FOREX QUANT

August 17, 2007

Mistigri – MT4 Obfuscator

Filed under: Uncategorized — by TraderMade @ 2:01 pm
Tags: , , ,

http://www.mistigri.net/Products/MetaTrader/Obfuscator.php

Rather than contemplate whether to publish your work or not, let’s just make it a bit more difficult for the bad guys because is it worth it for you to give away a free indicator or script or expert and have some person (jackass) decompile and give the source code away? I have heard that there is a group out there that dedicates all its time decompiling anything they can get their hands on … bastards.

This product will remove all comments from your original mql file and will also format the code in such a way that it will be very hard and it will take a lot of time to make any sense out of it.

Download the MT4 Obfuscator at the bottom of this page, copy it into your experts folder. Double click on MT4Obfuscator.exe, on the prompt window type in the name of the file to obfuscate. For example “MACD.mq4” then press enter. Note that the file name can not have a space in it … Then enter the output file name. For example “Obfs_MACD.mq4” and press enter. When the app is done press any key to exit the app.

Now in the MetaTrader 4 editor open the obfuscated file, in my example “Obfs_MACD.mq4” file and compile. Should you choose to distribute your EA, make sure to send out the obfsucated ex4 file.

(*)

1 Comment »

  1. Where can I get a copy of the MT4Obfuscator program

    Comment by Gary — June 21, 2008 @ 2:22 am |Reply


RSS feed for comments on this post. TrackBack URI

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Blog at WordPress.com.

%d bloggers like this: