|
The main goal is to control and record access to the images by date/time, user id and image reference. I recognize that I'll have very little control over the image once they've accessed it, and hopefully that will remain beyond the scope of requirement. "Metz, Zak" <Zak_Metz=siea6+IIpMo@public.gmane.org> wrote in message 47CE319ED137D411BDCE00D0B774BF550704A999@mdg1ex01.g1.com">news:47CE319ED137D411BDCE00D0B774BF550704A999@mdg1ex01.g1.com... > If preventing people from "stealing" your TIFFs is the goal of this > project, I would strongly suggest you reconsider the viability. As > someone who spends a large part of his evenings "stealing" art from > record label websites for the legitimate purpose of using that art in > conjunction with music reviews, I can tell you without hesitation that > you are never going to stop it. > > > -----Original Message----- > > From: Joe Pluta [mailto:joepluta=8+0R355eNL3AKuVPhbf8BAC/G2K4zDHf@public.gmane.org] > > > > > From: Mandy.Shaw=Nims4PqErV1OSnsfY10OVw@public.gmane.org > > > > > > We do this by making a servlet deliver the binary data > > straight to the > > > browser, rather than just using an URL that points to the > > image file. We > > > store the image in a BLOB in DB2, but you could no doubt do > > the same by > > > reading the binary data out of an image file if necessary. > > > > The only caveat being that you no longer take advantage of > > caching. That > > is, every time the user wants to see the image, it must be > > downloaded again. > > The good news, from a security standpoint, is that the TIF > > isn't stored in > > the browser's temporary cache (from which it can be copied > > and distributed). > > > > Joe > NOTICE: This E-mail may contain confidential information. If you are not > the addressee or the intended recipient please do not read this E-mail > and please immediately delete this e-mail message and any attachments > from your workstation or network mail system. If you are the addressee > or the intended recipient and you save or print a copy of this E-mail, > please place it in an appropriate file, depending on whether > confidential information is contained in the message. > > _______________________________________________ > This is the Java Programming on and around the iSeries / AS400 (JAVA400-L) mailing list > To post a message email: JAVA400-L=Zwy7GipZuJhWk0Htik3J/w@public.gmane.org > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo.cgi/java400-l > or email: JAVA400-L-request=Zwy7GipZuJhWk0Htik3J/w@public.gmane.org > Before posting, please take a moment to review the archives > at http://archive.midrange.com/java400-l. > >
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.