When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. ProGuard - Wikipedia

    en.wikipedia.org/wiki/ProGuard

    ProGuard is an open source command-line tool which shrinks, optimizes and obfuscates Java code. It is able to optimize bytecode as well as detect and remove unused instructions. [4] ProGuard is free software and is distributed under the GNU General Public License, version 2. [3]

  3. DashO (software) - Wikipedia

    en.wikipedia.org/wiki/DashO_(software)

    DashO is a code obfuscator, compactor [clarification needed], optimizer, watermarker [clarification needed], [2] and encryptor for Java, Kotlin and Android applications. [3] It aims to achieve little or no performance loss even as the code complexity increases. [4] [5]

  4. Apache POI - Wikipedia

    en.wikipedia.org/wiki/Apache_POI

    HSSF (Horrible SpreadSheet Format [2]) – reads and writes Microsoft Excel (XLS) format files. It can read files written by Excel 97 onwards; this file format is known as the BIFF 8 format. As the Excel file format is complex and contains a number of tricky characteristics, some of the more advanced features cannot be read.

  5. Obfuscation (software) - Wikipedia

    en.wikipedia.org/wiki/Obfuscation_(software)

    In software development, obfuscation is the practice of creating source or machine code that is intentionally difficult for humans or computers to understand. Similar to obfuscation in natural language, code obfuscation may involve using unnecessarily roundabout ways to write statements. Programmers often obfuscate code to conceal its purpose ...

  6. Java Excel API - Wikipedia

    en.wikipedia.org/wiki/Java_Excel_API

    Tools. Tools. move to sidebar hide. Actions Read; ... Java Excel API (a.k.a. JXL API) allows users to read, ... Selenium tutorial

  7. Polymorphic code - Wikipedia

    en.wikipedia.org/wiki/Polymorphic_code

    Emulation may be used to defeat polymorphic obfuscation by letting the malware demangle itself in a virtual environment before utilizing other methods, such as traditional signature scanning. Such a virtual environment is sometimes called a sandbox. Polymorphism does not protect the virus against such emulation if the decrypted payload remains ...

  8. Java code coverage tools - Wikipedia

    en.wikipedia.org/wiki/Java_Code_Coverage_Tools

    The runtime overhead of added instrumentation is small (5–20%) and the bytecode instrumentor itself is very fast (mostly limited by file I/O speed). Memory overhead is a few hundred bytes per Java class. EMMA is 100% pure Java, has no external library dependencies, and works in any Java 2 JVM (even 1.2.x).

  9. Data masking - Wikipedia

    en.wikipedia.org/wiki/Data_masking

    Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel. Data masking can also be referred as anonymization, or tokenization, depending on different context.