuscator user interface, see GUI reference. Step 1 -- start dotfuscator Gui
Click Start |Program"|" Preempti
How to Use xenocode
Usage 1:
1. Clarification: obfuscation, encryption, or obfuscation! = Encryption2. Import the DOTNET program or assembly file (. dll/. EXE) to be encrypted)3. Select "Protect" on the second tab"4. Click "select
Shanhai software production line (Personal Edition
,
Abbreviation
Pspl
) Is
Sea
Architecture
C #
Development platform.
Used for individual developers to develop standalone andC/SAnd provide related tool support for the software
Http://www.javascript-source.com/
Before Obfuscation
Copy
Save
// Detect which browser is used VaR Detect = navigator. useragent. tolowercase (); VaR OS, browser, version, total, thestring; If (Checkit ( 'Konqueror' ) {Browser =
Java tutorial translation Sequence Java Introduction Build a JSE development environment-install JDK and eclipse Language basics Java Hello World Program Analysis Variable Java Variables Java Native type Conversion of Java
When we develop java, we usually encounter code problems that protect our development. Because java is based on jvm, it is easy to decompile class files. Assume that we have developed a web program and released it to the customer. In fact, the customer can easily decompile our source code, including all src files and jsp files.
In fact, there are several methods to protect our source code: 1. Use the code
(Cai?). , as long as he can launch the source code through the counter compiler, your smart property is likely to be violated. To protect yourself, you have to reverse-compile the Java or. NET software before shipping it, which is often called obfuscation (obfuscate). The confusing program code, still follows the original file format and instruction set, so it can still execute, and the execution result is the same as before the confusion. Only th
Mondrian
DBMS
An OLAP engine written in Java, uses MDX, xmlfora, jolap
Mysqlconnectorj
DBMS
JDBC connector to MySQL
Netbeans, sun
Dev
A very good, free, open source Java ide
Netbeans has improved dramatically; see Book netbeans guide and review.
Openforbiz
App
General retail busines application software written
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.