Tagged articles
26 articles
Page 1 of 1
Radish, Keep Going!
Radish, Keep Going!
Apr 8, 2026 · Backend Development

7 Guerrilla Tactics to Outsmart AI Code Assistants in Go

The article revisits Roedy Green's satirical "How To Write Unmaintainable Code" and adapts its tricks into seven concrete techniques—ranging from meaningless variable names to build‑tag mazes—that deliberately cripple AI code assistants like Claude Code while highlighting the trade‑offs for maintainability.

AILLM defenseProgramming Practices
0 likes · 12 min read
7 Guerrilla Tactics to Outsmart AI Code Assistants in Go
Java Tech Enthusiast
Java Tech Enthusiast
Aug 4, 2024 · Information Security

Java Code Obfuscation and Encryption with ProGuard, Xjar, and ClassFinal

The guide explains how to protect a Java core module deployed on user servers by integrating ProGuard for bytecode obfuscation, Xjar for JAR encryption, and ClassFinal for class‑file encryption, providing Maven plugin configurations, startup commands, and verification that the combined approach renders decompiled code empty or unreadable.

ClassFinalProGuardXjar
0 likes · 20 min read
Java Code Obfuscation and Encryption with ProGuard, Xjar, and ClassFinal
macrozheng
macrozheng
Jul 19, 2024 · Backend Development

Master Java Obfuscation: 5 Crazy Tricks to Write Unreadable Code

This article reveals five advanced Java tricks—using Unicode escapes in comments, over‑complicating simple logic with bitwise shifts, tampering with Boolean.TRUE via reflection, forcing both branches of an if‑else to run, and leveraging the Unsafe class for low‑level memory manipulation—to deliberately make code hard to understand.

ReflectionUnicodebitwise
0 likes · 12 min read
Master Java Obfuscation: 5 Crazy Tricks to Write Unreadable Code
Software Development Quality
Software Development Quality
Jul 10, 2024 · Information Security

How to Secure Mobile Apps: Comprehensive Package and Data Security Testing Guide

This article outlines a thorough mobile application security testing methodology, covering installation package verification, code obfuscation checks, signature validation, integrity and permission audits, sensitive data handling, keyboard hijacking, account protection, communication encryption, component exposure, and server-side vulnerability assessments such as SQL injection and CSRF.

Mobile Securityapp testingcode obfuscation
0 likes · 11 min read
How to Secure Mobile Apps: Comprehensive Package and Data Security Testing Guide
macrozheng
macrozheng
Jan 11, 2024 · Information Security

How to Secure Your SpringBoot Application from Decompilation with ClassFinal

This guide explains how to protect a SpringBoot-based e‑commerce project from source leakage by using code obfuscation or the ClassFinal Maven plugin, detailing configuration, startup options, decompilation results, and machine‑binding to ensure the packaged jar runs only on authorized servers.

ClassFinalJava SecuritySpringBoot
0 likes · 7 min read
How to Secure Your SpringBoot Application from Decompilation with ClassFinal
Java Captain
Java Captain
Dec 19, 2023 · Backend Development

Securing Spring Boot Production Packages with Code Obfuscation and Encryption Using ClassFinal Maven Plugin

This guide explains how to protect Spring Boot production packages from reverse engineering by applying code obfuscation with ProGuard and full encryption using the ClassFinal Maven plugin, including configuration steps, encrypted startup commands, machine‑binding activation, and the resulting decompilation behavior.

ClassFinalSpring Bootcode obfuscation
0 likes · 6 min read
Securing Spring Boot Production Packages with Code Obfuscation and Encryption Using ClassFinal Maven Plugin
MaGe Linux Operations
MaGe Linux Operations
Aug 28, 2023 · Frontend Development

How to Block Debugger and Prevent Frontend Code Inspection

This article explains why developers forbid debugging in web pages, demonstrates how repeated debugger statements can hide API calls, and provides multiple counter‑measures—including breakpoint deactivation, script ignore lists, Function‑based rewrites, and advanced obfuscated code—to protect frontend JavaScript from inspection.

