在分发 .exe 文件之前应注意什么
.exe 是否包含任何必须注意的个人计算机信息(如果有的话)以及在提供独立的 .exe 文件之前必须做什么?
Does an .exe contain any personal computer information (what if any) that must be taken care of and what must be done before giving out a standalone .exe file?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(3)
唯一的个人信息是
.pdb
文件的路径,例如“c:\path\to\outdir\Release\program.pdb”。它对于事后调试可能很有用,因此只需根据需要更改输出目录即可。
The only personal information is path to
.pdb
file, like "c:\path\to\outdir\Release\program.pdb".It may be useful for post-mortem debugging, so just change output directory if needed.
这取决于您的开发系统和配置。例如,如果您使用 Visual Studio,则新项目将在 VS 注册时包含您的姓名。
第一步是右键单击该exe,转到属性并查看其中有哪些信息。
第二件事是使用资源编辑器查看您的 exe 中存储了哪些资源(但是,如果您编写了它,您可能已经知道这些资源了)。
It depends on your development system and your configuration. For example, if you use Visual Studio, new projects will include your name as VS is registered.
The first step is to right click the exe, go to properties and see what information is there.
The second thing would be to use a resource editor to see what resources are stored in your exe (however, if you wrote it, you may well know those resources already).
如果您自己编写了 EXE,则可能会使用各种反汇编程序、十六进制编辑器对其进行反汇编以发现逻辑,甚至更改程序的逻辑。
如果您想防止这种情况发生,您可能需要研究打包和混淆。
http://en.wikipedia.org/wiki/Reverse_engineering
If the EXE you have yourself coded, it might be disassembled to discover logic or even alter the logic of program using various disassembler , hex editors.
You might want to look into packing and obfuscation if you want to prevent this.
http://en.wikipedia.org/wiki/Reverse_engineering