Jump to content

hugh

Members
  • Posts

    3
  • Joined

  • Last visited

    Never

hugh's Achievements

Newbie

Newbie (1/14)

0

Reputation

  1. QUOTE(Mikkel @ Nov 15 2007, 03:35 AM) I have heard that C is much easier to reverse engineer than Labview so I do not think I would. i also have contacted Labview and here is their reply Hey Hugh, This is Ryan from National Instruments. As in my previous email, in version 8.0 and less you can change the file name of the .exe application to .llb and see a list of the vi's that are used in the program. You cannot get back to the block diagram from a .exe. If you want to add a further layer of protection then you can completely remove diagrams from the source code before you even compile down into a .exe. Make sure you back up your program because when you remove the block diagrams you can't get them back. Here is a link on how to remove the block diagrams from the source code: And here is a link to what is exactly happening when you remove them from the source code: I have verified this information with a LabVIEW Platinum member. Let me know if this answers your question. Regards, Ryan Northington Applications Engineering National Instruments
  2. Assuming that someone really wanted to reverse engineer my executable like a large corporation. they send it to Russia and throw a ton of money at it. But I dont make any sense of my internal VI names would they be able to accomplish this and could I make it even harder for them to do this. I am a small company and the last company my partner started got ripped off by a huge company who just infringed on our patents and put us out of business and we just did not have the money to battle them in court. QUOTE(MikaelH @ Nov 14 2007, 03:45 PM)
  3. I have software that I want to be selling to customers how easily can someone take an exe that is installed on their computer and reverse engineer it to see the algorithms in my code
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.