When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Code morphing - Wikipedia

    en.wikipedia.org/wiki/Code_morphing

    Code morphing is an approach used in obfuscating software to protect software applications from reverse engineering, analysis, modifications, and cracking.This technology protects intermediate level code such as compiled from Java and .NET languages (Oxygene, C#, Visual Basic, etc.) rather than binary object code.

  3. International Obfuscated C Code Contest - Wikipedia

    en.wikipedia.org/wiki/International_Obfuscated_C...

    When the program ran, it printed out zero bytes, equivalent to its source code. [11] In the effort to take obfuscation to its extremes, contestants have produced programs which skirt around the edges of C standards, or result in constructs which trigger rarely used code path combinations in compilers.

  4. Obfuscation (software) - Wikipedia

    en.wikipedia.org/wiki/Obfuscation_(software)

    In software development, obfuscation is the practice of creating source or machine code that is intentionally difficult for humans or computers to understand. Similar to obfuscation in natural language, code obfuscation may involve using unnecessarily roundabout ways to write statements. Programmers often obfuscate code to conceal its purpose ...

  5. ProGuard - Wikipedia

    en.wikipedia.org/wiki/ProGuard

    ProGuard is an open source command-line tool which shrinks, optimizes and obfuscates Java code. It is able to optimize bytecode as well as detect and remove unused instructions. [4] ProGuard is free software and is distributed under the GNU General Public License, version 2. [3]

  6. DashO (software) - Wikipedia

    en.wikipedia.org/wiki/DashO_(software)

    DashO is a code obfuscator, compactor [clarification needed], optimizer, watermarker [clarification needed], [2] and encryptor for Java, Kotlin and Android applications. [3] It aims to achieve little or no performance loss even as the code complexity increases.

  7. Apache POI - Wikipedia

    en.wikipedia.org/wiki/Apache_POI

    POIFS (Poor Obfuscation Implementation File System [2]) – This component reads and writes Microsoft's OLE 2 Compound document format. Since all Microsoft Office files are OLE 2 files, this component is the basic building block of all the other POI elements.

  8. JAD (software) - Wikipedia

    en.wikipedia.org/wiki/JAD_(software)

    Jad (Java Decompiler) is, as of August 2011, an unmaintained decompiler for the Java programming language. [1] Jad provides a command-line user interface to extract source code from class files . See also

  9. Talk:Obfuscation (software) - Wikipedia

    en.wikipedia.org/wiki/Talk:Obfuscation_(software)

    Tell me quickly how to strip the symbol table for a Java program, using javac. You can't. The symbol table is not merely a debugging aid in dynamic languages; it's the point. However, an obfuscator may do this, fully or partially, depending on how much you need the dynamism. The article already states you can't obfuscated code that uses reflection.