at .LoadController.propogateStateMessage(LoadController.java:153).at .EventBus.dispatchQueuedEvents(EventBus.java:300).at .EventBus.dispatch(EventBus.java:317).at .SynchronizedEventHandler.handleEvent(SynchronizedEventHandler.java:45).at .EventHandler.handleEvent(EventHandler.java:69).Caused by: : ic2/core/item/tool/ItemNanoSaber.at .FMLClientHandler.beginMinecraftLoading(FMLClientHandler.java:161)..LoaderException: : ic2/core/item/tool/ItemNanoSaber.
Really?! Who in this world that want to write its code in Chinese? In code! You can read binary without disassembler? Ahaha. Inspite of that, you can't deal with ANYTHING, even not obfuscated without basic tools such as decompiler, SAE (and like programs, for C# reverse engineering). It is an uncommon example, most of examples just contain renamed classes with chinese (ah, i hate chinese symbols in code! ) or encrypts MSIL into something as they think ununderstandable, but it isn't. And here you have to deal with OllyDbg and know assembler. Some obfuscators "wraps" their MSIL into raw native win32 binary, so. As you know, there are lots of obfuscation strategies, some of those are not easy-to-reverseengineer. Reverse engineering is my favorite occupation. NET Framework 3.5, i'm now learning java for future work) experiance in C#, know it veery-veeery well). I have a great (really great, i know C# (as for. but soon understand that it is useless, better to use C#). There is bytecode-like language named MSIL (i even wrote some programs using it. I specialize at C# (read at wikipedia ) such java-like language. NET Framework 3.5, i'm now learning java for future work) experiance in C#, know it veery-veeery well. Note: everything here is about C#, but it is kinda like Java, so this opinion can exist. Ever without specialized tools or MCP you can reverseengineer any java code.