Subject | Re: [ib-support] Database protection |
---|---|
Author | Nando Dessena |
Post date | 2001-11-23T14:25:58Z |
Josce,
Probably on the server, since it has to be able to read the database.
If one has the data on his machine, and is sufficiently determined,
there is *nothing* you can do to prevent him to access the data.
I think you can strip the source of the stored procedures from the
system tables while preserving the compiled (blr) version, but that's
about as far as you can get.
Have a look at the RDB$SOURCE in RDB$PROCEDURES (I think).
Ciao
--
____
_/\/ando
> Are there any plans for implementing a username/password logic to thewhere would you put the logic to control this username/password pair?
> individual *.gdb files?
Probably on the server, since it has to be able to read the database.
If one has the data on his machine, and is sufficiently determined,
there is *nothing* you can do to prevent him to access the data.
I think you can strip the source of the stored procedures from the
system tables while preserving the compiled (blr) version, but that's
about as far as you can get.
Have a look at the RDB$SOURCE in RDB$PROCEDURES (I think).
Ciao
--
____
_/\/ando