From: nospam-seesignature@ceddec.com
To: Lucky Green <shamrock@cypherpunks.to>
Message Hash: 71a9dd7ab2e63c12bc9f6c30cd73c8ceb3cca3d76453aff1b66768a6fd1850d9
Message ID: <97Nov11.112812est.32258@brickwall.ceddec.com>
Reply To: <Pine.BSF.3.96.971028165130.13198F-100000@pakastelohi.cypherpunks.to>
UTC Datetime: 1997-11-11 16:39:26 UTC
Raw Date: Wed, 12 Nov 1997 00:39:26 +0800
From: nospam-seesignature@ceddec.com
Date: Wed, 12 Nov 1997 00:39:26 +0800
To: Lucky Green <shamrock@cypherpunks.to>
Subject: Re: Source code obfuscation
In-Reply-To: <Pine.BSF.3.96.971028165130.13198F-100000@pakastelohi.cypherpunks.to>
Message-ID: <97Nov11.112812est.32258@brickwall.ceddec.com>
MIME-Version: 1.0
Content-Type: text/plain
On Tue, 28 Oct 1997, Lucky Green wrote:
>
> Is anyone familiar with tools that can be used to
> obscure source code so that it builds, but no longer
> contains comments or useful variable or procedure
> names?
>
> Thanks,
> -- Lucky Green <shamrock@cypherpunks.to> PGP encrypted email preferred.
> "Tonga? Where the hell is Tonga? They have Cypherpunks there?"
>
Gimpel Software makes C-Shroud (commercial). They also have a very good
Lint utility.
--- reply to tzeruch - at - ceddec - dot - com ---
Return to November 1997
Return to ““William H. Geiger III” <whgiii@invweb.net>”