A while ago I noticed that a system that I had developed to query a vfp database using the Internet Database Connector was advertised as for sale on the Internet, exactly the same except that it queried Access.
On investigation I found that someone in the office of the ISP where I had the system running had gone over it and adaped it to make a product. That person is an expert at packaging software and marketing it.
Of course I immediately found another server. But the question arises - How to guard against this kind of thing from happening?
When we develop applications that run on Internet servers the code is all over the place and there is always going to be people who have access.
Any thoughts from you seasoned business veterans.
Thankyou - Chris Haynes