Anti-debuggingJavaScriptcode obfuscation
0 likes · 5 min read
How to Block Debugger and Prevent Frontend Code Inspection
Code Ape Tech Column
Code Ape Tech Column
Nov 17, 2022 · Information Security

Java Code Obfuscation with ProGuard: A Step‑by‑Step Guide

This article explains how Java source files are compiled into class files, how they can be decompiled, and provides a detailed, code‑rich tutorial on protecting a Spring Boot project by configuring ProGuard through a proguard.cfg file and Maven plugin to produce an obfuscated JAR.

Information SecurityProGuardbackend-development
0 likes · 7 min read
Java Code Obfuscation with ProGuard: A Step‑by‑Step Guide
php Courses
php Courses
Oct 18, 2022 · Information Security

In-Memory PHP Trojan: Source Code, Explanation, and Mitigation

This article explains the concept of in‑memory PHP trojans, provides simple obfuscated source code that deletes itself and persists in RAM, discusses their stealth characteristics, and offers a basic mitigation strategy of terminating the process and removing the generated files.

Information SecurityMemory TrojanPHP
0 likes · 3 min read
In-Memory PHP Trojan: Source Code, Explanation, and Mitigation
macrozheng
macrozheng
Sep 6, 2022 · Backend Development

How to Write Java Code That Even Your Colleagues Can’t Understand

Explore a series of unconventional Java tricks—from Unicode escape hacks and bitwise tricks to reflection-based Boolean tampering and Unsafe memory manipulation—that let you deliberately obfuscate code, making it hard for teammates to read, modify, or even predict its behavior.

Reflectionbitwisecode obfuscation
0 likes · 14 min read
How to Write Java Code That Even Your Colleagues Can’t Understand
Programmer DD
Programmer DD
Dec 2, 2021 · Information Security

How to Protect Java Applications from Decompilation: Techniques and Best Practices

This article explains why Java bytecode is easy to decompile and presents several practical protection methods—including isolation, class file encryption, native code conversion, and various obfuscation techniques—while discussing their advantages, limitations, and typical use cases.

Information Securityclass encryptioncode obfuscation
0 likes · 13 min read
How to Protect Java Applications from Decompilation: Techniques and Best Practices
Ctrip Technology
Ctrip Technology
Nov 11, 2021 · Information Security

Mobile App Security Hardening: Risks, Detection Techniques, and Protection Strategies

This article examines the security challenges faced by mobile applications, outlines static, dynamic, and business‑level attack vectors, and presents comprehensive hardening techniques—including environment detection, data collection, code and algorithm obfuscation, and virtual‑machine protection—illustrated with iOS‑specific examples and code snippets.

Information SecurityMobile Securityapp hardening
0 likes · 13 min read
Mobile App Security Hardening: Risks, Detection Techniques, and Protection Strategies
Open Source Linux
Open Source Linux
Oct 28, 2021 · Fundamentals

How to Write Code Nobody Can Maintain (And Still Get Away With It)

This tongue‑in‑cheek guide enumerates a series of deliberately bad programming techniques—ranging from confusing naming conventions and deceptive comments to absurd design choices and hidden macros—aimed at making code virtually impossible to understand, maintain, or test.

bad practicescode obfuscationmaintainability
0 likes · 17 min read
How to Write Code Nobody Can Maintain (And Still Get Away With It)
Java Captain
Java Captain
Sep 19, 2021 · Fundamentals

How to Write Unmaintainable Code: A Satirical Guide

This tongue‑in‑cheek article enumerates a series of deliberately harmful programming practices—from confusing naming conventions and deceptive comments to excessive abstraction, misuse of inheritance, and avoidance of testing—intended to make code virtually impossible to understand, maintain, or debug.

code obfuscationcoding practicesjava
0 likes · 14 min read
How to Write Unmaintainable Code: A Satirical Guide
Sohu Tech Products
Sohu Tech Products
Jun 16, 2021 · Mobile Development

Android Code Obfuscation: ProGuard, R8, D8 and Build Process Deep Dive

This article provides a comprehensive guide to Android code obfuscation, covering the purpose and benefits of minification, detailed ProGuard/R8 configuration, resource shrinking, desugaring, D8/R8 internals, custom obfuscation dictionaries, and modular ProGuard rules for multi‑module projects.

