 |

Skater .NET Obfuscator
|
|
|
Rustemsoft proposes Skater .NET Obfuscator, an obfuscation tool for .NET code protection. It implements all known software protection techniques and obfuscation algorithms.
If you would like periodically obfuscate your .NET products the Skater .NET Obfuscator is for you. Rustemsoft is using the Skater for internal needs securing all Rustemsoft .NET executables and assemblies. Its command-line version running in batch mode is much useful for your scheduled products updates. You have to assign settings for an assembly in GUI version first. Then the batch obfuscate task will use the settings.
|
|
|
Just over a year ago we discovered that someone had created a keygen for our Archive Manager software. 2 years of work could have gone up the spout, and the dangers of developing software on the .Net platform (e.g how easy assemblies are to reverse engineer) became very clear.
We looked around at all the different products that were on the market and they were all either far too expensive or really complicated. We just wanted something that we could point at our final compiled versions of our assemblies, hit 'go', and then distribute the protected article.
Skater.Net fitted the bill perfectly, and was the best value for money solution that we found (and we looked at a lot of those on offer!).
So, I would like to thank you for producing what is a great bit of software.
A change of licence keys a year ago, and an extra couple of minutes to scramble the final assemblies before we distribute a new version and the problem of key gens and such has completely gone away.
Good Job :-)
Mark Laverty
President
MLtek, England
mltek.co.uk
|
|
I first purchased Skater Pro in 2008 for a commercial application I needed
to secure, and it did the job. Since then I have upgraded my development
environment up to VS 2010 on Windows 7, so I decided to purchase an upgrade
of Skater to get the current version. Wouldn't you know, I had a problem
with very first assembly that I tried to obfuscate. However, I emailed the
problem assembly to them and the Rustemsoft team came through with a
corrected Skater the same day. That's great customer support!
Stephen Rosenbaum
Independent Software Developer
Weston, Florida, US
|
|
Thank you for the Skater! I'm using the Skater to obfuscate a suite of applications used by a NASCAR Cup Team. It's a competitive environment full of people who really want to know how everything works! I go back and confirm each obfuscation with Lutz Roeder's .Net Reflector, and I really like what I can't see :-)
Michael Bearden , Head of software and engineering services
Apex Educational Technologies, Inc.
Shreveport, LA, USA
|
|
It works great! I love the Visual Studio 2005 integration. I have a lot of constants and strings in my projects. I obfuscated them all then tried to view them using Lutz Roeder's .NET Reflector version 4.2.51.0 and I could not read them at all. It works great and for the price it's a no brainer to use this great product.
This product is more efficient than Microsoft's refactoring power toy, and is very easy to use!
Ryan J. Birnesser
Systems Software Designer/Programmer, Pioneer Pole Buildings, Inc.
Schuylkill Haven, PA
|
|
Unauthorized access to source code can offer a quick back entrance into your systems, business processes and revenue streams. Global piracy rate has increased 40% over the past years and nearly $11 billion is lost. This is definitely a clear threat for software producers and thus to global economy. With more than half of million developers with some level of access to .NET reengineering tools providing near instant access to source from any .NET binary, organizations across industries are entrusting on obfuscation to managing these risks. Over the years, several software protection techniques have been developed, code obfuscation is one of them and it is very promising.
|
|
|
|
 Code obfuscation is a form of software protection against unauthorized reverse-engineering.
The chief functions of any software protection technique can be determined as detection of pirate attempts to decipher or tamper software, protection against such attempts and alteration of software to ensure that it functionality degrades in an undetectable manner if the protection fails.
|
|
Cardinal obfuscation techniques:
|
|
|
|