Not looking to do anything per se, just opened the .exe with 'vi' and 'more'...just wondering how well protected my code would be from prying eyes.

Would this be an issue to be concerned about? Is it possible (or usual) to try prevent or minimise reverse-engineering of standalones?

Richard Gaskin wrote:

Jay Listo wrote:

I tried to read a RunRev Standalone (.exe)...apparently the first parts all make it look like it's a binary file, unreadable. Towards the end, I start seeing menu and button label strings, and even extracts of transcript code...well, comments in scripts are certainly easy prey. This may not be as different as using the unix command 'strings' to check out an executable, but just may be simpler...I'm not sure.

How easy is it to reverse-engineer a RunRev standalone?


The file format is pretty complex.  What are you looking to do?

--
 Richard Gaskin
 Fourth World Media Corporation
 __________________________________________________
 Rev tools and more: http://www.fourthworld.com/rev
_______________________________________________
use-revolution mailing list
[email protected]
http://lists.runrev.com/mailman/listinfo/use-revolution

_______________________________________________
use-revolution mailing list
[email protected]
http://lists.runrev.com/mailman/listinfo/use-revolution

Reply via email to