Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How can I protect my program from unauthorized changes?

Posted on 2007-11-26
8
Medium Priority
?
222 Views
Last Modified: 2013-12-16
Hello,

I want to distribute my Win Form C# application and I don't want anybody to be able to change or even view the source code because it's a commercial application.

I really liked CodeVeil, but it costs around $1500! I cannot afford it.

What are my options?

Please advise.
0
Comment
Question by:EEssam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
8 Comments
 
LVL 55

Expert Comment

by:Jaime Olivares
ID: 20353637
Visual Studio 2008 Professional comes with Dotfuscator Community Edition.
0
 

Author Comment

by:EEssam
ID: 20353694
I know but the Community Edition is pretty useless:

 http://www.preemptive.com/products/dotfuscator/Editions.html
0
 
LVL 55

Expert Comment

by:Jaime Olivares
ID: 20353717
0
What is a Denial of Service (DoS)?

A DoS is a malicious attempt to prevent the normal operation of a computer system. You may frequently see the terms 'DDoS' (Distributed Denial of Service) and 'DoS' used interchangeably, but there are some subtle differences.

 
LVL 11

Expert Comment

by:udhayakumard
ID: 20356542
Are you going to distribute the source code or the Executable alone??
0
 

Author Comment

by:EEssam
ID: 20359456
The executable alone for sure.
0
 
LVL 55

Expert Comment

by:Jaime Olivares
ID: 20359507
you need an ofuscator, certainly.
0
 

Author Comment

by:EEssam
ID: 20360410
So there are no FREE solutions?
0
 
LVL 55

Accepted Solution

by:
Jaime Olivares earned 2000 total points
ID: 20360437
have you read the links in my previous question?
http://www.123-free-download.com/download/ides-coding-utilities/assemblur/24134.html
this obfuscator is free, but don't expect to have all the features of a commercial obfuscator
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction Hi all and welcome to my first article on Experts Exchange. A while ago, someone asked me if i could do some tutorials on object oriented programming. I decided to do them on C#. Now you may ask me, why's that? Well, one of the re…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question