Jackson Ching wrote:

> Hi,
>
>         Correct me if i'm wrong, Since class file can be decompiled, and servlets 
>are on server side, wouldn't it be dangerouse if your servlets can be decompiled by 
>hackers (they can know your codes).
>
>         Is there a way for your class files not to be reverse engineered?
>

Being able to decompile a class file presumes that you can read the bytecodes of the 
class file, right?

The recommended placement for class files in a web application is the WEB-INF/classes 
or WEB-INF/lib directory in a web application based on the servlet 2.2 or later 
specification.  There is an additional
requirement in this spec -- the servlet container is not allowed to serve any file 
under WEB-INF in response to a client request.  Therefore, your putative hacker cannot 
get ahold of the bytecodes of your
servlets (unless you happen to store them someplace else in your document root, which 
would be a "bad thing"), and they can therefore not decompile your classes.

>
> Jack
>

Craig McClanahan

___________________________________________________________________________
To unsubscribe, send email to [EMAIL PROTECTED] and include in the body
of the message "signoff SERVLET-INTEREST".

Archives: http://archives.java.sun.com/archives/servlet-interest.html
Resources: http://java.sun.com/products/servlet/external-resources.html
LISTSERV Help: http://www.lsoft.com/manuals/user/user.html

Reply via email to