AndroidD8Gradle
0 likes · 23 min read
Android Code Obfuscation: ProGuard, R8, D8 and Build Process Deep Dive
58 Tech
58 Tech
May 13, 2020 · Information Security

Dynamic Signature Strategies for API Security: Attack and Defense Techniques

This article explores the cat‑and‑mouse battle between crawlers and API endpoints, detailing how dynamic signatures, token‑based authentication, time‑bound hashes, rate‑limiting, and code obfuscation can be used to defend against scraping while also showing how attackers can reverse‑engineer and bypass these defenses.

API Securityanti‑crawlingcode obfuscation
0 likes · 12 min read
Dynamic Signature Strategies for API Security: Attack and Defense Techniques
ITPUB
ITPUB
Jun 30, 2019 · Fundamentals

How to Write Code Nobody Can Maintain – A Satirical Guide

This tongue‑in‑cheek article enumerates a series of deliberately bad programming practices—from confusing naming conventions and deceptive code tricks to misleading documentation, chaotic design, and the complete avoidance of testing—illustrating how to make software virtually impossible to maintain.

bad programming practicescode obfuscationprogramming satire
0 likes · 13 min read
How to Write Code Nobody Can Maintain – A Satirical Guide
21CTO
21CTO
May 29, 2018 · Mobile Development

Step‑by‑Step Guide to Obfuscating Objective‑C iOS Apps

This tutorial explains why iOS code obfuscation is needed, how to prepare the required scripts and PCH file, configure Xcode’s build phases, and apply the obfuscation tool to hide method and variable names, while noting its limitations to .m/.h classes.

Mobile SecurityObjective‑CXcode
0 likes · 5 min read
Step‑by‑Step Guide to Obfuscating Objective‑C iOS Apps
Meituan Technology Team
Meituan Technology Team
Apr 26, 2018 · Mobile Development

Understanding ProGuard Mapping Conflicts and Incremental Obfuscation

The article explains how ProGuard’s incremental obfuscation using –applymapping can cause mapping conflicts when previously assigned method names are overwritten, producing warnings and inconsistent names such as ‘c_’, and details the internal workflow, inline handling, and practical steps to diagnose and resolve these issues.

AndroidIncremental BuildMapping
0 likes · 18 min read
Understanding ProGuard Mapping Conflicts and Incremental Obfuscation
Beike Product & Technology
Beike Product & Technology
Mar 23, 2018 · Frontend Development

Building JavaScript from Six Characters: A jsFuck Tutorial

This article explains how JavaScript’s type coercion rules can be exploited to construct any string or code using only the characters []()+! and demonstrates step‑by‑step how to build letters, functions, and even execute code, illustrating the principles behind the jsFuck obfuscation technique.

JSFuckType Coercioncode obfuscation
0 likes · 7 min read
Building JavaScript from Six Characters: A jsFuck Tutorial
iQIYI Technical Product Team
iQIYI Technical Product Team
Sep 8, 2017 · Mobile Development

APK Size Reduction Techniques for the iQIYI Android Client

The article outlines a comprehensive set of APK‑slimming techniques for the iQIYI Android client—including pluginization, 7‑ZIP recompression, apksigner signing, duplicate‑resource removal, PNG/WebP conversion, library trimming, code obfuscation, R‑class elimination, language‑config pruning and native‑ABI reduction—that together cut the package from 54.2 MB to 28.2 MB.

APK OptimizationAndroidGradle
0 likes · 20 min read
APK Size Reduction Techniques for the iQIYI Android Client
Hujiang Technology
Hujiang Technology
Aug 7, 2017 · Frontend Development

Reverse Engineering a One‑Line JavaScript Animation: Step‑by‑Step Explanation

This article walks through the reverse‑engineering of a compact JavaScript one‑liner that draws a patterned image, refactors it into readable modules, explains each transformation—including variable renaming, loop conversion, ternary expansion, bitwise operations, and switch‑case replacement—while illustrating the underlying math with graphs and code snippets.

HTMLJavaScriptalgorithm analysis
0 likes · 18 min read
Reverse Engineering a One‑Line JavaScript Animation: Step‑by‑Step Explanation