BBC BASIC for Windows
« Using REM!Fast for obfuscation »
Welcome Guest. Please Login or Register. Apr 5th, 2018, 9:59pm
ATTENTION MEMBERS: Conforums will be closing it doors and discontinuing its service on April 15, 2018. Ad-Free has been deactivated. Outstanding Ad-Free credits will be reimbursed to respective payment methods.
If you require a dump of the post on your message board, please come to the support board and request it.
Topic: Using REM!Fast for obfuscation (Read 439 times)
rtr2 Guest
Using REM!Fast for obfuscation
« Thread started on: Jan 4th, 2015, 10:53am »
A compiled BB4W program is pretty resistant to 'reverse engineering'. The cruncher - although it's not its main purpose - does a good job of obfuscating the code so that it's hard to understand, and the encrypted executable makes it difficult to view even that code.
Nevertheless some people are ultra sensitive about the possibility of their work being 'stolen', so it may be of interest to know that making extensive use of the REM!Fast directive (in BB4W v6) will add yet another layer of obfuscation. It introduces 'binary' data into the program, which may well display as spurious keywords or other garbage if an attempt is made to view it.