Eazfuscator.NET 2019.3 (Release build 2019.3.264.30958) - Eazfuscator, Fixed, issue, Windows, assembly, support, information, program

Eazfuscator.NET 2019.3 (Release build 2019.3.264.30958)

Eazfuscator.NET 2019.3 (Release build 2019.3.264.30958)
Eazfuscator.NET 2019.3 (Release build 2019.3.264.30958)


Eazfuscator.NET is the obfuscator for .NET platform. Sure, you love your code. We all do! Chances are that you want to shelter your precious intellectual property. Eazfuscator.NET helps to protect .NET code and your valuable assets.

Why is it good?
Eazfuscator.NET is easy as 1-2-3:

It protects your code, without breaking it — even in most complex cases — we have taken care of it. You can consider Eazfuscator.NET as a good partner who helps you a lot, and still doesn't bother you with any of his problems. If you have some really special protection requirements, pay attention to our code virtualization feature.
It really is easy to use: once protect your Visual Studio project with the Eazfuscator.NET Assistant tool, then forget about it. Every time you build your project in Release configuration, the assembly gets obfuscated automatically you can release your code to the wilderness.
Need some settings to be changed? Are you sure? Then, do what you love: edit your code. Eazfuscator.NET is fully configurable by using .NET obfuscation attributes in contrast to using alien-looking and unstable configuration files and UI wizards. All you need to know is in our complete product documentation.

Symbols renaming
When we develop a program, we often present the most valuable information in form of symbol names: names of functions, variables, classes. This information is precious to an intruder who wants to get an understanding of our software.

The simplest and the most effective approach to conceal this information is to make the names irrelevant to what happens inside the program. We will just make the names of all the symbols unreadable — when it is possible.

String encryption and compression
Other thing that discloses the information about how a program functions is strings. To hide this information, Eazfuscator.NET substitutes the strings in your code with calls of special encryption functions, which render your strings perfectly at runtime, leaving them unreadable to an intruder. Also, these functions make the size of your strings lesser by compressing them.

Code and data virtualization
There are situations when we want to protect a part of our program more than anything else. We think of a person who would inspect our code as of well-motivated and of one who would go for a desperate measures. In this case, the symbols and strings protection is just not enough.

Here we offer you a radical approach: to change the way your program is presented in memory and on disk. Our code virtualization technique translates your .NET byte code to a totally unrecognizable random-generated byte sequence, which still perfectly functions at runtime. In other words, each time you obfuscate your program, we generate a new custom virtual machine to work for you!

Automatic code optimization
Many of us have dreamt of being able to know every performance-sensitive aspect of the platforms and programming languages we use. This way, we would always be careful to write only the fastest code. Still, not many of us are actually aware of all the performance-related details, which often change while the platform evolves.



With Eazfuscator.NET, you don't need to be a .NET performance expert to make the top-performing applications. We perform code optimization automatically for you by replacing code fragments which are proven to be slow with their faster equivalents — behind the scenes. In some cases, optimization may make your code faster by hundreds of times. Right now there is a big list of scenarios we take into account during the optimization. And this list will grow.

Resource encryption and compression
If your product is ambitious enough, it includes many valuable assets. Almost any popular application includes a designer-created icon set. If you are a game developer, the original game sounds would cost you a lot. When your assembly resources contain security information such as private keys, it becomes very sensitive.

To cover all these things protected, we transparently encrypt the resources for you when you ask it.

Code control flow obfuscation
The .NET languages compilers usually generate similar MSIL code fragments for the similar fragments of your high-level code. This fact allows the decompiler tools to reverse-engineer the high-level code (in C#, for example) from the .NET assemblies.

Eazfuscator.NET supports an advanced technique called control flow obfuscation, when the MSIL code gets replaced with functionally equivalent, but different instructions. Decompilers often crash on such code, so this may stop an intruder from trying to break into your assembly.

Assemblies merging and embedding
In some cases, we need to make one assembly from several ones. There are two methods of doing this: merging and embedding.

Eazfuscator.NET merges or embeds assemblies for you in easy way: you need to add one line of code to your project, where you specify which assembly to mix in. We are responsible for all this to be done correctly and quietly — during the obfuscation process.

XML documentation filter
If you are developing a class library, it is very probable that you use the auto-generated XML documentation files. The security problem concerning them is that they contain information describing your library implementation details: names and descriptions for private types, methods and fields.

We take care to automatically remove all the implementation-disclosing data from the XML documentation files.

Debugging support
After your assembly is obfuscated with Eazfuscator.NET, it doesn't become a brick of non-debuggable mess. You can always get a line number where an unhandled exception appeared, view a readable stack trace, and even attach the debugger to walk through your obfuscated code.

Supported Platforms and Technologies
The full list of platforms and technologies supported by Eazfuscator.NET:

.NET Framework .NET Framework versions 2.0 – 4.7.2
.NET Standard versions 1.0 – 2.0
.NET Core versions 1.0 – 3.0
XAML with intelligent renaming of symbols
Enterprise-grade technologies: ClickOnce, VSTO, VSIX, MEF, Entity Framework, ASP.NET and many others
Universal Windows Platform (UWP)
.NET Native
Gaming technologies:
Unity for Windows, Mac OS, iOS, Android and Windows Phone platforms
MonoGame for Windows
XNA applications for Windows, Xbox 360 and Zune platforms
Windows Store applications: Windows 8 – 8.1, Windows Phone 7 – 8.1
Silverlight 2 – 5 assemblies and XAP packages
.NET Compact Framework versions 2.0, 3.5 and 3.9
Third-party platforms: Mono and Xamarin
Integration with Microsoft Visual Studio Microsoft Visual Studio 2005 – 2019 including Express editions.

Eazfuscator.NET 2019.3
Highlights:
- Visualization of homomorphically encrypted regions of code
- .NET Core 3.0 support
- .NET Standard 2.1 support
- Visual Studio 2019 version 16.3+ support
- JetBrains Rider 2019.2 support
- Added ability to mark static method as a module initializer
- Improved homomorphic encryption coverage
- Improved Visual Studio integration

Other changes:
- Improved ASP.NET Core support
- Improved .NET Native support
- Fixed issue with a locked file that could occur during update installation
- Fixed issue in method overload matching of 'ref readonly' return types
- Fixed bug that could lead to an issue with default values of optional method parameters
- Fixed VM issue that might occur in compiler-generated async state machine code
- Fixed XML Documentation Filter issue with nested generic classes
- Fixed XML Documentation Filter issue that occurred in MSBuild project integration mode
- Fixed XAML issue that could lead to "Unknown BAML record type 0x22" error during obfuscation
- Fixed issue with .NET Core reflection introspection
- Fixed issue with .NET Native compilation that could occur when code control flow obfuscation was on
- Fixed issue with UWP assembly merging that could lead to an endless loop in merger




Only for V.I.P
Warning! You are not allowed to view this text.