![]() See what is it exactly installing and which registry keys are modified or created? That's one reason software authors use obfuscators - to prevent others from reverse-engineering their code and to protect their intellectual property. To extract files from MSI, see To decompile managed binaries, get.Net reflector from ' If someone ran an obfuscator (such as ) on the code, though, all bets are off. ![]() A simple google search would have gave you these information.įrom: 'You can extract your MSI package to a local folder and then run.Net Reflector to decompile binaries you are interested. As a general note to software developers, you should use a plugin like DCryptDll if you need to protect certain files in your installer. A decompression plug-in is also available for TotalCommander. Supports decompressing NSIS installers compressed with lzma or bzip, but the source code is still partially compiled and requires extensive modification before the script can be recompiled. There are, however, external tools that allow this. It is the developer's choice whether the source code and/or the files for the installer are available to the public or not. The installer itself doesn't provide any method to extract files or the script without installation. Thaman667 25th January 2013 08:44 UTC Currently NSIS installers cannot be fully decompiled. Fix Windows Errors and Optimize PCFix Windows Errors Optimize Your System No Blue Screen, No.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |