Solved

Code Security

Posted on 2004-04-16
4
197 Views
Last Modified: 2010-04-11
Hi ,
How I could protect my  vb.net code from decompiling
0
Comment
Question by:ppk54ir
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 3

Accepted Solution

by:
shaggyb earned 63 total points
ID: 10848153
if its being translated into machine code then it cannot be decompiled........   it can however be disassembled and there aint nothin you can do about that.......

although i suppose you could write a compiler that scrambles the code...then inserts a routine to descramble it before execution......

0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 62 total points
ID: 10855742
You can see what any code does, Softice will let hackers crack you code for ANYTHING you write. It's just like you can't hide HTML... your browser has to get some information to read in order for you to see, and you can sniff the wire, or view source and see the html. Your processor also has to be sent info, and Softice and other debuggers are just as capable of seeing this as you are to view source. It can be obufscated as stated above, but IF anyone actually want's to see it bad enough, they WILL. There are cleaver tricks of the trade that can be done, some detect Debuggers like softice, and kill the app, that way the code can't be seen, at leaste not very long.... I suggest you read a book like: http://www.amazon.com/exec/obidos/tg/detail/-/1886411794/103-9535620-8397465?v=glance  That book is a great resource. You can also do some searching for packers and compilers that will keep the code safer to the casual hacker...
-rich
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question