Desaware Home
Products    Purchase    Publishing    Articles   Support    Company    Contact    
Licensing System
Professional Services
Universal .NET
Universal COM
.NET Books
Moving to VB .NET: Strategies, Concepts and Code
Introduction
Table of Contents
Sample Chapter
Sample Code
Updates
Visual Basic .NET or C#: Which to Choose
Updates
Regular Expressions with .NET
Updates
Obfuscating .NET: Protecting your code from prying eyes
Updates
Tracing and Logging in .NET
Telling Time with .NET
Hijacking .NET (series)
Exploring .NET (series)
COM Books
Other Books

bluebar
Contact Desaware and order today

bluebar
Sign up for Desaware's Newsletter for the latest news and tech tips.

Note: This page describes a product or book that, while still relevant to .NET programmers, is based on an earlier version of the .NET framework. The page is available for archival purposes and as a courtesy to those who have linked to it, but is no longer being updated or maintained.
Buy Now

Hijacking .NET (series)
$9.95 each [eBook]

Overview

Book Cover
Tap into the hidden power of the .NET framework

Hijacking .NET is today's equivalent of using undocumented Windows API functions. Except that not only are the functions under discussion undocumented, they are actually private - functions internal to the .NET framework that were never intended to be used from outside.

In this new eBook series, Dan Appleman will teach you how to find these hidden functions, how to use disassembly and common sense to figure out what they do, and how to implement code that uses them (along with a straightforward explanation of the relative risks of doing so).

Volume 1: Role Based Security

In this first volume, you'll learn a few lines of .NET code can allow you to determine which roles (groups) an account belongs to. You'll learn how to extend a couple of .NET classes using hidden method calls and a few API calls to allow you to easily set the account and group security for a file or directory.

Volume 2: Protecting your code

In this volume, you'll learn about the security implications of using reflection to access private members in an assembly, and about the design patterns and specific methods you can use to prevent others from using these techniques on your assemblies.

 

Books
Migrating Windows Services :
 
Products    Purchase    Articles    Support    Company    Contact
Copyright© 2012 Desaware, Inc. All Rights Reserved.    Privacy Policy