Preview

Prg211 Individual Programming Fundamentals

Good Essays
Open Document
Open Document
793 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Prg211 Individual Programming Fundamentals
Programming Reusability of Code Fundamentals

PRG/211
April 13, 2013

Introduction
Some of the differences between procedural programming modules and objects are subtle but significant. In a procedural program, modules interact by reading and writing state that is stored in shared data structures.
Yet in an OOP, modules in the form of objects interact by sending messages to other objects. The power of OOP comes from the ability to inherit, encapsulate, and abstract that procedural logic. The importance of OOP is not as much in the language mechanism as it is in the thinking and designing process.
You need to think of state and operations together as an entity, and then design your program as interactions between entities that exchange state and activate operations. OOP then is more of a design philosophy, and if I may say an art, then something with a rigorous definition or hard and fast rules.
Security In Terms Of Hiding Code
There are many ways and methods by which a programmer can hide his code that is developed for commercial or personal use. .NET applications have a high cost and are susceptible to attacks by on unethical traders integrate market as stakes run high in hacking these codes. Thus, .NET Obfuscators play a vital role in protecting these programs. The Merriam-Webster dictionary defines Obfuscation as: to make obscure <obfuscate the issue>: confuse <obfuscate the reader>: To be evasive, unclear, or confusing. It also means to confuse or bewilder.
While making a program in .NET for commercial usages, there are many methods which are used to prevent reverse engineering and unauthorized usage of that particular program. While keeping the code 's functionality intact, the obfuscation methodology changes the coding in such a way that it becomes quite difficult even with tools to reverse engineer. Remember it becomes difficult not impossible to reverse engineer an obfuscated code. There are numerous ways and means to



References: http://stackoverflow.com/questions/530741/whats-the-difference-between-a-procedural-program-and-an-object-oriented-progra ; http://www.merriam-webster.com/dictionary/obfuscate http://stackoverflow.com/questions/5167853/how-to-hide-or-secure-javascript-code-from-client-side; http://www.differencebetween.net/technology/software-technology/difference-between-data-hiding-and-data-encapsulation/ http://uk.answers.yahoo.com/question/index?qid=20100107145333AA9vN0T ; https://en.wikipedia.org/wiki/Procedural_programming#Comparison_with_object-oriented_programming ; http://encyclopedia2.thefreedictionary.com/Code+reuse http://www.answers.com/topic/reusability

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The data access object (DAO) software program design pattern encapsulates use of data by concealing its difficulty from end users (University of Phoenix, 2005). This design pattern is a concept offering an abstract interface to a database or perseverance method, which it only provides a few specified functions excluding the visibility of the database particulars. The DAO includes a mapping from the software calls to its perseverance layer that isolates the general public interface of the DAO.…

    • 579 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Newport News County has a T-Ball league in Hampton, VA situated in the Mallory community. . This is a part of a large community of the local T-Ball and youth league programs offered in the area. The league is for young children between the ages of four and seven. The league is for building character, teaching team work and development. Each T-ball team consists of 12-14 kids from all the surrounding cities. The league allows for parents to come in and volunteer as a means to save cost. Though all cities don't have a team, those that have teams are named after current MLB team names.…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Mat 540 Week 4 Paper

    • 1775 Words
    • 8 Pages

    Although the details can be quite complex, these details are the basic principles of object-oriented programming.…

    • 1775 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Code running within the .NET framework is called managed code and this has been fully optimized for performance and secured to…

    • 1025 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Psy300 Week 8

    • 760 Words
    • 4 Pages

    Understanding object-oriented methodologies is often difficult. You already understand that object-oriented analysis and design emulates the way human beings tend to think and conceptualize problems in the everyday world. With a little practice, object-oriented programming will become second nature to you.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    here is for the specter of a quiz to always be hanging over the student where he knows he…

    • 83928 Words
    • 594 Pages
    Powerful Essays
  • Good Essays

    6. Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by _____.…

    • 1518 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Lab 3 Student

    • 1264 Words
    • 7 Pages

    This lab accompanies Chapter 2 (pp. 56-68) of Starting Out with Programming Logic & Design.…

    • 1264 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There is no law against reverse engineering. Once someone invents a product they can do to it whatever they wants. The codes were public property.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    Large numbers of binary planting vulnerabilities known as “dll spoofing” or “dll preloading attacks” have been discovered in third party applications running on Microsoft windows platforms.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 research

    • 481 Words
    • 2 Pages

    Software reverse engineering is done to retrieve the source code of a program because the source code was lost, to study how the program performs certain operations, to improve the performance of a program, to fix a bug (correct an error in the program when the source code is not available), to identify malicious content in a program such as a virus or to adapt a program written for use with one microprocessor for use with another. Reverse engineering for the purpose of copying or duplicating programs may constitute a copyright violation. In some cases, the licensed use of software specifically prohibits reverse engineering.…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Forensic Science

    • 2510 Words
    • 11 Pages

    • Data Contraception – Prevent evidence data from existing somewhere that can be analyzed – E.g. Memory only malware, memory only exploitation • Data Hiding – Put the data on disk but put it somewhere the forensic analyst is unlikely to look – E.g. Defilers toolkit, runefs,…

    • 2510 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    File Management

    • 803 Words
    • 4 Pages

    Although a wide range of access is being used, there is still a list of representatives with access rights that can be designated to a certain user for a unique file. One way is masking the existence of the file, leaving the user oblivious to its existence. If by chance the user gain knowledge of the files existence and owner identification, a petition to the owner can be put in place to gain additional access rights. There are ways where the user can load and execute a program with copy restrictions. Propriety programs are an example of this because they are made accessible to users with this restriction (Stallings, 2012).…

    • 803 Words
    • 4 Pages
    Good Essays