
27 Apr
2009
27 Apr
'09
3:28 p.m.
On Mon, 27 Apr 2009 11:21:11 -0400, "Sid Sacek" <ssacek@securewatch24.com> wrote:
When a hacker dumps an executable, they can see all of the strings the program might use, and some of those strings may contain sensitive information. Does boost have any classes that can encode the strings at compile-time? Ideally, the third string in the code below would never compile the "secret" string into the final binary.
Excuse my asking, but what kind of security do you hope to achieve with this? -- EA