Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. .NET (Core and Framework)
  4. Code obfuscation

Code obfuscation

Scheduled Pinned Locked Moved .NET (Core and Framework)
csharpquestion
2 Posts 2 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K Offline
    K Offline
    koleraba
    wrote on last edited by
    #1

    Hi I am quite new in protecting code against hackers. I know that much to obfuscate the the .NET assemblies, but my questions are: Which is harder for hacker: Reverse engineering the optimized x86 code or obfuscated .NET assembly? How much extra protection does the standard anti-hacking approaches(checking the correct serial code in different places in code, adding dummy code to serial validation methods, using unmeaningful method names...) add to the obfuscated code. Thank you for your time. Uros

    N 1 Reply Last reply
    0
    • K koleraba

      Hi I am quite new in protecting code against hackers. I know that much to obfuscate the the .NET assemblies, but my questions are: Which is harder for hacker: Reverse engineering the optimized x86 code or obfuscated .NET assembly? How much extra protection does the standard anti-hacking approaches(checking the correct serial code in different places in code, adding dummy code to serial validation methods, using unmeaningful method names...) add to the obfuscated code. Thank you for your time. Uros

      N Offline
      N Offline
      N a v a n e e t h
      wrote on last edited by
      #2

      1 - It would be Reverse engineering the optimized x86 code. 2 - I am not a proponent of obfuscation. IMO, obfuscators will just rename classes,methods and variables to some hard to read names. Here[^] is a good article in which Jon Skeet shares his views on obfuscation. Its worth reading. :)

      Navaneeth How to use google | Ask smart questions

      1 Reply Last reply
      0
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Don't have an account? Register

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups