Configuring the Protection Process
Agile.net is designed to provide a layered protection against IP theft and unauthorized distribution of your code. There are many ways you can configure the protection process; the following section describes the different types of protection operations offered.
- Code Virtualization — Transforms original code into virtual opcodes that will only be understood by an internal Virtual Machine.
- Code Encryption — Protects the code itself; replaces method bodies with empty method stubs.
- Symbol Renaming — Renames classes and methods to unreadable characters.
- Method Call Obfuscation — Obfuscate all calls even to system libraries and third party controls.
- String Obfuscation — Encodes strings exposing sensitive data that may be used to analyze your code.
- Resource Encryption — Encrypts your managed resources.
- Assemblies Merging — Combines a set of assemblies into a single file.
- Control Flow Obfuscation — Hides the control flow of your program by transforming code into semantically equivalent but structurally different constructs.
- Declarative Obfuscation — Uses attributes to control which types and members should or should not be obfuscated.