12-11-2013
Quote:
Originally Posted by
Corona688
Second, it's very difficult to reverse-engineer C or Java application code. The program text does not exist inside the application you give to your customers(unless you accidentally include debugging information!) so they cannot extract it. All they get are raw CPU instructions or java bytecodes. They don't even get your variable names.
Actually, nowadays, it is quite easy to reverse engineer most binary code using tools like HexRays IDA or the HexRays disassember. These tools are not cheap but they are what the professionals use to reverse engineer malware, spyware and the like. There are also other proprietary extensions to IDA which are domain specific and do an even better job than the HexRays disassembler.
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
This may have a simple answer, but I have not been able to find it!
I need to have 20 protected directories. Each directory having a unique user with access.
I need to have a main link on the web page that requests the username and password. Once entered it eill send the user to their... (2 Replies)
Discussion started by: ericg
2 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I am trying to print from HP unix machine to a Toshiba printer which is password protected. How can I print?
Thanks.
Anuj (1 Reply)
Discussion started by: Anuj
1 Replies
3. Shell Programming and Scripting
Hi All,
I want to make my script password protected.
i e: if somebody runs my script it should prompt for password.
Can somebody help me in to execute the same??
Thanks in Advance :b: (11 Replies)
Discussion started by: achararun
11 Replies
4. UNIX for Advanced & Expert Users
Greetings
I am trying to create a solution that will log information into a file. That is the easy part.
What I am trying to do is have a front end script that ill ask a user what their reasoning is for logging in and log that reason into a file. The hard part I am finding is that I need that... (10 Replies)
Discussion started by: Smoker
10 Replies
5. Shell Programming and Scripting
Hie Friends,
I need your help once again.
I have 77 “password protected” winzip files in linux/unix server. I want to decrypt it through an automated script. Password of every file is same and it is mhd*tt.
Please help me.
Usually I unzip it as follows, manually one by one.
unzip <file name> ... (6 Replies)
Discussion started by: anushree.a
6 Replies
6. Programming
Hello forum,
I am siva working as programmer .I was blocked with the below issue so please help any of the forum memebers.
testve.h
class cv
{
protected :
struct state;
state& m_state;
};
testVe.cpp
struct state
{
m_size;
}
the above are 2 files which have the... (3 Replies)
Discussion started by: workforsiva
3 Replies
7. UNIX for Advanced & Expert Users
Is there a way to create a protected RPM package without giving up your source code? (2 Replies)
Discussion started by: cokedude
2 Replies
8. Shell Programming and Scripting
I am trying to automate the process using password protected sftp upload the file in daily basis from our server to client server and exit successfully from remote server Getting issue while running the script.
sftp test@12.342.564.205/passwd--password for sftp
cd /home/group/jagu/txt
put... (3 Replies)
Discussion started by: jagu
3 Replies
LEARN ABOUT LINUX
dacs.java
DACS.JAVA(7) DACS Miscellaneous Information DACS.JAVA(7)
NAME
dacs.java - DACS Java support
DESCRIPTION
This document describes support for Java provided by DACS.
To enable Java support, DACS must be configured using the --enable-java flag. It may also be necessary to specify the location of the Java
commands and include files. See dacs.install(7)[1].
Note
Java support is currently very limited and should be considered experimental. It is currently only possible to call dacsauth(1)[2] and
dacscheck(1)[3] using the Java Native Interface (JNI) provided. The command line arguments to both of these commands are exactly as
documented in their manual pages. Each argument is passed as a String.
The code is not thread-safe and is probably not suitable for being called many times within a particular process due to assumptions it
makes about dynamic memory allocation.
There are no immediate plans to improve or extend Java support. Using the existing capability to build the JNI layer, however, it
should not be difficult for an experienced Java programmer to build upon the example Java code provided.
With Java support enabled, building DACS will copy the JNI shared library and a .jar file to the library directory (default:
/usr/local/dacs/lib), and the JNI include files to the include directory (default: /usr/local/dacs/include).
The tools/java/jni distribution directory contains a simple script called javarun that demonstrates how to run dacsauth or dacscheck as a
Java application. For example, to validate the Unix password for user somebody, run (as root):
./javarun dacsauth -m unix suff -user somebody -prompt
DIAGNOSTICS
The return codes are as documented in the command's manual page.
AUTHOR
Distributed Systems Software (www.dss.ca[4])
COPYING
Copyright2003-2012 Distributed Systems Software. See the LICENSE[5] file that accompanies the distribution for licensing information.
NOTES
1. dacs.install(7)
http://dacs.dss.ca/man/dacs.install.7.html
2. dacsauth(1)
http://dacs.dss.ca/man/dacsauth.1.html
3. dacscheck(1)
http://dacs.dss.ca/man/dacscheck.1.html
4. www.dss.ca
http://www.dss.ca
5. LICENSE
http://dacs.dss.ca/man/../misc/LICENSE
DACS 1.4.27b 10/22/2012 DACS.JAVA(7)