Re: security in programming

2016-03-08 Thread AndyHC
As has been commented, if you're on dbf's they are inherently insecure (how sensitive is the data? if *very* then migrate to a dbms), but a clear-text userId hashed and used as an index against a file of hashed Id's seems pretty good to me. I have done something similar (though for more users a

Re: security in programming

2016-03-07 Thread Charlie
On 3/7/2016 9:43 AM, Stephen Russell wrote: When they open the employee table and can read a SSN is when it gets shaky. Or open the customer table and make a copy for themselves as they walk off to a new job. Or use their smart phone to take a picture of the screen full of sensitive personal

Re: security in programming

2016-03-07 Thread John R. Sowden
Your comment: Yes, that is one area of concern. Is my way best, etc. But my other concern is how the program receives that data of ID and Access Level, and how is that data packaged. Is that process a security risk. My usage is simple and often simple is easy to bypass. Example: I have 10 s

Re: security in programming

2016-03-07 Thread Peter Cushing
On 07/03/2016 17:16, John R. Sowden wrote: Let me address a few issues: 1) My question was regarding making the software association between the user data in the user database, along with his/her authority level and id, and the executing program. Are you talking about a better way to limit/c

Re: security in programming

2016-03-07 Thread John R. Sowden
Let me address a few issues: 1) My question was regarding making the software association between the user data in the user database, along with his/her authority level and id, and the executing program. 2) The security issue of my .dbf files is another issue. First, I link some data to ot

Re: security in programming

2016-03-07 Thread Jean Laeremans
Want secure ? Don't connect to the net. On Mon, Mar 7, 2016 at 3:43 PM, Stephen Russell wrote: > When they open the employee table and can read a SSN is when it gets shaky. > > Or open the customer table and make a copy for themselves as they walk off > to a new job. > > > > On Mon, Mar 7, 2016

Re: security in programming

2016-03-07 Thread Stephen Russell
When they open the employee table and can read a SSN is when it gets shaky. Or open the customer table and make a copy for themselves as they walk off to a new job. On Mon, Mar 7, 2016 at 7:48 AM, Ted Roche wrote: > Well, nothing is secure, given North Korea has nuclear weapons. But > that's

Re: security in programming

2016-03-07 Thread Ted Roche
Well, nothing is secure, given North Korea has nuclear weapons. But that's not the question, really. "Secure against what?" If the curious can read your DBFs in Excel, they may gain information that you have a column named FooBar that holds integer values. If the significance of FooBar isn't obvi

Re: security in programming

2016-03-07 Thread Alan Bourke
IMO if your data is in DBF files, it's not secure. -- Alan Bourke alanpbourke (at) fastmail (dot) fm ___ Post Messages to: ProFox@leafe.com Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox OT-free version of this list: http:/

Re: security in programming

2016-03-06 Thread Wollenhaupt, Christof
> > I encrypt entered passwords, compare them to encrypted stored passwords, > ala linux. I am comfortable with that. I hope you mean hashed... Encrypting passwords is not a lot more secure than storing passwords unencrypted, especially considering the lack of libraries with modern encryption ro

security in programming

2016-03-05 Thread John R. Sowden
applications that I use need to be secure and have an audit trail. I encrypt entered passwords, compare them to encrypted stored passwords, ala linux. I am comfortable with that. My concern is relating the authorized user, with their access level to the actual programs. Currently I use the: