obfuscation

ProGuard JNI Error

荒凉一梦 提交于 2019-12-12 09:57:43
问题 I'm using ProGuard to obfuscate my Java Desktop application. When I launch the obfuscated JAR , I'm getting the following error: > java -jar program.jar Error: A JNI error has occurred, please check your installation and try again Exception in thread "main" java.lang.VerifyError: Expecting a stackmap frame at branch target 80 Exception Details: Location: MyMainClass.a(Ljava/lang/String;)Ljava/lang/String; @40: iflt Reason: Expected stackmap frame at this location. Bytecode: 0x0000000: 0406

Does silverlight code need protection?

◇◆丶佛笑我妖孽 提交于 2019-12-12 08:53:43
问题 I don't quite understand how Silverlight code works within the browser. Are the assemblies downloaded to the client machine? Is there any chance of the code getting decompiled using Reflector or some similar tool? If so, what options does one have to protect the code? Do .net obfuscators work with Silverlight? 回答1: To view a Silverlight application the client download a .xap file that contains the dll and one configuration xml and optional resources. The dll contains compiled c# code that

Can WinRT application use obfuscation?

天涯浪子 提交于 2019-12-12 08:47:51
问题 All Metro applications must be inspected before distribution through Windows 8 AppStore. Does this mean it will not be allowed to use code obfuscation? Or it is still possible, and only some specific aspects are going to be monitored during such inspection? 回答1: Here are some facts: Marketplace for WP7 allows C# apps be obfuscated (even MS he advises doing so) and I don't see any reason why Windows AppStore would ban such apps. It is almost certain that some vendors will provide compatible C+

How does Dotfuscator work?

ε祈祈猫儿з 提交于 2019-12-12 08:37:50
问题 How does Dotfuscator work? I tried obfuscate some of my classes and it renamed the methods/class to a, b, c etc. But I can still see the code inside those methods? Is it that, I am doing something wrong? Is there anything that would prevent a totally block deassembling my assembly? 回答1: That is the way it is supposed to work. Your code is still accessible, just more difficult to understand. If you want something "stronger", take a look at Xenocode PostBuild. 回答2: Code obfuscation goes well

How to Obfuscate SQL Sprocs?

大憨熊 提交于 2019-12-12 08:36:12
问题 Is there a way to hide/protect/obfuscate MS SQL Stored Procedures? 回答1: I can vaguely understand obfuscating code if it's extremely advanced in what it does, but I think obfuscating your SQL may not be worth the hassle. Anyway, a lot of the SQL I've seen around here comes obfuscated as standard. 回答2: If you must hide it, how about the "WITH ENCRYPTION" clause? http://blog.sqlauthority.com/2007/07/01/sql-server-explanation-of-with-encryption-clause-for-stored-procedure-and-user-defined

Does UWP's .Net Native together with asynchronous programming make obfuscation irrelevant? [closed]

空扰寡人 提交于 2019-12-12 08:19:08
问题 Closed . This question is opinion-based. It is not currently accepting answers. Want to improve this question? Update the question so it can be answered with facts and citations by editing this post. Closed 4 years ago . I've read this blog (and readers' comments therein) with interest and it highlights UWP's binary compilation -- intended to boost performance -- but at the same time playing part in making reverse engineering difficult due to binary compilation. On making reverse engineering

Should I be obfuscating database IDs from my users?

断了今生、忘了曾经 提交于 2019-12-12 07:39:09
问题 I'm being told that I shouldn't be using database IDs directly in HTML code in web applications. Currently I use the IDs on things like table row IDs (tableRow-454 where 454 is the ID of the row in the DB), in hidden or selects fields in forms or in URLs. (I'm not referring to telling people visually on a page that they are ####.) The recommendation I was given was to use some math to obfuscate the ID from the user. I'm thinking this will only make things more complicated and add unnecessary

Obfuscate decimal(6,2) number using T-SQL

微笑、不失礼 提交于 2019-12-12 03:06:34
问题 How can I effectively obfuscate numbers from range 0.00 ~ 9999.99 like 11.68 6.84 7.99 7.00 so that small difference in values of similarily-sized numbers is not immediately visible? I thought about splitting each number into integer and decimal part and use them as coordinates (e.g. 11.68 → (11, 68) ) and converting them to polar coords, which is nice, but I still need two values to store them. Do you know some nice tranformation of decimal(6,2) into another single number (can be like float

proguard obfuscation of package-private members shared across maven modules

筅森魡賤 提交于 2019-12-12 02:21:43
问题 I'm using the com.pyx4me.proguard-maven-plugin to obfuscate code in a multi-module project. How can I obfuscate a module that depends upon 'friend' methods from a different (obfuscated) module? I wish to keep everything from the base module but shrink/optimize as much as possible in the dependent module. I've tried a variety of 'keep*', 'dontoptimize' and 'dontshrink' options but nothing seems to help. Cross-posting from https://groups.google.com/forum/#!topic/pyx4me-users/1auM9xSQkLY. The

Problem on obfuscating j2me applications in Netbeans 6.8

人盡茶涼 提交于 2019-12-12 01:33:57
问题 When I'm trying to package a midlet with obfuscation, the following is displayed on the output window: pre-init: pre-load-properties: exists.config.active: exists.netbeans.user: exists.user.properties.file: load-properties: exists.platform.active: exists.platform.configuration: exists.platform.profile: basic-init: cldc-pre-init: cldc-init: cdc-init: ricoh-pre-init: ricoh-init: semc-pre-init: semc-init: savaje-pre-init: savaje-init: sjmc-pre-init: sjmc-init: cdc-hi-pre-init: cdc-hi-init: