• to obfuscation in natural language, code obfuscation may involve using unnecessarily roundabout ways to write statements. Programmers often obfuscate code...
    18 KB (1,668 words) - 15:19, 26 April 2025
  • indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating any two programs that...
    23 KB (2,298 words) - 12:53, 10 October 2024
  • criteria at a specified time Software development process – Process by which software is developed Obfuscation (software) – Deliberate creation of...
    6 KB (695 words) - 21:22, 5 December 2024
  • Thumbnail for Security through obscurity
    to know Obfuscation (software) Secure by design AACS encryption key controversy Full disclosure (computer security) Code talker Obfuscation Concealment...
    14 KB (1,408 words) - 10:41, 8 April 2025
  • Thumbnail for ProGuard
    ProGuard (redirect from ProGuard (software))
    open-source software portal Computer programming portal Java (programming language) Program optimization Obfuscation (software) Dotfuscator DashO (software) "Eric...
    4 KB (252 words) - 05:59, 20 December 2024
  • communication by making it difficult to understand. Obfuscation may also refer to: Obfuscation (software), creating code that is intentionally difficult for...
    487 bytes (101 words) - 15:22, 26 April 2025
  • or software platform is the infrastructure on which software is executed. While the individual components of a computing platform may be obfuscated under...
    10 KB (972 words) - 16:48, 5 March 2025
  • Malware (redirect from Malicious software)
    investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the...
    76 KB (7,587 words) - 11:47, 9 May 2025
  • cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was...
    7 KB (979 words) - 14:23, 8 March 2025
  • Thumbnail for Proprietary software
    Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright...
    44 KB (4,905 words) - 00:11, 12 May 2025
  • Thumbnail for Telegram (software)
    server-side software is closed-source and proprietary. Pavel Durov said that it would require a major architectural redesign of the server-side software to connect...
    213 KB (19,111 words) - 13:08, 13 May 2025
  • Thumbnail for Software cracking
    followed is a "good boy". Proprietary software developers are constantly developing techniques such as code obfuscation, encryption, and self-modifying code...
    25 KB (2,765 words) - 16:43, 10 May 2025
  • Thumbnail for Undetectable.ai
    Undetectable.ai) is an artificial intelligence content detection and modification software designed to identify and alter artificially generated text, such as that...
    10 KB (835 words) - 17:31, 16 April 2025
  • hardware obfuscation modifies the design in such a away that the resulting architecture becomes un-obvious to an adversary. Hardware Obfuscation can be...
    8 KB (1,115 words) - 02:32, 26 December 2024
  • The Obfuscated Perl Contest was a competition for programmers of Perl which was held annually between 1996 and 2000. Entrants to the competition aimed...
    2 KB (253 words) - 02:41, 9 October 2024
  • Software companies focusing on the development of open-source software (OSS) employ a variety of business models to solve the challenge of making profits...
    72 KB (8,334 words) - 23:19, 1 May 2025
  • Thumbnail for Skype
    Skype (redirect from Skype (software))
    Erik; John, Wolfgang (27 July 2010). "Breaking and Improving Protocol Obfuscation" (PDF). Technical Report. ISSN 1652-926X. "Skype's new super wideband...
    99 KB (9,228 words) - 14:40, 13 May 2025
  • Code morphing (category Software obfuscation)
    Code morphing is an approach used in obfuscating software to protect software applications from reverse engineering, analysis, modifications, and cracking...
    3 KB (309 words) - 01:03, 5 November 2024
  • Anti-tamper software is software which makes it harder for an attacker to modify it. The measures involved can be passive such as obfuscation to make reverse...
    8 KB (890 words) - 23:10, 1 May 2025
  • general notions of obfuscation, in particular, to Black-box obfuscation, proven to be impossible, and to Indistinguishability obfuscation, constructed recently...
    20 KB (2,481 words) - 12:46, 21 October 2024
  • Thumbnail for International Obfuscated C Code Contest
    out zero bytes, equivalent to its source code. In the effort to take obfuscation to its extremes, contestants have produced programs which skirt around...
    23 KB (2,874 words) - 07:37, 26 February 2025
  • Sam Spade is a discontinued Windows software tool designed to assist in tracking down sources of e-mail spam. The same name was also used for a related...
    3 KB (312 words) - 13:19, 6 December 2024
  • person, via the support system. Re-sales were possible with Game Object Obfuscation, or GOO for short. GOO is GameStop's client-free DRM solution which allows...
    9 KB (892 words) - 12:53, 10 December 2024
  • Gray-box testing (category Software testing)
    understand the requirements and verify its correctness. Object-oriented software consists primarily of objects; where objects are single indivisible units...
    9 KB (1,036 words) - 22:35, 28 November 2024
  • eD2k protocol extensions are "peer exchange among clients", "protocol obfuscation" and support for files larger than four gigabytes, etc. The other eD2k...
    19 KB (2,262 words) - 06:45, 23 April 2025
  • used to avoid censorship, especially when configured to use traffic obfuscation techniques. A censor may be able to detect and block use of circumvention...
    47 KB (4,278 words) - 08:21, 16 April 2025
  • Win32/Autorun Win32/Dorkbot Win32/Obfuscator A key changer or keychan is a variation of a keygen. A keychan is a small piece of software that changes the license...
    8 KB (877 words) - 09:22, 2 May 2025
  • This list of Apache Software Foundation projects contains the software development projects of The Apache Software Foundation (ASF). Besides the projects...
    41 KB (4,631 words) - 23:25, 10 May 2025
  • Thumbnail for Reverse engineering
    anti-tamper technology like obfuscation is used to deter both reverse engineering and re-engineering of proprietary software and software-powered systems. In...
    56 KB (7,094 words) - 14:44, 11 May 2025
  • Thumbnail for Snaptube
    Snaptube (category 2014 software)
    engage in this fraudulent ad activity and uses chains of redirection and obfuscation to hide its activity. Jacobs, Jesse (2020-06-17). "SnapTube: Why you...
    4 KB (355 words) - 19:01, 16 April 2025