Level Extreme platform
Subscription
Corporate profile
Products & Services
Support
Legal
Français
Data security
Message
From
24/03/1999 21:02:59
 
 
To
24/03/1999 18:05:22
General information
Forum:
Visual FoxPro
Category:
Other
Title:
Miscellaneous
Thread ID:
00201661
Message ID:
00201707
Views:
15
>I got a question from some client: what can be done to prevent some user from opening Windows Explorer and copying DBF files to floppy disk(s). This imaginable thief supposed to be user of VFP system they already have, i.e. s/he has access to the network drive where all data files reside. Could someone really familiar with WinNT networks give some advice here?
>TIA
>

The easiest thing to do is to not give the user any rights to write to a removable medium drive; IOW, set up the system so that only specific userids have write permissions to the drives. In general, this is a better measure than not having the drives present if you can prevent people from easily obtaining privileged user passwords.

From that point, it's a matter of how smart the thief would be. If the user had write permissions to the local drive, he'd have the option of booting to DOS or Win9x and then copying to floppy disk from DOS. One approach to prevent this attack would be to use NTFS on the local drive; DOS, without a driver like NTFSDOS, couldn't read from the NTFS partition to get at the data.

The sufficiently-determined thief can get the data IAC; stealing backups, emailing files, copying to a place where some other system without a secured drive can see the data and copy it is unavoidable. If the user can gain read access to the DBF, write access to removable media, and has a way to copy it to the media, you're SOL.

A backend can make it far tougher to get at the data, but if the thief can do a query and write a text file as output, the data is gone.

>PS: I understand that removing floppy drives from PCs is an option :-).
EMail: EdR@edrauh.com
"See, the sun is going down..."
"No, the horizon is moving up!"
- Firesign Theater


NT and Win2K FAQ .. cWashington WSH/ADSI/WMI site
MS WSH site ........... WSH FAQ Site
Wrox Press .............. Win32 Scripting Journal
eSolutions Services, LLC

The Surgeon General has determined that prolonged exposure to the Windows Script Host may be addictive to laboratory mice and codemonkeys
Previous
Reply
Map
View

Click here to load this message in the networking platform