L
Laurent
Hi,
What is the best practice to avoid the end user tampering with installed
managed DLLs. For example, a web application connects to a server to
verify licenses. If licenses are valid, the application runs, if not an
error page is displayed. However, if the web application (ASP.NET) is
decompiled, modified and recompiled, and installed, the license check
can be skipped.
Our assemblies have a strong name, but my understanding is that it
doesn't protect us, since the end user can find the assembly hierarchy
and decompile - recompile the whole assembly to solve the strong name
problem.
So, what's the solution?
Greetings
Laurent
What is the best practice to avoid the end user tampering with installed
managed DLLs. For example, a web application connects to a server to
verify licenses. If licenses are valid, the application runs, if not an
error page is displayed. However, if the web application (ASP.NET) is
decompiled, modified and recompiled, and installed, the license check
can be skipped.
Our assemblies have a strong name, but my understanding is that it
doesn't protect us, since the end user can find the assembly hierarchy
and decompile - recompile the whole assembly to solve the strong name
problem.
So, what's the solution?
Greetings
Laurent