file removes some restrictions of the program, such as the time limit and the number of times of use.
how do we protect our programs from being modified? compilation, decompilation, and obfuscation have been performed in the past two days. Summary: Add a strong signature to the project. Procedure: Right-click the project, select Properties, find the signature tab, create a signature file, and enter the password. after the project is released, the DLL and exe files will be confused. obfusca
Now I will give a general summary of my daily work. In the morning, I will mainly study the official documents and instances of ArcGIS API for flex 1.3, whether the version is 1.2 or 1.3, previously, I had a superficial understanding of ArcGIS flex APIs. I just learned a little from the official example, because I didn't see the document or have fewer practical opportunities, so I took a lot of detours. Shortcuts exist. Read the official documentation to learn more about using ArcGIS flex APIs.
prevent cracking. In fact, this sentence is only half correct. This can only increase the difficulty of cracking the registration machine and cannot prevent the attack. Why? Because the registration is correct, it is still necessary to make judgments in the DOTNET program, so as long as you get rid of this judgment, it achieves the same cracking effect. However, if you want to analyze the registration algorithm, it is difficult.
Third-party protection toolsNext, let's talk about third-party p
There are currently two articles on string research.
Principles: Application of string obfuscation Technology in. Net Program protection and how to decrypt obfuscated strings
Practice: String anti-obfuscation practices dotfuscator 4.9 string encryption technology Countermeasures
The third article is about how to apply the content learned above and design a string obfuscation program.
First, design a console program, which is the Assembly file to be ob
the IL source code to obtain a modified target file, which removes some restrictions of the program, such as the time limit and the number of times of use.
So how can we protect our programs from being modified?
During the past two days, compilation, decompilation, and obfuscation were performed. Summary:
1. Add a strong signature to the project. Procedure: Right-click the project, select Properties, find the signature tab, create a signature file, and enter the password.
2. After the proje
people see halo, but does not change the program execution logic. I use the dotfuscator here to confuse. Dotfuscator Obfuscation method: 1. Create a new project; 2. Select the DLL, EXE file to be confused; 3. Select the library attribute in the attribute (it is important, because I would like to confuse the DLL file, if not selected, the confusion will not be properly called!) ) as shown in: 4. Select the
Studio (called Vs.net 2003, code name Everett) integrates a fuzzy tool that Microsoft recommends to use to finalize the. NET Intermediate code. This fuzzy device is another tool Dotfuscator's so-called lite version. The Dotfuscator feature, produced by Preemptive Solutions, is more powerful, and the company, located in Cleveland, Northeast Ohio, initially developed a fuzzy technology for Java code. The Dotfuscato
Original text: String obfuscation technology application design a string obfuscation program can be confusing. NET assembly strings in theThere are currently two articles on the study of strings. Principle: string obfuscation techniques in. NET program protection and how to decrypt the obfuscated string Practice: String anti-aliasing actual combat Dotfuscator 4.9 string encryption technology coping strategies Today's third article, how to apply the ab
.cnblogs.com/blog/114084/201601/114084-20160109223558809-645884957.jpg "/>2. IlspyIlspy is a very good. NET Platform Anti-compilation software, using Ilspy, can easily decompile C # and VB programs, the software itself is a C # program, is an open source software.650) this.width=650; "src=" Http://images2015.cnblogs.com/blog/114084/201601/114084-20160109223620465-967915736.png "/>3. De4dotDe4dot is an open-source. NET Anti-aliasing tool, written in C # based on the GPLV3 protocol, which is a ver
From: http://www.cnblogs.com/rickie/archive/2009/11/13/1602239.html
{Smartassembly }-Confuse your assembly code with the Wizard
Smartassembly provides a method to optimize and confuse your. Net assembly, protect your work and software, reduce the size of the distribution package, and improve program performance. Visual Studio 2003/2005/2008 integrates a small tool for the dotfuscator community edition, which has simple functions and is easy to use.
run the test or Alt + F5 For performance analysis.
Debug optimized native Image
Select Tools-options in Visual Studio
Remove the suppress JIT Optimization on module load and enable just my code options
Of course, some students or projects insist on code obfuscation. As far as I know, the dotfuscator Professional version currently supports WP8 code obfuscation.
Download link http://www.preemptive.com/products/
(TextBlock textBlock)
{
TextBlock. Text = "This is a watermark .";
}
}
Running effect:
You can see the effect of the copyright information attached to the component.
Next, you need to perform a strong name signature on BusinessComponent, right-click the project, and set it as follows:
Create an snk file. This file uses RSA to encrypt information containing the public key and private key. Compilation of this component will compile it.
What is the use of this snk? After a while, you will know.
* Act: Application Center Test, which can be used to simulate a large number of users. Of course, it can also be used as a stress test;
* LoadRunner: This is Mercury's. The above ms, this looks very powerful, a complete set of testing software;
* Was: web application stress is the predecessor of act. Although it is not strong in Act, it is free of charge;
* The NND guy suggested that I use WMV or virtualpc to simulate the entire real environment. I really don't know. I am poor, watching movie
start the test:
Switch to the monitored tests tab and deploy the program to the real machine for testing.
If your application needs to be obfuscated, dotfuscator is recommended, and preemptive solutions works with Microsoft to release a free version that allows you to protect your WP7 application. For details, referArticle Silverlight for Windows Phone 7: dotfuscator-protect your application. After
tools in this case, and I have a little bit of research. 1. Dotfuscator Community edition//vs2005 comes with a trial version, the obfuscation only uses the VS2005 comes with the trial version, basically is the program class, the method, variables, such as name confusion, the individual confusion is not good enough to understand the code method content, and many programs can not be confused, I have a program "resources" inside the connection charac
obfuscation, the simplest confusion is the name confusion, the namespace name, class name, method name, field name, and so on are replaced by special symbols or other symbols, the purpose is to let people see faint, but does not change the program execution logic.
The Dotfuscator I use here is confusing.
Dotfuscator Obfuscation Method:
1. Create new projects;
2. Select the DLL and EXE file to be confus
-related data in Silverlight. In addition, you can encrypt or confuse the generated assembly. Encryption means that the decompilation tool cannot decompile the source code by leveraging some features of the MSIL command, obfuscation is to change the variable name and method name in the Assembly, so that it does not have the characteristics of understanding, so that even if the source code is decompiled, it is hard to read. In VS, a Community version of the code obfuscation tool
DevForce of IdeaBlade is a developer productivity solution built for Microsoft. NET Framework applications. DevForce is a "essential tool" for developing and deploying. NET applications ". With its integrated infrastructure components, application servers, design tools, and comprehensive service support, you can create powerful. NET Enterprise Applications on schedule within the budget.
Devinspect developed by SPI Dynamics SPI Dynamics DevInspect simplifies developers' security work by automati
Free. Net obfuscation and decompilation tools
I. netCodeObfuscation
. Net code obfuscation technology:
Symbol renaming
String encryption and Compression
Resource encryption and Compression
Constant literals pruning
Method signatures overload Induction
Class hierarchy linerization
Code control flow Obfuscation
Assemblies merging and embedding
XML documentation Filter
Free. Net code obfuscation tool:
Eazfuscator. net
Http://www.foss.kharkov.ua/g1/projects/eaz
blur the msil intermediate code generated by compilation. The simplest obfuscation is name obfuscation, the purpose of changing the namespace name, class name, method name, field name, and so on to special or other symbols is to make people dizzy, but does not change the program execution logic.
I am using dotfuscator for obfuscation.
Dotfuscator obfuscation method:
1. Create a new project;
2. Sele
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.