Reverse Engineering

Advance .NET Assembly Internal

Abstract In the previous article of this series, we gained an understanding of the assembly loading process, its format, and anatomy. This article looks at advanced concepts of assemblies, such as their classification in the form of private and shared assemblies, strong names, security, and global assembly caches. We’ll also gain an understanding of publisher […]

Authentication

Authentication is supposedly deemed to be the first line of defense in software’s, requires a combination of passkey from the end-user to manipulate the application further. Hence, the organization ought to incorporate the befitting authentication measures from grass root level in the form of policies into their logistics infrastructure to tighten the security of software […]

Scroll to top