473,378 Members | 1,066 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,378 software developers and data experts.

Alternative application security schema via web verification

MLH
Have any of you experimented with an Access 97 app running on
a web-enabled PC toward the objective of having the remote PC
running your application 'check-in' with your web server to ensure
it is an authorized installation - that it is not something installed
by a software pirate?

Basically the remote client polls your server(s) saying "Hey, I wanna
run today" and the first running server it hits attempts to
authenticate it and either grants or denies permish. Just checking.
Wanna know if this is a reliable model.
Nov 13 '05 #1
8 1221

"MLH" <CR**@NorthState.net> wrote in message
news:m4********************************@4ax.com...
Have any of you experimented with an Access 97 app running on
a web-enabled PC toward the objective of having the remote PC
running your application 'check-in' with your web server to ensure
it is an authorized installation - that it is not something installed
by a software pirate?

Basically the remote client polls your server(s) saying "Hey, I wanna
run today" and the first running server it hits attempts to
authenticate it and either grants or denies permish. Just checking.
Wanna know if this is a reliable model.


I couldn't say about anyone else, but for me it'd be a reliable way to have
me immediately return the application and demand a refund. I do 'way too
much work on my notebook, not connected to the Web to put up with that kind
of nonsense. I can't avoid programs that require "activation", but at least
those don't require a web connection whenever they are run.

Larry Linson
Microsoft Access MVP
Nov 13 '05 #2
"Larry Linson" <bo*****@localhost.not> wrote in
news:Qbjxe.5220$mr4.1483@trnddc05:
"MLH" <CR**@NorthState.net> wrote in message
news:m4********************************@4ax.com...
Have any of you experimented with an Access 97 app running on
a web-enabled PC toward the objective of having the remote PC
running your application 'check-in' with your web server to
ensure it is an authorized installation - that it is not
something installed by a software pirate?

Basically the remote client polls your server(s) saying "Hey, I
wanna run today" and the first running server it hits attempts to
authenticate it and either grants or denies permish. Just
checking. Wanna know if this is a reliable model.


I couldn't say about anyone else, but for me it'd be a reliable
way to have me immediately return the application and demand a
refund. I do 'way too much work on my notebook, not connected to
the Web to put up with that kind of nonsense. I can't avoid
programs that require "activation", but at least those don't
require a web connection whenever they are run.


All sorts of apps attempt to phone home on my machine, but I have my
software firewall to block all outgoing (and incoming) connections
that have not been allowed by explicit rules I've already set up.

This means that your app would fail.

And I'd want my money back.

--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
Nov 13 '05 #3
MLH
Point well taken. And, as always Larry, a point well made. This app
is an app that users buy so they can automatically retrieve specific
information from websites and save in their tables. Fact is, it has
little purpose in any off-line setting. My model would be to hit just
another website to check "Hey, am I legal?" whilst hitting dozens
of others in the course of business.

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xx

I couldn't say about anyone else, but for me it'd be a reliable way to have
me immediately return the application and demand a refund. I do 'way too
much work on my notebook, not connected to the Web to put up with that kind
of nonsense. I can't avoid programs that require "activation", but at least
those don't require a web connection whenever they are run.

Larry Linson
Microsoft Access MVP


Nov 13 '05 #4
MLH
Hey, believe me. I feel like you guys. But fortunately for me, my
customers won't be inconvenienced. Part of the minimum system
requirements (like free diskspace rqd, memory, pentium + processor,
etc) include 24x7 unobstructed access to I'net. Customers are told
so in advance and have an opportunity to weigh this drawback agains
the program benefits. Its a very small niche of customers. I haven't
had anyone complain. All are permanent, stationary office computer
installations - no laptops. Most are dedicated to the single
application, unused for routine office apps.

No gripes so far. And for that, I am grateful.

So back to the point, would the "phone home" model be easily
implemented in A97?

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

All sorts of apps attempt to phone home on my machine, but I have my
software firewall to block all outgoing (and incoming) connections
that have not been allowed by explicit rules I've already set up.

This means that your app would fail.

And I'd want my money back.


Nov 13 '05 #5
MLH wrote:
Hey, believe me. I feel like you guys. But fortunately for me, my
customers won't be inconvenienced. Part of the minimum system
requirements (like free diskspace rqd, memory, pentium + processor,
etc) include 24x7 unobstructed access to I'net. Customers are told
so in advance and have an opportunity to weigh this drawback agains
the program benefits. Its a very small niche of customers. I haven't
had anyone complain. All are permanent, stationary office computer
installations - no laptops. Most are dedicated to the single
application, unused for routine office apps.

No gripes so far. And for that, I am grateful.

So back to the point, would the "phone home" model be easily
implemented in A97?


If you have a web service that could respond to an HTTP request then yes, at the
Access end it's pretty easy to send an HTTP request and process the response. I
do this with the MSXML DLL found on most any Windows machine since IE 4 has been
out.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #6
MLH
<snip>
Thanks much. I'll look into that.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

If you have a web service that could respond to an HTTP request then yes, at the
Access end it's pretty easy to send an HTTP request and process the response. I
do this with the MSXML DLL found on most any Windows machine since IE 4 has been
out.


Nov 13 '05 #7
MLH <CR**@NorthState.net> wrote in
news:qr********************************@4ax.com:

[Rick Brandt:]
If you have a web service that could respond to an HTTP request
then yes, at the Access end it's pretty easy to send an HTTP
request and process the response. I do this with the MSXML DLL
found on most any Windows machine since IE 4 has been out.


Thanks much. I'll look into that.


No matter how you implemented it, I wouldn't let any of my clients
run your program, because there is no way to know what you're
sending to your website.

--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
Nov 13 '05 #8
MLH
I can't blame you for that. One can never be
too safe when it comes to security.

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
No matter how you implemented it, I wouldn't let any of my clients
run your program, because there is no way to know what you're
sending to your website.


Nov 13 '05 #9

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Terence Shek | last post by:
Is there a way to set the application binding policy so that it always binds to the latest version of an assembly? I'm hoping there is a way to avoid updating the application's binding...
1
by: bdj | last post by:
Hello! Can anyone tell me where to read more about best practices about this: Should I put data in a seperate scheme for tables, packages in anoter schema and create a lot of users that have...
3
by: Karuppasamy | last post by:
Hi I am trying to use the Logging Module provided by Microsoft Application Blocks for .Net . I installed everything as per the Instructions given in the 'Development Using the Logging Block'. ...
6
by: google | last post by:
I have a few general questions. I am working on a new database to be used within my company. I would like to give a couple of people, particularly HR, the ability to add and delete Access users,...
5
by: isideveloper | last post by:
I'm building a new C# web application that will provide my company some administrative operations that were previously only completed by tweaking the data in the database. 1. Encrypted password...
3
by: pantagruel | last post by:
Hi, My work is putting in a large application that is basically split up between 30 or so Javascript files. I have some security concerns about this application. Basic security concerns is: ...
8
by: Anthony Smith | last post by:
I am looking into building a web application and one of the things I want to do is to make sure the user is logged in. I know I can do this by checking the session for a user object or something...
5
underscore
by: underscore | last post by:
hello to all TSD. can you help me how to create a SECURITY GRAPHICAL VERIFICATION using PHP? thnx....
1
by: aditi kauts | last post by:
Hi I am implementing security on Contact base smart card which follows scosta template. In card structure ef is directly under DF and DF is directly under MF. According to the template i am...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.