?
Solved

Code Security

Posted on 2004-04-16
4
Medium Priority
?
202 Views
Last Modified: 2010-04-11
Hi ,
How I could protect my  vb.net code from decompiling
0
Comment
Question by:ppk54ir
2 Comments
 
LVL 3

Accepted Solution

by:
shaggyb earned 252 total points
ID: 10848153
if its being translated into machine code then it cannot be decompiled........   it can however be disassembled and there aint nothin you can do about that.......

although i suppose you could write a compiler that scrambles the code...then inserts a routine to descramble it before execution......

0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 248 total points
ID: 10855742
You can see what any code does, Softice will let hackers crack you code for ANYTHING you write. It's just like you can't hide HTML... your browser has to get some information to read in order for you to see, and you can sniff the wire, or view source and see the html. Your processor also has to be sent info, and Softice and other debuggers are just as capable of seeing this as you are to view source. It can be obufscated as stated above, but IF anyone actually want's to see it bad enough, they WILL. There are cleaver tricks of the trade that can be done, some detect Debuggers like softice, and kill the app, that way the code can't be seen, at leaste not very long.... I suggest you read a book like: http://www.amazon.com/exec/obidos/tg/detail/-/1886411794/103-9535620-8397465?v=glance  That book is a great resource. You can also do some searching for packers and compilers that will keep the code safer to the casual hacker...
-rich
0

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question