Oracle JDeveloper (MOSC)

MOSC Banner

Code Obfuscation (to prevent reverse-engineering) techniques/tools suitable for EAR files

We have built our Fusion ADF application using Oracle Jdeveloper(12.2.1.2). The Application includes - Oracle ADF Desktop Integration, Oracle ADF Security, Oracle ADF Web service data control, Oracle ADF remote task-flows, Oracle ADF Business Component’s Service Interfaces, Oracle ADF Data Controls for BI, Integration with Oracle Fusion Middleware features such as MDS, OPSS, OWSM, High Availability and Clustering.

The extension files that we're using in our application includes - .java( for beans,POJOs), .js, .html, .css, .jspx, .jsf, .jsff, .xml(mostly for task-flows and pageDefinitions), wsdl (webservices calls), .cpx(page definitions), .properties, .jpx

Functionality wise - lots of db connections, webservices calls, page flows, page definitions, page fragments, task flows, skins, we have various jar files too.

Tagged:

Howdy, Stranger!

Log In

To view full details, sign in to My Oracle Support Community.

Register

Don't have a My Oracle Support Community account? Click here to get started.

Category Leaderboard

Top contributors this month

New to My Oracle Support Community? Visit our Welcome Center

MOSC Help Center