files are managed inside your project (and also version controlled ).
Proguard allows to highly customize the obfuscation process. You can add cunfiguration statements toProguard. cfgFile. SeeA http://proguard.sourceforge.net/manual/usage.html for valid configuration parameters.
3. obfuscate your code
It's time to use your obfuscator. As it is embedded into the built process eclipse runs the obfuscator wh
The author of the article "obfuscate an Android Application" describes how to confuse programs on the Android platform and give ant build. XML file. After testing, we found that some target items were missing, and errors occurred in ipvs. Later, we combined the zxing open-source project build. the XML file is finally obfuscated successfully, and the project package is reduced a lot.
Here are some important notes that do not provide source
Location code in order to make each Chinese character has a national uniform code, Location code is the state 94*94 a square, where each row is called a zone, each column is called a bit, combined together to form a location code, we can query the relevant site of a Chinese character location
Due to work needs, these two days and colleagues in the study of the use of Proguard tools under Android, by looking at the Android website on the introduction of the tool and other relevant information on the network, coupled with their own hands-on practice, is a basic understanding. The following will be their own understanding and understanding of a brief note, there are objections or puzzled, you can directly leave a message.What is the Proguard tool?
Proguard is a free tool provided
Data Representation-source code, reverse code, complement code, transfer code, and reverse Code complement
So far, we have learned the numbers used in decimal, binary, octal, and hexadecimal notation to represent the actual values. These numbers are called true values, which
1 First is how to use the Web page in your own app, so that you can quickly update the interface without having to upgrade the client, the method is as follows:XML file:2 binding Web pages in activity:public class Mainactivity extends Actionbaractivity {private WebView web; @Override protected void OnCreate (Bundle savedinstancestate) {super.oncreate (savedinstancestate); Setcontentview (R.layout.activity_main); web= (WebView) Findviewbyid (R.ID.WEB_V); Equiva
Phprequire_once' String.func.php ';//Verify code via GD library/** * Add validation text * @param int $type * @param int $length*/functionBuildrandomstring ($type=1,$length=4){ $row=''; if($type==1){ $row=Join('',Range(0, 9)); }Elseif($type==2){ $row=Join('',Array_merge(Range(' A ', ' Z '),Range(' A ', ' Z '))); }Elseif($type==3){ $row=Join('',Array_merge(Range(' A ', ' Z '),Range(' A ', ' Z '),Range(0, 9))); }; $row=Str_shu
Due to work needs, these two days and colleagues in the study of the use of Proguard tools under Android, by looking at the Android website on the introduction of the tool and other relevant information on the network, coupled with their own hands-on practice, is a basic understanding. The following will be their own understanding and understanding of a brief note, there are objections or puzzled, you can directly leave a message.What is the Proguard tool?
Proguard is a free tool provided
{
System.out.println ("A static");
}
}/*
A StaticStatic BI ' M A classI ' M B class*/
Common code blocks in Java, building code blocks, static code block differences, and code examplesOrder of execution: (priority is from high to low.) The static code block >mian met
Optimize programs through Java code specifications, optimize memory usage, and prevent memory leaks
The resources available to the program (memory, CPU time, network bandwidth, etc.) are limited, and the purpose of optimization is to allow the program to complete the scheduled tasks with as few resources as possible. Optimization typically involves two things: reducing the size of your code and increasing
In recent projects, project source code confidentiality issues are involved, because the code is written in C #, easy to decompile, so the decision to extract the core algorithm part of the use of C + + writing, C + + so far seems to have not been very good decompile, of course, if you are a disassembly master, perhaps it is possible to decompile. This means that C # managed
I just accidentally sawCodeObfuscator. For later use.
1. dotfuscator
Dotfuscator is a built-in code obfuscator in vs. Vs -- tool -- dotfuscator community Edition
Specific Use method, and the confusion effect, can refer to: http://blog.csdn.net/netjxz/archive/2006/12/12/1439866.aspx
2.. Net Reactor
. Net reactor, which is very small and free of installation and does not need to be registered. He only changes the
//can be used, this program is to convert text into the in-machine code. In-Machine code = GB Code +8080h, but study. //This program is the use of Chinese characters in the machine output is the principle of in-machine code, directly saved, in fact, quite simple. //input A string of Chinese characters and numbers of
Common code blocks in Java, building blocks of code, static code block differences, and code examplesThe static code block and the execution of the constructor sequence, has been very confused, read Sun Weichen teacher's "Java Object-oriented programming" and the teacher's J
Common code blocks in Java, building blocks of code, static code block differences, and code examples from: http://www.cnblogs.com/sophine/p/3531282.htmlExecution order: (Priority from high to low.) Static code block >mian method > construct
Execution order: (Priority from high to low.) Static code block >mian method > construct code block > Construct method.Where static code blocks are executed only once. The construction code block executes every time the object is created.1, ordinary code block1//Common
Common Code blocks in Java. Construct code blocks. Differences between static code blocks and code examples. java examples.
Execution sequence: (the priority ranges from high to low .) Static code block> mian method> constructor code
First, Location codeIn order to adapt to the need of computer processing Chinese character information, China promulgated the GB2312 National Standard in 1981. The standard selects 6,763 commonly used Chinese characters (among them, the first class commonly used Chinese characters 3,755, two Chinese characters 3,008) and 682 non-Chinese characters, and has stipulated the standard code for each character, in order to carry on the Chinese text exchange
The source code, the anti-code, the re-code, and the reason for using the anti-code and the re-code.
The original blog website has no intention of infringement, but it is convenient to remember it for later review,
Http://www.cnblogs.com/zhangziqiu/archive/2011/03/30/Compute
Learn Java in ...Just learned the Java code block, although very simple or write it down!left Sound 2016-03-16-----------------Execution priority: Static code block > Mian Method > Construct code block > Construction MethodStatic code blocks are executed once, regardless of whether they are instantiated, and do not rep
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.