Eek, Rafe is mostly correct. Security is moot if somebody is willing to spend the time, effort or money to unravel your secrets. Unfortunately, some secrets stand out like a sore thumb and don't require much time or effort.
I have to admit that I like to snoop, from time to time. I take shortcuts that tell me a bit (often, quite enough) about software packages without violating EULAs by "disassembling", "decompiling" or "reverse engineering". Several associates have been amused while watching me press the Page Down key in a binary file editor while scanning an EXE or DLL. They watch millions of hieroglyphs flash by in a blur and then gasp when I stop, press Page Up and start taking notes.
"How could you possibly understand that?!?"
"I couldn't. I was looking for the API declarations."
At least I'm honest. Formulas wouldn't be so easy to unravel but they could be cracked in a matter of hours (minutes for some pros) if they are associated with text.
If you are worried about somebody taking the next step, i.e., setting break points and tracing the JMPs, I suggest that you look into application compression/encryption. I believe PKware has a stable 32-bit version of PKlite. There are probably quite a few others.
This technology makes it
extremely difficult to disassemble or view the contents of an executable. The National Security Agency could crack it fairly easily with their Super LOL Computers but that technology isn't available to most commercial ventures.
Good luck. Have fun. Take it easy. Your competitors will find it much more cost efficient to develop the technology independently, rather than stealing it from you.
Alt255@Vorpalcom.Intranets.com