Abstract:
Tampering with pieces of software is inhibited. Software obfuscation inhibits reverse engineering by hackers by manipulating names of functions and adding jump instructions into various pieces of software. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.
Abstract:
Tampering with pieces of software is inhibited. Software obfuscation inhibits reverse engineering by hackers by manipulating names of functions and adding jump instructions into various pieces of software. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.
Abstract:
An improved application architecture comprises a bifurcated structure having a language neutral portion and a localizable portion, compacted for efficiency into a smaller set of larger files. This bifurcated structure allows for easier distribution and updating of the application, while the reduced set of files provides for more efficient file management. A resource manifest can be specified during the compile stage to identify elements that are language specific and elements that remain language neutral. Furthermore, additional software can be used after compilation for compacting multiple localizable elements into a single file. Such compacting software can receive inputs specifying the language specific resources which are to be compacted into larger files, and the identity of those larger files. In addition, a file format can be used that can contain multiple language specific resources and can facilitate retrieval and access of individual language specific resources by the relevant language independent code.
Abstract:
A system and method for converting a source data sequence to a target encoding is disclosed. A fallback technique, specifiable by a user program component, is applied to data in the source data sequence that cannot be mapped to the target encoding. A particular embodiment involves methods for encoding a Unicode string as a sequence of bytes in a target encoding, and decoded the encoded bytes back to Unicode.
Abstract:
In a computer operating system having a user interface, a resource loader, and a registry resource database, a method for dynamically verifying whether the resource content of a resource module is compatible with the most current version of the operating system. Upon obtaining a request for a resource, the resource loader verifies that the resource modules remain compatible with the operating system prior to loading a resource from an alternate resource module. In accordance with one embodiment of the present invention, the operating system has a multilingual user interface and utilizes resource modules that are language specific.
Abstract:
An application program interface (API) provides a set of functions, including a set of base classes and types that are used in substantially all applications accessing the API, for application developers who build Web applications on Microsoft Corporation's .NET™ platform.
Abstract:
Tampering with pieces of software is inhibited. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires protection from tampering is also provided.
Abstract:
Tampering with pieces of software is inhibited. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires protection from tampering is also provided. Another process for determining whether the hardware resources, such as the central processing unit or the cache memory on a computing machine, belong to a class for which inhibiting software tampering is possible, is also provided.
Abstract:
An application program interface (API) provides a set of functions for application developers who build Web applications on Microsoft Corporation's .NET™ platform.
Abstract:
Tampering with pieces of software is inhibited. Service protection inhibits tampering by allowing various unauthorized services to execute. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.