Obfuscators

  • Thread starter Thread starter Eric Renken
  • Start date Start date
E

Eric Renken

So I have a question we are looking at obfuscators. I am trying to push for
dotfuscator from www.preemptive.com, but management is thinking about
xenocode from www.xenocode.com. Has anyone used these applications? I am
looking for a comparison or pluses minuses of either. I really don't have a
preference, but I want to chose the right piece of software to protect our
code.

Eric Renken
 
Eric

Another tool is XHEO CodeVeil.

According to their web site, CodeVeil is even protected against ILDASM etc
by encrypting the library and decrypting on the fly.

Best regards,

Benny Tordrup
 
Eric

Another tool is XHEO CodeVeil.

According to their web site, CodeVeil is even protected against ILDASM etc
by encrypting the library and decrypting on the fly.

Best regards,

Benny Tordrup

Eric Renken said:
So I have a question we are looking at obfuscators. I am trying to push
for dotfuscator from www.preemptive.com, but management is thinking about
xenocode from www.xenocode.com. Has anyone used these applications? I am
looking for a comparison or pluses minuses of either. I really don't have
a preference, but I want to chose the right piece of software to protect
our code.

Eric Renken



--
 
Another tool is XHEO CodeVeil.

According to their web site, CodeVeil is even protected against ILDASM etc
by encrypting the library and decrypting on the fly.

Hello!
What does it mean "on the fly"? As I understand that on the runtime code
will present in a memory. Does this tool prevent of using "attached code" to
get IL code?

Or how the code can be protected from getting the IL code during runtime?
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads

Obfuscator for .Net Assemblies 2
Obfuscating 3
Best obfuscator 3
.NET Code Obfuscation. 2
how many obfuscate? 10
Copy protection software 19
Dotfuscator vs ResourceManager ctor 1
Deploying native code. 1

Back
Top