× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



The main goal is to control and record access to the images by date/time,
user id and image reference.  I recognize that I'll have very little control
over the image once they've accessed it, and hopefully that will remain
beyond the scope of requirement.


"Metz, Zak" <Zak_Metz=siea6+IIpMo@public.gmane.org> wrote in message
47CE319ED137D411BDCE00D0B774BF550704A999@mdg1ex01.g1.com">news:47CE319ED137D411BDCE00D0B774BF550704A999@mdg1ex01.g1.com...
> If preventing people from "stealing" your TIFFs is the goal of this
> project, I would strongly suggest you reconsider the viability. As
> someone who spends a large part of his evenings "stealing" art from
> record label websites for the legitimate purpose of using that art in
> conjunction with music reviews, I can tell you without hesitation that
> you are never going to stop it.
>
> > -----Original Message-----
> > From: Joe Pluta
[mailto:joepluta=8+0R355eNL3AKuVPhbf8BAC/G2K4zDHf@public.gmane.org]
> >
> > > From: Mandy.Shaw=Nims4PqErV1OSnsfY10OVw@public.gmane.org
> > >
> > > We do this by making a servlet deliver the binary data
> > straight to the
> > > browser, rather than just using an URL that points to the
> > image file. We
> > > store the image in a BLOB in DB2, but you could no doubt do
> > the same by
> > > reading the binary data out of an image file if necessary.
> >
> > The only caveat being that you no longer take advantage of
> > caching.  That
> > is, every time the user wants to see the image, it must be
> > downloaded again.
> > The good news, from a security standpoint, is that the TIF
> > isn't stored in
> > the browser's temporary cache (from which it can be copied
> > and distributed).
> >
> > Joe
> NOTICE: This E-mail may contain confidential information. If you are not
> the addressee or the intended recipient please do not read this E-mail
> and please immediately delete this e-mail message and any attachments
> from your workstation or network mail system. If you are the addressee
> or the intended recipient and you save or print a copy of this E-mail,
> please place it in an appropriate file, depending on whether
> confidential information is contained in the message.
>
> _______________________________________________
> This is the Java Programming on and around the iSeries / AS400 (JAVA400-L)
mailing list
> To post a message email: JAVA400-L=Zwy7GipZuJhWk0Htik3J/w@public.gmane.org
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo.cgi/java400-l
> or email: JAVA400-L-request=Zwy7GipZuJhWk0Htik3J/w@public.gmane.org
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/java400-l.
>
>




As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.