<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=JScript.Encode</id>
	<title>JScript.Encode - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=JScript.Encode"/>
	<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=JScript.Encode&amp;action=history"/>
	<updated>2026-05-13T05:25:38Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>http://debianws.lexgopc.com/wiki143/index.php?title=JScript.Encode&amp;diff=4061504&amp;oldid=prev</id>
		<title>imported&gt;Danhash: ce</title>
		<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=JScript.Encode&amp;diff=4061504&amp;oldid=prev"/>
		<updated>2025-05-29T14:52:57Z</updated>

		<summary type="html">&lt;p&gt;ce&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Short description|Javascript encoding method developed by Microsoft}}&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;JScript.Encode&amp;#039;&amp;#039;&amp;#039; is a method created by [[Microsoft]] used to [[Obfuscation (software)|obfuscate]] both server and [[Client-side JavaScript]] or [[VB Script]] source code in order to protect the [[source code]] from [[copying]].&amp;lt;ref name=msse&amp;gt;{{cite web|url=http://www.microsoft.com/mind/0899/scriptengine/scriptengine.asp |title=Script Encoding with the Microsoft Script Engine Version 5.0 |date=Aug 1999 |publisher=Microsoft |first=Andrew |last=Clinick |work=Script Engine |url-status=dead |archive-date=2002-12-14 |archive-url=https://web.archive.org/web/20021214024403/http://www.microsoft.com/mind/0899/scriptengine/scriptengine.asp }}&amp;lt;/ref&amp;gt; JavaScript code is used for creating [[dynamic web content]] on many websites, with the source code easily viewable, so this was meant to protect the code.&lt;br /&gt;
&lt;br /&gt;
The encoding is a simple [[polyalphabetic substitution]] using three alphabets.&amp;lt;ref name=vc&amp;gt;{{cite web|url=http://virtualconspiracy.com/content/articles/breaking-screnc |title=Breaking the Windows Script Decoder |website=Virtual Conspiracy |url-status=dead |archive-date=2013-12-08 |archive-url=https://web.archive.org/web/20131208110057/http://virtualconspiracy.com/content/articles/breaking-screnc |quote=&amp;lt;small&amp;gt;Security by obscurity is a bad, bad idea. Instead of encouraging that approach, Microsoft should educate programmers to find other ways to store their passwords and sensitive data, and tell them that an algorithm or any other piece of code that needs to be &amp;#039;hidden&amp;#039;, is just bad design&amp;lt;/small&amp;gt; }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==How to use==&lt;br /&gt;
A [[command line]] script encoder can be used to encode scripts.&amp;lt;ref name=msse /&amp;gt;&amp;lt;ref&amp;gt;{{cite web|url=http://www.microsoft.com/mind/0899/code/Clinick0899.exe |title=Clinick0899.exe |format=program |date=Aug 1999 |publisher=Microsoft |first=Andrew |last=Clinick |url-status=dead |archive-date=2002-12-14 |archive-url=https://web.archive.org/web/20021214024403/http://www.microsoft.com/mind/0899/code/Clinick0899.exe |quote=&amp;lt;small&amp;gt;The command-line script encoder (screnc.exe) provides a simple mechanism for encoding HTML, ASP, SCT, VBScript, and JScript files. The Microsoft Script group developed it as an easy-to-use command-line tool that can be easily built into your existing deployment batch files&amp;lt;/small&amp;gt; }}&amp;lt;/ref&amp;gt; To encode a [[HTML]] web-page file called {{mono|default.htm}}, use the following command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
screnc.exe default.htm defaultenc.htm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It would output to a file called {{mono|defaultenc.htm}}.&lt;br /&gt;
&lt;br /&gt;
==Weaknesses==&lt;br /&gt;
It has been [[Reverse engineering|reverse engineered]]&amp;lt;ref name=vc /&amp;gt; and many websites provide an on-the-fly decoder.&amp;lt;ref&amp;gt;{{cite web |url= https://gist.github.com/bcse/1834878 |date= Feb 15, 2012 |title= Windows Script Decoder |first= Grey |last= Lee |website= GitHub |quote= Decoding &amp;lt;code&amp;gt;JScript.Encoded&amp;lt;/code&amp;gt; }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
* [https://gist.github.com/bcse/1834878 Windows Script Decoder]&lt;br /&gt;
&lt;br /&gt;
[[Category:Internet Explorer]]&lt;br /&gt;
&lt;br /&gt;
{{windows-stub}}&lt;/div&gt;</summary>
		<author><name>imported&gt;Danhash</name></author>
	</entry>
</feed>