java obfuscator

Alibabacloud.com offers a wide variety of articles about java obfuscator, easily find your java obfuscator information here online.

Java obfuscator logging guard

Java obfuscator logging guard Java obfuscators retroguard-v2.3.1JavaCodeThe. Class generated after compilation containsSource codeAll information in (excluding comments), especially when debugging information is saved. Therefore, a normally compiled java. Class file can be decompiled very easily. There are many decom

Android_Proguard code obfuscator, androidproguard

* { native (2) introduce the Gson package ##---------------Begin: proguard configuration for Gson ---------- # Gson uses generic type information stored in a class file when working with fields. Proguard # removes such information by default, so configure it to keep all of it. -keepattributes Signature # Gson specific classes -keep class sun.misc.Unsafe { *; } -keep class com.google.gson.stream.** { *; } -keep class com.google.gson.examples.android.model.** { *; } -keep class

Front End obfuscation--javascript obfuscator

Introduction:Front-end code is a direct burst in the browser, many web attacks are directly debug business logic to find vulnerabilities to attack, in addition to some like "for nothing" molecular violence to steal other people's web page simple modification to profit, overall is the front-end logic is too easy to read, This article mainly based on JavaScript obfuscator introduce the basic idea of front-end confusion.First, JavaScript

Stunnix C + + obfuscator usage profile

Because of the requirements of the project, the C code needs to be confused. The. NET and Java obfuscation tools are now very useful. But there are not many C obfuscation tools.Find a Stunnix C + + obfuscator http://www.stunnix.com/There are few tutorials on the web, only slowly groping.The official website can download the trial version.1. Open after installation that's it.2. There are only three main menu

Obfuscator for PowerBuilder and PowerBuilder protect

This is a page prepared for the English readers, simplified Chinese and links to sites not reproduced PowerBuilder PBD obfuscator 2010.05.4 Pbobfuscator v2010.05.4 Keyword: Obfuscator, pbprotect, PowerBuilder obfuscator, decomplier, pbguard, PowerBuilder protect, depb, shudepb, decompiler, pbkiller, pbprotect My-site: http://www.mis2erp.com/soft/PowerbuilderP

Powerful obfuscator proguard

Proguard is a cool obfuscator and shrinking tool (shrinker, please let me know if you have a better translation method ). In addition to obfuscation and protection of your code, it can also automatically detect and delete unused classes, methods, and data members, and remove the package hierarchy, minimize your jar package.Another notable significance of using proguard is that it can automatically delete unused parts, so you can safely use module-Leve

Free. netframework obfuscation tool Babel obfuscator Gui

Free. netframework obfuscation tool Babel obfuscator GuiThe GUI tool of Babel obfuscatorThis tools support Babel obfuscator 1.3 and later:Most of the tools I found that can be used to obfuscate Silverlight Code are not free. but the Babel obfuscator by Albert to ferrazzoli is an open source. net obfuscator that can be

Android_Proguard code obfuscator

Android_Proguard code obfuscator 1. obfuscators Overview Is an important protection method. Obfuscators are integrated into android build systems, so you do not have to call them manually. At the same time, obfuscators run only when building applications in release mode, so you do not have to deal with obfuscation code when building a program in debug mode. This document describes how to enable and configure obfuscators, and decode the stack trace

VFP Common Code (VCX/SCX/PRG) obfuscator, you can download

Obfuscator. SCX, obfuscator, which can be downloaded. Work logic:(1) Select the source directory and source file (PRG/VCX/SCX ).Note:: Variables are obfuscated only when they are defined by local or lparameters..(2) select the target directory (which must not have the same name as the source file)(3) copy the source directory file to the target directory, and then enable obfuscation. This logic avoids m

. NET code obfuscation, protection, and optimization controls spices. NET Obfuscator

