Subject | Re: [ib-support] Security Problem |
---|---|
Author | Daniel Rail |
Post date | 2001-11-05T13:41:02Z |
At 05/11/2001 06:35 AM, you wrote:
to a system without having any rights to access it. It's done by being
able to work around or disable the safety guards put in place.
There is not much that a good hacker can't get into. Everytime a new
security feature is put in place in a software, there's always a hacker
that wants to test it or tries to find another way in.
Blowfish, RSA, etc...). We use Blowfish. A search on the web would give
you answers on how they work. Also, if you are using Delphi, some
components do exist. An example of data that would be encrypted are the
credit card numbers.
Daniel Rail
Senior System Engineer
ACCRA Group Inc. (www.accra.ca)
ACCRA Med Software Inc. (www.filopto.com)
>Fred wrote:If you mean by what's the definition, then it's when someone gains access
>
>What's hackable?
to a system without having any rights to access it. It's done by being
able to work around or disable the safety guards put in place.
There is not much that a good hacker can't get into. Everytime a new
security feature is put in place in a software, there's always a hacker
that wants to test it or tries to find another way in.
>Can you give some advice or example or encrypted?There are a few encryption algorithms out there that you can use (i.e.:
Blowfish, RSA, etc...). We use Blowfish. A search on the web would give
you answers on how they work. Also, if you are using Delphi, some
components do exist. An example of data that would be encrypted are the
credit card numbers.
Daniel Rail
Senior System Engineer
ACCRA Group Inc. (www.accra.ca)
ACCRA Med Software Inc. (www.filopto.com)