|Subject||Re: [IB-Architect] Fw: Mischievous SYSDBA|
>I don't think gback would necessarily be needed in an embedded application.
>Problem: gbak will need the key (or whatever) to access the restriction
>portion of the database. Unless we can come up with something tricky,
>this means giving the key to the system administrator, who is the one
>we're trying to protect the data from.
Couldn't you just copy gdb the file?
>Does this mean that the protection mechanism must work throughSooner or later everything has to go through the native API doesn't it? I
>sanctioned program using these interfaces? Defining something
>that is accessible through ODBC is quite a different beast than
>something limited to the native API.
am afraid I am very ignorant in this regard. I just assumed that the ODBC
drivers would use the native API.
Due Diligence Inc. http://www.diligence.com/ Americas Background
If your company isn't doing background checks, maybe you haven't considered
the risks of a bad hire.