Not looking to do anything per se, just opened the .exe with 'vi' and
'more'...just wondering how well protected my code would be from prying
eyes.
Would this be an issue to be concerned about? Is it possible (or usual)
to try prevent or minimise reverse-engineering of standalones?
Richard Gaskin wrote:
Jay Listo wrote:
I tried to read a RunRev Standalone (.exe)...apparently the first
parts all make it look like it's a binary file, unreadable.
Towards the end, I start seeing menu and button label strings, and
even extracts of transcript code...well, comments in scripts are
certainly easy prey. This may not be as different as using the unix
command 'strings' to check out an executable, but just may be
simpler...I'm not sure.
How easy is it to reverse-engineer a RunRev standalone?
The file format is pretty complex. What are you looking to do?
--
Richard Gaskin
Fourth World Media Corporation
__________________________________________________
Rev tools and more: http://www.fourthworld.com/rev
_______________________________________________
use-revolution mailing list
[email protected]
http://lists.runrev.com/mailman/listinfo/use-revolution
_______________________________________________
use-revolution mailing list
[email protected]
http://lists.runrev.com/mailman/listinfo/use-revolution