Information générale
Catégorie:
Base de données, Tables, Vues, Index et syntaxe SQL
Versions des environnements
Network:
Windows 2003 Server
> Most likely, you are not really using different keys, but somehow generate keys out of the existing one,
> for example by adding data from the record, the ID, or something similar.
Yes, I used this for hashing a password in a user table with the user id, so even if users would be able to get at that table, they couldn't simply copy their password hash to a record of another user to be able to misuse that account and then restore the original password hash. Of course if you knew that you could also change ids, but that's what's stored in fields that log who has done something or to whom something belongs and so you could login as that other username, but would again have your own user id.
Bye, Olaf.
Précédent
Répondre
Voir le fil de ce thread
Voir le fil de ce thread à partir de ce message seulement
Voir tous les messages de ce thread
Voir tous les messages de ce thread à partir de ce message seulement