Robert Gracie
Robert at servicexp.com
Sun Jan 29 08:50:59 CST 2006
-----Original Message----- From: accessd-bounces at databaseadvisors.com [mailto:accessd-bounces at databaseadvisors.com] On Behalf Of William Hindman Sent: Monday, April 21, 2003 11:28 AM To: accessd at databaseadvisors.com Subject: Re: [AccessD] Secured vs. Unsecured FEs ...securing your code is fairly simple and effective with XP encryption, mdes, and ms security ...plenty of examples in the archives on this topic ...but definitely insist upon installing your own key logging detection software (I prefer Pest Patrol) so that they can't grab your passwords ...and use REAL passwords and encrypt everything! ...langa's list just pointed out how simple it is to bypass unencrypted security using linux boot CDs on Win systems ...incredible :) ...the lock-in shouldn't be a major problem ...you'd still have access to your code libraries but using your templates and tools would be problematic ...you'd have to rekey a module rather than just import it ...less productive than you otherwise are but not a death blow ...point that out to them and factor it into your price :) William Hindman "All it takes for evil to prevail is for good men to do nothing." Edmund Burke ----- Original Message ----- From: "Michael R Mattys" <michael.mattys at adelphia.net> To: <accessd at databaseadvisors.com> Sent: Monday, April 21, 2003 10:38 AM Subject: Re: [AccessD] Secured vs. Unsecured FEs > The problems are: > > I am locked in and cannot transfer anything in or out. > How to secure the code? > > Mike Mattys > > ----- Original Message ----- > From: "William Hindman" <wdhindman at bellsouth.net> > To: <accessd at databaseadvisors.com> > Sent: Monday, April 21, 2003 10:30 AM > Subject: Re: [AccessD] Secured vs. Unsecured FEs > > > > ...send him to me! :))) > > > > ...my goal at this stage of my retirement is to convince every > > client that > I > > can support them over a high-speed VPN ...from Costa Rica > :)))))))))))))))) > > > > ...the only objection I'd have is that you definitely want to work > > on one > of > > their workstations rather than on their server ...otherwise, as long > > as > you > > secure your code, I don't see the problem ...unless you mean he's actually > > expecting you to accomplish ALL development across the VPN rather > > than > just > > interfacing with his systems for installation and maintenance ...now that > > could be a real drag since the term "high speed VPN" is essentially > > meaningless in a development mode ...he'd have to give you a > > dedicated T1 > to > > keep you as productive as you are on a local workstation ...and even then > > there would be problems such as access to all your own code > > libraries, development tools, and template mdbs :( > > > > William Hindman > > "All it takes for evil to prevail is for good men to do nothing." > > Edmund Burke > > > > > > ----- Original Message ----- > > From: "Michael R Mattys" <michael.mattys at adelphia.net> > > To: <accessd at databaseadvisors.com> > > Sent: Monday, April 21, 2003 10:05 AM > > Subject: Re: [AccessD] Secured vs. Unsecured FEs > > > > > > > I have a client who wants me to do all development over a > > > high-speed VPN on their server. > > > > > > In what manner should I agree to this? Or not? > > > > > > Mike Mattys > > > > > > ----- Original Message ----- > > > From: "William Hindman" <wdhindman at bellsouth.net> > > > > ...yes, always unless the client stipulates otherwise ...and > > > > then I > > > include > > > > a clause about individual copyrights where such code is used AND > charge > > > him > > > > a stiff differential for it ...client response varies ...most > > > > really > > don't > > > > care about the code, they get it confused with the ownership of their > > data > > > > ...but for those that do, its available. > > > > > > > > William Hindman > > > > "All it takes for evil to prevail is for good men to do nothing." > Edmund > > > > Burke > > > > > > > > ----- Original Message ----- > > > > From: "Stephen Bond" <stephen at bondsoftware.co.nz> > > > > > William, do you ever assert ownership of the code at the > > > > > beginning > of > > a > > > > contract? Down here, the law says it is the client's unless > > > > asserted > at > > > the > > > > start of the contract, so I do. > > > > > > > > > _______________________________________________ > > > AccessD mailing list > > > AccessD at databaseadvisors.com > > > http://databaseadvisors.com/mailman/listinfo/accessd > > > Website: http://www.databaseadvisors.com > > > > > > > > > _______________________________________________ > > AccessD mailing list > > AccessD at databaseadvisors.com > > http://databaseadvisors.com/mailman/listinfo/accessd > > Website: http://www.databaseadvisors.com > > _______________________________________________ > AccessD mailing list > AccessD at databaseadvisors.com > http://databaseadvisors.com/mailman/listinfo/accessd > Website: http://www.databaseadvisors.com > _______________________________________________ AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com