Beefy Boxes and Bandwidth Generously Provided by pair Networks
Clear questions and runnable code
get the best and fastest answer

Re^22: Perl 6 ... dead? (no, just convalescing)

by jryan (Vicar)
on Sep 03, 2004 at 19:10 UTC ( #388382=note: print w/replies, xml ) Need Help??

in reply to Re^21: Perl 6 ... dead? (no, just convalescing)
in thread Perl 6 ... dead?

Jad is very old. 6 years old. Try a newer decompiler, like DJ, or Borland's JBuilder decompiler, which is based on Mocha, the original Java decompiler.

  • Comment on Re^22: Perl 6 ... dead? (no, just convalescing)

Replies are listed 'Best First'.
Re^23: Perl 6 ... dead? (no, just convalescing)
by Wassercrats on Sep 03, 2004 at 20:14 UTC
    If those decompilers are good, I guess I'd decide to use C, or I'd look into Visual Basic. I'd do whatever the successful commercial software companies do.

      I'm not sure where you got the idea that Visual Basic was non-decompilable. Take a look at:

      Any unencrypted language is decompilable. Think about it: the computer/virtual machine/interpreter has to be able to run the program, right? To do that, it must be in some sort of order. The logic must be there some how. A decompiler is just a program that goes through the code (whether it be plaintext, bytecode, or machine code) just like whatever is running the code, but instead of running each command, it spits out equivalant source code for that command. (That's just a simplication, of course; decompilers need to be a bit more sophisticated to handle a command that maps to several lines of lower level code, for instance).

      So, knowing this, you should be able to see why decompilers are *not* a good way to secure source code. The only way source code would really be secure is if a computer/virtual-machine/interpreter/whatever-is-running-your-code had a way to natively encrypt/decrypt the source. (Think: you supply a password when compiling your program, and your user has to enter this password when running your program). I do not know of any language that has this feature, not even Java, probably because it would be a huge pain in the ass to users.

        That means the decryption algorithm is standardized and known. (If it is not, the VM is subject to the same decompilation issues as the bytecode was in your other scenarios.) That defeats the entire purpose and makes decrypting the "natively" encrypted bytecode trivial.

        There is no scheme ever that works — by definition. The only way to prevent reverse engineering is having control of the hardware.

        Makeshifts last the longest.

        I got the idea from diotalevi. I don't remember his exact words, but he said Visual Basic might be what I'm looking for. On the other hand, he also told me never, ever to use Archive::Tar, and disappeared when I questioned him, leaving me and another monk confuddled in CB. He might have been being sarcastic both times. Reckless sarcasm --.

        You said "(That's just a simplication, of course; decompilers need to be a bit more sophisticated to handle a command that maps to several lines of lower level code, for instance)"

        Therein lies the major difference between a machine language interpreter and a machine language to high level language compiler. The former obviously must exist to run the program, but the latter is not necessary in programming, and is difficult to build.

        This is basic stuff. I'm not going against common computer industry knowledge with this. Compiled programs for which there is no complete, free, well known decompiler are more safe from piracy.

        A reply falls below the community's threshold of quality. You may see it by logging in.
      These days the big guys like Microsoft are just trying to buy politicians since none of the technologogical "fixes" work all that well.

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://388382]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others scrutinizing the Monastery: (3)
As of 2018-10-20 06:01 GMT
Find Nodes?
    Voting Booth?
    When I need money for a bigger acquisition, I usually ...

    Results (112 votes). Check out past polls.

    • (Sep 10, 2018 at 22:53 UTC) Welcome new users!