你用什么来保护您的.NET code,从逆向工程? [英] What do you use to protect your .NET code from reverse engineering?

查看:233
本文介绍了你用什么来保护您的.NET code,从逆向工程?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

有一段时间,我们使用一个名为codeVeil工具。我只是想知道,如果有更好的选择了那里。

For a while we were using a tool called CodeVeil. I'm just wondering if there are better alternatives out there.

编辑:在更多的人误解的问题,我知道,一个确定的饼干很可能能够击败任何这些工具。我不是太在意这些,但。这些工具只是为了制止休闲饼干,并阻止人们偷窃我们公司的知识产权。如果他们足以让过去一个体面的工具,他们可能不感兴趣偷我们的蹩脚code :-P

Before more people misunderstand the question, I'm aware that a determined cracker would probably be able to defeat any of these tools. I'm not too concerned about them though. These tools are just meant to stop the "casual cracker", and to stop people from stealing our company's IP. If they're good enough to get past a decent tool, they probably aren't interested in stealing our crappy code :-P

推荐答案

我已经有很多成功的与异种code Postbuild。可以混淆.NET程序集,保护液对反射拆卸,组合的.NET程序集到一个可执行文件(虚拟化),甚至编译.NET应用程序的工具,以独立的可执行文件不需要安装.NET运行库。

I've had a lot of success with Xenocode Postbuild. The tool can obfuscate .NET assemblies, protect agaist Reflector disassembly, combine .NET assemblies into a single executable ("virtualization") and even compile .NET applications to standalone executables that do not need .NET runtime installed.

这篇关于你用什么来保护您的.NET code,从逆向工程?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