Crypto Obfuscator is Developers’ New Weapon of Choice for Code Protection and Obfuscation of .Net Software

Share Article

Crypto Obfuscator, the code-protection, obfuscation and software optimization tool from LogicNP Software, is set to become the new weapon of choice for software developers in their fight against piracy, reverse-engineering and IP theft, to which billions of dollars are lost every year. Using powerful software obfuscation and encryption techniques, Crypto Obfuscator aims to help software companies protect their valuable code from competitors, reverse-engineers and crackers.

“One of the focus areas for Crypto Obfuscator is ease of use and integration.” says G Himangi. “To this end, Crypto Obfuscator offers features like command-line support, VS integration via build events or MSBuild & automatic resigning of assemblies"

Crypto Obfuscator, the code-protection, obfuscation and software optimization tool from LogicNP Software, is set to become the new weapon of choice for software developers in their fight against piracy, reverse-engineering and IP theft, to which billions of dollars are lost every year. Using powerful software obfuscation and encryption techniques, Crypto Obfuscator aims to help software companies protect their valuable code from competitors, reverse-engineers and crackers.

Crypto Obfuscator gives a variety of advanced protections to .Net software including symbol renaming, string encryption and control flow obfuscation. “Some very unique protections offered by Crypto Obfuscator are the Anti-Debug, Anti-Tamper, Anti-Tracer and Anti-Reflection”, says G Himangi from LogicNP Software. “All these protections reinforce one another and form multiple layers of protection around your software”.

“We are constantly doing R&D - in the recently released v2010 R2, we added a powerful and one-of-a-kind protection technique called method call hiding, which hides all calls made to methods in external dlls and to unrenamed internal methods. Nobody can make sense of how various methods are used by your software and this feature in itself is quite enough to frustrate a cracker. We are very proud of this feature!” says G Himangi.

Crypto Obfuscator also features WPF, XAML and BAML obfuscation, resource encryption and compression, and dependant-assembly embedding, encryption and compression. “One of the focus areas for Crypto Obfuscator is ease of use and integration – we wanted to ensure that the obfuscation step becomes a seamless part of the software development process.” says G Himangi. “To this end, Crypto Obfuscator offers features like command-line support, Visual Studio integration via Post-Build events and MSBuild, automatic resigning of strong-named assemblies, and even automatic code signing of obfuscated assemblies using Authenticode. We really wanted to ensure that the obfuscation step does not become a liability for developers and that developers do not develop a resistance to something so vital to IP protection”.

Crypto Obfuscator is available directly from LogicNP Software. Trial version and detailed product information is available from the Crypto Obfuscator Homepage. Development licenses can be purchased starting from US $149. Multi-developer licenses, site licenses and Support and Upgrade Subscriptions are also available.

For more information about Crypto Obfuscator or other LogicNP Software products, visit LogicNP Software.

About LogicNP Software
LogicNP Software is a privately owned software development company which specializes in developing tools, reusable controls, components and libraries for .Net, WPF, ActiveX and MFC/ATL developers. Our mission is to provide innovative, robust and easy-to-use tools, components and controls that help developers build the best applications that today's competitive marketplace demands. Our products are used by large corporations, multi-national companies, consultants, ISVs and single developers all over the world.

Evaluation copy available upon request.

E-mail for more information: info(at)ssware(dot)com

###

Share article on social media or email:

View article via:

Pdf Print

Contact Author

G Himangi
Visit website