Plateforme Level Extreme
Abonnement
Profil corporatif
Produits & Services
Support
Légal
English
JVP, flexibility of databases
Message
 
À
23/11/2003 13:18:44
Walter Meester
HoogkarspelPays-Bas
Information générale
Forum:
Visual FoxPro
Catégorie:
Autre
Divers
Thread ID:
00851534
Message ID:
00852807
Vues:
39
>
- Security can be reached by using COM/DCOM/COM+/remote control/ layers which shields the database from the user.
>

That presents a lot of work Walter - and this defeats the flexibility argument. And quite frankley, it is rather ineffective. The user needs access to the network share the dbf's are on. And, once that access is present, there is nothing to stop the user from copying and/or opening the data with Excel, Access, etc. Agreed, there are some elaborate measures that developers can go through to try and lock down security - but in the end, none of it comes close to what an integrated security model can achieve.

You mention DCOM above. Have you every succesfully deployed anything with DCOM? I haven't - and it was not through a lack of trying. There is a reason why MS decides to leave DCOM/COM in the dust - to diffult - to kludge at times to administer.
Précédent
Suivant
Répondre
Fil
Voir

Click here to load this message in the networking platform