× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



No.   Never decrypt a password.  Don't give a hacker a chance to to be
able to dump your program, or scan memory with a rogue pointer, or
something and find out the passwords.

Instead, when a user keys in his password, encrypt THAT, then compare
it to the original encrypted copy.

On Thu, 23 Jan 2003 Mike.Barton@pinkroccade.co.uk wrote:
>      you could change the access program to adopt authority
> but this will not work if a user has *ALLOBJ authority.
> Possibly the best route would be to encrypt the data and than have the
> program de-encrpyt it.
>


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.