[AccessD] Secured vs. Unsecured FEs

Robert Gracie Robert at servicexp.com
Sun Jan 29 08:50:59 CST 2006


 

-----Original Message-----
From: accessd-bounces at databaseadvisors.com
[mailto:accessd-bounces at databaseadvisors.com] On Behalf Of William Hindman
Sent: Monday, April 21, 2003 11:28 AM
To: accessd at databaseadvisors.com
Subject: Re: [AccessD] Secured vs. Unsecured FEs

...securing your code is fairly simple and effective with XP encryption,
mdes, and ms security ...plenty of examples in the archives on this topic
...but definitely insist upon installing your own key logging detection
software (I prefer Pest Patrol) so that they can't grab your passwords
...and use REAL passwords and encrypt everything! ...langa's list just
pointed out how simple it is to bypass unencrypted security using linux boot
CDs on Win systems ...incredible :)

...the lock-in shouldn't be a major problem ...you'd still have access to
your code libraries but using your templates and tools would be problematic
...you'd have to rekey a module rather than just import it ...less
productive than you otherwise are but not a death blow ...point that out to
them and factor it into your price :)

William Hindman
"All it takes for evil to prevail is for good men to do nothing." Edmund
Burke

----- Original Message -----
From: "Michael R Mattys" <michael.mattys at adelphia.net>
To: <accessd at databaseadvisors.com>
Sent: Monday, April 21, 2003 10:38 AM
Subject: Re: [AccessD] Secured vs. Unsecured FEs


> The problems are:
>
> I am locked in and cannot transfer anything in or out.
> How to secure the code?
>
> Mike Mattys
>
> ----- Original Message -----
> From: "William Hindman" <wdhindman at bellsouth.net>
> To: <accessd at databaseadvisors.com>
> Sent: Monday, April 21, 2003 10:30 AM
> Subject: Re: [AccessD] Secured vs. Unsecured FEs
>
>
> > ...send him to me! :)))
> >
> > ...my goal at this stage of my retirement is to convince every 
> > client
that
> I
> > can support them over a high-speed VPN ...from Costa Rica
> :))))))))))))))))
> >
> > ...the only objection I'd have is that you definitely want to work 
> > on
one
> of
> > their workstations rather than on their server ...otherwise, as long 
> > as
> you
> > secure your code, I don't see the problem ...unless you mean he's
actually
> > expecting you to accomplish ALL development across the VPN rather 
> > than
> just
> > interfacing with his systems for installation and maintenance ...now
that
> > could be a real drag since the term "high speed VPN" is essentially 
> > meaningless in a development mode ...he'd have to give you a 
> > dedicated
T1
> to
> > keep you as productive as you are on a local workstation ...and even
then
> > there would be problems such as access to all your own code 
> > libraries, development tools, and template mdbs :(
> >
> > William Hindman
> > "All it takes for evil to prevail is for good men to do nothing." 
> > Edmund Burke
> >
> >
> > ----- Original Message -----
> > From: "Michael R Mattys" <michael.mattys at adelphia.net>
> > To: <accessd at databaseadvisors.com>
> > Sent: Monday, April 21, 2003 10:05 AM
> > Subject: Re: [AccessD] Secured vs. Unsecured FEs
> >
> >
> > > I have a client who wants me to do all development over a 
> > > high-speed VPN on their server.
> > >
> > > In what manner should I agree to this? Or not?
> > >
> > > Mike Mattys
> > >
> > > ----- Original Message -----
> > > From: "William Hindman" <wdhindman at bellsouth.net>
> > > > ...yes, always unless the client stipulates otherwise ...and 
> > > > then I
> > > include
> > > > a clause about individual copyrights where such code is used AND
> charge
> > > him
> > > > a stiff differential for it ...client response varies ...most 
> > > > really
> > don't
> > > > care about the code, they get it confused with the ownership of
their
> > data
> > > > ...but for those that do, its available.
> > > >
> > > > William Hindman
> > > > "All it takes for evil to prevail is for good men to do nothing."
> Edmund
> > > > Burke
> > > >
> > > > ----- Original Message -----
> > > > From: "Stephen Bond" <stephen at bondsoftware.co.nz>
> > > > > William, do you ever assert ownership of the code at the 
> > > > > beginning
> of
> > a
> > > > contract? Down here, the law says it is the client's unless 
> > > > asserted
> at
> > > the
> > > > start of the contract, so I do.
> > >
> > >
> > > _______________________________________________
> > > AccessD mailing list
> > > AccessD at databaseadvisors.com
> > > http://databaseadvisors.com/mailman/listinfo/accessd
> > > Website: http://www.databaseadvisors.com
> > >
> >
> >
> > _______________________________________________
> > AccessD mailing list
> > AccessD at databaseadvisors.com
> > http://databaseadvisors.com/mailman/listinfo/accessd
> > Website: http://www.databaseadvisors.com
>
> _______________________________________________
> AccessD mailing list
> AccessD at databaseadvisors.com
> http://databaseadvisors.com/mailman/listinfo/accessd
> Website: http://www.databaseadvisors.com
>


_______________________________________________
AccessD mailing list
AccessD at databaseadvisors.com
http://databaseadvisors.com/mailman/listinfo/accessd
Website: http://www.databaseadvisors.com






More information about the AccessD mailing list