I have this task to configure a software product that uses SQL Server as its database. However, much of their code is stored in encrypted stored procedures in the database. Does anyone know how to decryt an encrypted stored procedure? This product is suposed to be configurable. However, they have their code hidden. I can't understand this why they would do this, especially since they do not provide any detailed manuals for configuration reference.