Solved

Code Security

Posted on 2004-04-16
4
198 Views
Last Modified: 2010-04-11
Hi ,
How I could protect my  vb.net code from decompiling
0
Comment
Question by:ppk54ir
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 3

Accepted Solution

by:
shaggyb earned 63 total points
ID: 10848153
if its being translated into machine code then it cannot be decompiled........   it can however be disassembled and there aint nothin you can do about that.......

although i suppose you could write a compiler that scrambles the code...then inserts a routine to descramble it before execution......

0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 62 total points
ID: 10855742
You can see what any code does, Softice will let hackers crack you code for ANYTHING you write. It's just like you can't hide HTML... your browser has to get some information to read in order for you to see, and you can sniff the wire, or view source and see the html. Your processor also has to be sent info, and Softice and other debuggers are just as capable of seeing this as you are to view source. It can be obufscated as stated above, but IF anyone actually want's to see it bad enough, they WILL. There are cleaver tricks of the trade that can be done, some detect Debuggers like softice, and kill the app, that way the code can't be seen, at leaste not very long.... I suggest you read a book like: http://www.amazon.com/exec/obidos/tg/detail/-/1886411794/103-9535620-8397465?v=glance  That book is a great resource. You can also do some searching for packers and compilers that will keep the code safer to the casual hacker...
-rich
0

Featured Post

Is your NGFW recommended by NSS Labs?

Ours is! NSS Labs Next Generation Firewall Test gives the WatchGuard Firebox M4600 a "Recommended" rating! Curious where your NGFW landed on the  Security Value Map? See the map and download the full report today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question