How to prevent our .NET DLL from decompilation

Scenario: By design, .NET embeds rich Meta data inside the executable code using MSIL. Any one can
easily decompile your DLL back using tools like ILDASM (owned by Microsoft) or Reflector for
.NET which is a third party.
                Secondly, there are many third party tools, which make this
decompiling process int a single click. So any one can easily look in to your assemblies and reverse
engineer them back in to actual source code and understand some real good logic, which can
make it easy to crack your application.

Here the solution: You can stop this reverse engineering by using "obfuscation". It is a
technique, which will foil the decompilers. Many third parties (XenoCode, Demeanor for .NET)
provide .NET obfuscation solution. Microsoft includes one that is Dotfuscator Community
Edition with Visual Studio.NET.

0 comments:

Listen to nirmaln - sakara - playlist audio songs at MusicMazaa.com