From: Eric Murray <ericm@lne.com>
To: shamrock@cypherpunks.to
Message Hash: b4c982cbf4e39fba7439a8b23d641e70c2b09eba910fb0c948588443b90382a0
Message ID: <199710291645.IAA26435@slack.lne.com>
Reply To: <Pine.BSF.3.96.971028165130.13198F-100000@pakastelohi.cypherpunks.to>
UTC Datetime: 1997-10-29 16:52:47 UTC
Raw Date: Thu, 30 Oct 1997 00:52:47 +0800
From: Eric Murray <ericm@lne.com>
Date: Thu, 30 Oct 1997 00:52:47 +0800
To: shamrock@cypherpunks.to
Subject: Re: Source code obfuscation
In-Reply-To: <Pine.BSF.3.96.971028165130.13198F-100000@pakastelohi.cypherpunks.to>
Message-ID: <199710291645.IAA26435@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain
Lucky Green writes:
>
> Is anyone familiar with tools that can be used to
> obscure source code so that it builds, but no longer
> contains comments or useful variable or procedure
> names?
cfront.
--
Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com
(email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5
Return to November 1997
Return to ““William H. Geiger III” <whgiii@invweb.net>”