I tried to look into source code of these files and understand them.
But some parts of source code are
much more advanced to comprehend.
How can we understand them?
Yeah, that's a part of the source code which is obfuscated by NetBeans.
As explained in NetBeans 7.3 Release Notes, NetBeans 7.3 enables the ability to generate JAR files which are obfuscated to make them more difficult to reverse engineer:
JAR files produced by NetBeans can now be obfuscated. Java applet JAR files produced by the NetBeans applet wizard can now be obfuscated. Obfuscating an applet JAR file is useful when a company's intellectual property is embedded in an applet, for example a company name, a logo, the text of an ad, etc.
But obfuscation is not a perfect process and code can be recovered even after obfuscation. See this blog post for the code which was recovered using PEiD from the obfuscated code.
This is done using a decompiler which extracts some "metadata" of the obfuscated code, but NetBeans is no longer using an external decompiler.
In NetBeans, a decompiler is created as a plugin using the Java Decompiler Extension:
Under NetBeans IDE 7.3, the Java Decompiler can be installed as a Java Decompiler Extension. To do this, install NetBeans IDE 7.3 and follow the steps listed below to install a Java Decompiler Extension.
NetBeans IDE 7.3 can be downloaded here.
I think that this means that NetBeans is no longer using a Java Decompiler and therefore you can't use plugins like PEiD.
title: "Installing the Exchange 2007 MAPI client"
description: "Learn how to install the Microsoft Exchange 2007 MAPI client components on your computer."
# Installing the Exchange 2007 MAPI client
- Skype for Business 2015
The Exchange 2007 MAPI client is installed and 0b46394aab