BBC BASIC for Windows
« Using REM!Fast for obfuscation »

Welcome Guest. Please Login or Register.
Apr 5th, 2018, 9:59pm



ATTENTION MEMBERS: Conforums will be closing it doors and discontinuing its service on April 15, 2018.
Ad-Free has been deactivated. Outstanding Ad-Free credits will be reimbursed to respective payment methods.

If you require a dump of the post on your message board, please come to the support board and request it.


Thank you Conforums members.

BBC BASIC for Windows Resources
Online BBC BASIC for Windows documentation
BBC BASIC for Windows Beginners' Tutorial
BBC BASIC Home Page
BBC BASIC on Rosetta Code
BBC BASIC discussion group
BBC BASIC for Windows Programmers' Reference

« Previous Topic | Next Topic »
Pages: 1  Notify Send Topic Print
 thread  Author  Topic: Using REM!Fast for obfuscation  (Read 439 times)
rtr2
Guest
xx Using REM!Fast for obfuscation
« Thread started on: Jan 4th, 2015, 10:53am »

A compiled BB4W program is pretty resistant to 'reverse engineering'. The cruncher - although it's not its main purpose - does a good job of obfuscating the code so that it's hard to understand, and the encrypted executable makes it difficult to view even that code.

Nevertheless some people are ultra sensitive about the possibility of their work being 'stolen', so it may be of interest to know that making extensive use of the REM!Fast directive (in BB4W v6) will add yet another layer of obfuscation. It introduces 'binary' data into the program, which may well display as spurious keywords or other garbage if an attempt is made to view it.

Richard.

User IP Logged

Pages: 1  Notify Send Topic Print
« Previous Topic | Next Topic »

| |

This forum powered for FREE by Conforums ©
Terms of Service | Privacy Policy | Conforums Support | Parental Controls