Spices. NET obfuscator controls are used to prevent your. NET software from being reverse-engineered, tampered with, or unauthorized to use by hackers, competitors, or prying eyes, and this tool is available. NET code obfuscation, protection and optimization, etc., to fully protect your. NET code and data security. Spices.net Obfuscator re-build your. NET assembly is a new format that cannot be disassembled

Prevent. NET software is tampered with by reverse engineering code spices. NET Obfuscator

Spices. NET obfuscator controls are used to prevent your. NET software from being reverse-engineered, tampered with, or unauthorized to use by hackers, competitors, or prying eyes, and this tool is available. NET code obfuscation, protection and optimization, etc., to fully protect your. NET code and data security. Spices.net Obfuscator re-build your. NET assembly is a new format that cannot be disassembled

. Net obfuscator-dotfuscator

Http://msdn.microsoft.com/zh-cn/library/ms227241.aspx . Net obfuscator -- dotfuscator community edition by preemptive Solutions Independent GUI Quick Start Content type: Devdiv2. Transform: orcas2mtps.xslt. --> This section describes how to use the independent GUI of dotfuscator. For a complete guide to the dotfuscator user interface, see GUI reference. Step 1 -- start dotfuscator Gui Click Start |Program"|" Preempti

Software Release spdevelop obfuscator (. NET Version)

Software name: spdevelop obfuscator (. NET Version)Software Version: 1.0Recommended category: System Tools> programming and developmentEmail: spdevelop@163.comSoftware Website: http://www.spdevelop.com: Http://www.spdevelop.com/spobf.rarsoftware volume: 40 KBSoftware type: domestic software/Simplified Chinese/Free SoftwareApplication Platform: Win2000, XP, and 2003Interface preview: http://www.spdevelop.com/SpObf/Images/product2.gifSoftware Introducti

C # How to Use the obfuscator xenocode

How to Use xenocode Usage 1: 1. Clarification: obfuscation, encryption, or obfuscation! = Encryption2. Import the DOTNET program or assembly file (. dll/. EXE) to be encrypted)3. Select "Protect" on the second tab"4. Click "select

[New Product release] Shan Hai software production line pspl, contains an Open Source obfuscator

Shanhai software production line (Personal Edition , Abbreviation Pspl ) Is Sea Architecture C # Development platform. Used for individual developers to develop standalone andC/SAnd provide related tool support for the software

Javascript tool-JavaScript obfuscator

  Http://www.javascript-source.com/ Before Obfuscation Copy Save // Detect which browser is used VaR Detect = navigator. useragent. tolowercase (); VaR OS, browser, version, total, thestring; If (Checkit ( 'Konqueror' ) {Browser =

Java notes Java tutorial translation preface Java introduction Java Native type Java operators summary Java class Java object Java this use Java class members access control Java method return value Java

Java tutorial translation Sequence Java Introduction Build a JSE development environment-install JDK and eclipse Language basics Java Hello World Program Analysis Variable Java Variables Java Native type Conversion of Java

Java open-source obfuscators: Proguard details

When we develop java, we usually encounter code problems that protect our development. Because java is based on jvm, it is easy to decompile class files. Assume that we have developed a web program and released it to the customer. In fact, the customer can easily decompile our source code, including all src files and jsp files. In fact, there are several methods to protect our source code: 1. Use the code

Java compilation, decompile, anti-decompile

(Cai?). , as long as he can launch the source code through the counter compiler, your smart property is likely to be violated.    To protect yourself, you have to reverse-compile the Java or. NET software before shipping it, which is often called obfuscation (obfuscate). The confusing program code, still follows the original file format and instruction set, so it can still execute, and the execution result is the same as before the confusion. Only th

Free and open source Java software

Mondrian DBMS An OLAP engine written in Java, uses MDX, xmlfora, jolap Mysqlconnectorj DBMS JDBC connector to MySQL Netbeans, sun Dev A very good, free, open source Java ide Netbeans has improved dramatically; see Book netbeans guide and review. Openforbiz App General retail busines application software written

Total Pages: 15 1 2 3 4 5 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.