Friday, July 16, 2010

Code protection tool for developers unveiled

Software optimization tool

Code protection tool for developers unveiled

New tool aims to help software developers to fight against piracy, reverse-engineering and IP theft, to which billions of dollars are lost every year

Wednesday, July 14, 2010

BANGALORE, INDIA: Crypto Obfuscator, the code-protection, obfuscation and software optimization tool from LogicNP Software, is set to become the new weapon of choice for software developers.

Using powerful software obfuscation and encryption techniques, Crypto Obfuscator aims to help software companies protect their valuable code from competitors, reverse-engineers and crackers said a press release.

Crypto Obfuscator gives a variety of advanced protections to .NET software including symbol renaming, string encryption and control flow obfuscation. “Some very unique protections offered by Crypto Obfuscator are the Anti-Debug, Anti-Tamper, Anti-Tracer and Anti-Reflection”, says G Himangi from LogicNP Software.

“We are constantly doing R&D - in the recently released v2010 R2, we added protection technique called method call hiding, which hides all calls made to methods in external dlls and to unrenamed internal methods. Nobody can make sense of how various methods are used by your software and this feature in itself is quite enough to frustrate a cracker. We are very proud of this feature!” says G Himangi.

Crypto Obfuscator also features WPF, XAML and BAML obfuscation, resource encryption and compression, and dependant-assembly embedding, encryption and compression.

“One of the focus areas for Crypto Obfuscator is ease of use and integration – we wanted to ensure that the obfuscation step becomes a seamless part of the software development process.” says G Himangi.

“To this end, Crypto Obfuscator offers features like command-line support, Visual Studio integration via Post-Build events and MSBuild, automatic resigning of strong-named assemblies, and even automatic code signing of obfuscated assemblies using Authenticode. We really wanted to ensure that the obfuscation step does not become a liability for developers and that developers do not develop a resistance to something so vital to IP protection," added Himangi.

©CIOL Bureau

No comments:

Post a Comment

Popular Posts