![]() ![]() ![]() Sometimes custom packers can be very effective, because there aren't well published methods on how to unpack them. If the third-party packers are too expensive, consider writing your own. NET Reflector and makes it a pain to unpack for reversing. This stops people from reflecting your application in. NET executable into an encrypted Win32 wrapper application. Use a third-party packer to pack your.Even if your application is cracked, you can be sure that they won't be releasing a key generator for your application, because it is impossible to reverse the key generating algorithm. ![]() This ensures that only you can generate your license codes. Use public/private key or asymmetric encryption to generate your product licenses.Dotfuscator has a free edition and comes with Visual Studio. Some suggestions I have for you to help protect your application: What you want to do is just make it difficult enough to crack to make it not worth peoples' trouble. Eventually, that code has to be converted into native machine code and every application that is runnable is vulnerable. There are steps you can take to make it a little more difficult, but ultimately any executable on the local machine is crackable. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |