May The Source Stay With You
A look at real-life best practices and practical experience in protecting your source code from prying eyes and malicious users. We will use Reflector and ILDASM to analyze code vulnerability, and evaluate appropriate defense mechanisms. Topics covered include naming conventions, obfuscation and control flow obfuscation, licensing, and general coding tips.
- Not Interested