473,386 Members | 1,830 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

How to protect when going from Internet to intranet?

I have a web application developed in ASP.NET 2.0 with SQL Server 2005.
The application is on a hosted server accessible from Internet.

I have a potential customer who insists on having the application
hosted on their own web server and SQL Server and I'm very worried
about someone stealing the application or database. I'm not so worried
about their own people doing this, but I know that other
suppliers/consultants have access to the servers and I don't trust
them.

What kind of necessary security steps should I think of if an intranet
solution should be acceptable for me?

Regards,

S

Oct 27 '06 #1
1 1311
You first have to question whether turning down their request would be an
option, or if they are prepared to host it on a machine you are responsible
for and can access and manage remotely, removing any potential access from
competitors. What can you do via agreement that the app wont be accessible
to other consultants, and how would you/they enforoce that to assure you?

If you are up against a wall then you should probably start by looking at
how you compile your application into a single assembly, so even if it was
stolen there would be a fair bit of work to try and get access to any code.
West Wind have written a nippy little front end to the asp.net compiler to
make the job easier.
http://www.west-wind.com/tools/aspnetcompiler.asp. Also, consider
watermarking your code, so a hidden method can be called to show that its
your code if you think its been deployed elsewhere.

--
--
Regards

John Timney (MVP)
VISIT MY WEBSITE:
http://www.johntimney.com
http://www.johntimney.com/blog
<st****@gmail.comwrote in message
news:11**********************@h48g2000cwc.googlegr oups.com...
>I have a web application developed in ASP.NET 2.0 with SQL Server 2005.
The application is on a hosted server accessible from Internet.

I have a potential customer who insists on having the application
hosted on their own web server and SQL Server and I'm very worried
about someone stealing the application or database. I'm not so worried
about their own people doing this, but I know that other
suppliers/consultants have access to the servers and I don't trust
them.

What kind of necessary security steps should I think of if an intranet
solution should be acceptable for me?

Regards,

S

Oct 27 '06 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Flier_75 | last post by:
Hi, I just password-protected an intranet site by including a password authentication script in each page of a private section. The script checks the login against the mySQL database....
1
by: McKirahan | last post by:
What is "active content"? My ASP page just returns HTML.... I have a page with an .htm extension that has a form whose action is an ASP page which generates a report after updating a database...
11
by: Dave | last post by:
I have this sample HTML code: <html> <head> <script type="text/javascript"> var WinHttpReq = new ActiveXObject("WinHttp.WinHttpRequest.5.1"); </script> </head>
0
by: Sepia | last post by:
Hi, I am totally new in learning c sharp language. I have made an intranet web site with ASP. I want to make a window that has my name on the title bar and works like an internet explorer...
5
by: asdf | last post by:
Hi, Currently, I have one database for Intranet clients on the server behind the firewall. But I was asked to allow the extranet users to access the same data. From the security perspective what...
22
by: teejayem | last post by:
Hi, I am new to programming with databases and was wanting some help. Is there any way to password protect an access database and access sent sql commands to it via vb.net code? Any help...
2
by: =?Utf-8?B?Sm9zZXBo?= | last post by:
I am building an ASP.Net 2.0 application that will be accessible through both internet and intranet. The application will use two different types of security methods, depending on whether the...
8
by: msnews.microsoft.com | last post by:
Our IT team relocated our application servers yesterday. They had to take one machine out of the cluster because it would prompt users for credentials if accessed using the IP address, which I...
3
by: RogerTM | last post by:
Hi, i´m using Window 2003 server, a wireless LAN, and 75 users, all of them need internet, so troughout a proxy i give the internet access to all of them but i need to all my users go to the...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.