Browser you have is obsolate. Please, download the modern Firefox, Chrome, Opera or Yandex browser for comfort surfing!
  
World Software Catalog
Internet catalog of free and paid applications of the World
  
 RU  EN 
Software search
Description language 1Description language 2Description language 3Description language 4
PlatformLicenseASP member
ClassSpecificCategory
NamePublisher/developer
KeywordsDescription
      
Guardship 7.1.2
Company: RustemSoft
Country: United States of America, WI, Black Wolf
ASP member: No
Company Web site: http://www.rustemsoft.com
Application info: http://rustemsoft.com/Guardship.htm

Author: Rustem Soft

Sales email: info@smrtx.com
Support email: info@smrtx.com

License type: Shareware
Class: Development::Other
Specific: Development Tools
Categories: Programming :: Tools and Editors, Programming :: .NET
Platform: Windows
OS: Win2000, WinXP, Win7 x32, Win7 x64, Windows 8, Windows 10, WinServer, WinOther, WinVista, WinVista x64
System requirements: .NET framework 2.0
Language: English
Limitations: no limitations within evaluation period

        
Keywords: native, .NET, code, vb.net, C#, obfuscator, obfuscation, VB.NET, .NET obfuscator, code security, code protection, software protection, Visual Studio

Guardship disassembles your .NET code and then compiles the MSIL code of your executable into native unmanaged application by generating two pieces: 1. Start module [Your_App_Name].com; 2. Library [Your_App_Name].lib
Your applications (WinForms, WPF, etc.) that target the .NET Framework are compiled to intermediate language (IL). At run time, the just-in-time (JIT) compiler translates the IL to native code. Guardship translates your .NET executable to native code to make it hidden. When you run the protected executable it has all features and functionalities of managed application performing in PC memory. But .NET assembly browsers and decompilers will not be able to read your protected .NET executables.
Why does Guardship convert to unmanaged executable?
There are a few disassemblers for decompiling unmanaged executables written in ASM, C, or C++. However none of them will manage to produce readable enough code to worth the effort. You will spend more time trying to read the decompiled source with assembler blocks inside, than writing the same-functioning application from scratch.
In fact, any executable module can be disassembled and explored. The easiness with which a decipherer can reverse-engineer your application source code depends on how complete metadata about the app's source code presents inside the exe module. May the decipherer figure out the original class names, methods, work flows, structures, etc.? A compiler basically compacts app's source code, transforming the output into a format which is much compliant to machine runtime execution. It could be a native machine code or IL byte code that is treated by CLR intermediate runtime. However by and large, a lot of information about your application source code (debugging, comments, etc.) is simply can be lost during the compact compilation.
Report Malware



 0    
 0    
4.42 MB

~199.99$
~185.06€
DateVersionStatusRelease history
13 May 20167.1.2New Releasenew release
Distribution permissions: This product can be freely distributed through the Internet. To publish it on a CD, please contact us at info@smrtx.com

Ratio:

Back  Top

 
  0  0
New on site
March 2024
   Su   Mo   Tu   We   Th   Fr   Sa   
             1   2   
   3   4   5   6   7   8   9   
   10   11   12   13   14   15   16   
   17   18   19   20   21   22   23   
   24   25   26   27   28   29   30   
   31               
 29 March 2024 year, Friday 
User
Autorization
e-mail:

password:


Register
RSS-feed
RSS-лента    Valid RSS
Online
Guests: 7
Users: 0
Bots: 66
Total users: 52
Banners

Copyright © 2020-2024 MaaSoftware OOO