Plateforme Level Extreme
Abonnement
Profil corporatif
Produits & Services
Support
Légal
English
Encryption & Indexing - What do you do?
Message
De
04/05/2007 12:03:28
 
Information générale
Forum:
Visual FoxPro
Catégorie:
Base de données, Tables, Vues, Index et syntaxe SQL
Versions des environnements
Visual FoxPro:
VFP 8 SP1
OS:
Windows XP SP2
Network:
Windows 2003 Server
Database:
Visual FoxPro
Divers
Thread ID:
01222371
Message ID:
01222530
Vues:
17
> Most likely, you are not really using different keys, but somehow generate keys out of the existing one,
> for example by adding data from the record, the ID, or something similar.

Yes, I used this for hashing a password in a user table with the user id, so even if users would be able to get at that table, they couldn't simply copy their password hash to a record of another user to be able to misuse that account and then restore the original password hash. Of course if you knew that you could also change ids, but that's what's stored in fields that log who has done something or to whom something belongs and so you could login as that other username, but would again have your own user id.

Bye, Olaf.
Précédent
Répondre
Fil
Voir

Click here to load this message in the networking platform