Calling opcode string discussion
#18
Quote:Programs can be run directly from source code in memory
without producing a binary. Instead, the compiled image is
assigned to allocated memory and executed directly. Just in Time

 I'm not sure I understood JIT ,  does it means that you can use a JIT
module to interpret a source code program so that it runs in system 
memory.  

But hackers can easily open up the  source code program and read its
contents.  It is more like an interpreter ?  
There is no protection against reverse engineering?  

Perhaps you can show me an example program with JIT module to see if
it can be protected against.  BTW, please give me a link to download the
OxygenBasic compiler and JIT module.  Thanks
Reply


Messages In This Thread
RE: Calling opcode string discussion - by Anne Wilson - 02-05-2025, 05:36 PM

Forum Jump:


Users browsing this thread: 3 Guest(s)