ILDASM and Obfuscation in .NET
page 7 of 7
by Sandeep Acharya
Feedback
Average Rating: 
Views (Total / Last 10 Days): 36896/ 45

Conclusion

It is fact that obfuscators cannot protect your codes completely since dedicated hacker can understand the logic behind the screen by spending a lot of time and carefully observing the results (and stack outputs). However, it is always advisable to go for obfuscators when application demands high security or a developer does not want to expose the implemented logic.

By: Sandeep Acharya

Mindfire Solutions

 


View Entire Article

User Comments

Title: What Actually Is ILDASM   
Name: Babu Shekar
Date: 2010-02-12 6:06:30 AM
Comment:
Thanks Sandeep Acharya!! this article provides an detailed explanation of the topic with pictorical representation. It is really great piece of explanation.
Title: Nice!!   
Name: Venkata Polepalli
Date: 2008-11-12 6:36:19 AM
Comment:
Hi Sandeep!!

Its Good Artical for Explaining the Obfuscation!!
Title: Thanks   
Name: Rupesh kumar Tiwari
Date: 2007-10-05 7:51:13 AM
Comment:
Thanks Sandeep ji.
After reading this article I got a clear picture about the Ildasm.
You could have thrown some more light on Obfuscating. Still, the diagram is explaining things clearly.
Title: Thanks   
Name: Chandrakanta
Date: 2007-01-18 1:40:10 AM
Comment:
This is a very Nice Article For the developers those are working on this technology.

Product Spotlight
Product Spotlight 





Community Advice: ASP | SQL | XML | Regular Expressions | Windows


©Copyright 1998-2024 ASPAlliance.com  |  Page Processed at 2024-04-19 9:32:43 AM  AspAlliance Recent Articles RSS Feed
About ASPAlliance | Newsgroups | Advertise | Authors | Email Lists | Feedback | Link To Us | Privacy | Search