Plateforme Level Extreme
Abonnement
Profil corporatif
Produits & Services
Support
Légal
English
Data security
Message
Information générale
Forum:
Visual FoxPro
Catégorie:
Autre
Titre:
Divers
Thread ID:
00201661
Message ID:
00201792
Vues:
23
>>>>PS: I understand that removing floppy drives from PCs is an option :-).
>>>
>>>Well, this is sure the safest way to do it!
>>>
>>>In WinNT, the floppy drive(s) can be hidden for specific users. But I don't know how to do it (while I'm also interested). Probably Ed Rauh can give more info. Try also www.ntfaq.com
>>>
>>
>>It's pretty easy - just limit write permissions to removable media on a user by user basis using the user manager and the properties sheet for the device.
>
>But it does not prevent from copying the files through the network to another workstation and use it to copy onto floppy when another user is gone to the bathroom... :)

If you noticed, I said that in another message; not only that, but if you can copy it to the local drive and can get out of NT to DOS or Win9x, if you've got a FAT partition, the file can be read and the floppy won't be protected IAC.

We're dealing with several different security issues here - the operating system enforced security of NT can help make life more difficult for the would-be theif, but bypassing NT, or getting a privileged userid and password, or going to another station that isn't secured adequately, and your data has been stolen. If the user can get to the raw file and write to removable media, you're out of luck.

It's actually worse than that - a system that can pose queries against tables and write them out, even if not into a .DBF, is a way of getting around the security, too.
EMail: EdR@edrauh.com
"See, the sun is going down..."
"No, the horizon is moving up!"
- Firesign Theater


NT and Win2K FAQ .. cWashington WSH/ADSI/WMI site
MS WSH site ........... WSH FAQ Site
Wrox Press .............. Win32 Scripting Journal
eSolutions Services, LLC

The Surgeon General has determined that prolonged exposure to the Windows Script Host may be addictive to laboratory mice and codemonkeys
Précédent
Répondre
Fil
Voir

Click here to load this message in the networking platform