473,396 Members | 1,799 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Restricting Access and Protecting Code

Hi All

I have written an application in PHP that will be used by telecoms and
ISP's. It will be installed on a server that will only be running this
app. Will most probably be using the latest SuSE linux version.
I need to provide them with root access to the server so that
they may perform simple issues such as IP address changes and backups.

I do not want them to have access to my code nor the postgres db.
It is vital that this is protected.
There are some php encoders available such as Zend Encoder.
Do these encoders do the job well?

Could someone please advise me on the best way forward.

Much appreciated

Barry
Sep 2 '05 #1
2 1184
Barry wrote:

I need to provide them with root access to the server so that
they may perform simple issues such as IP address changes and backups.

No you don't. Not a good policy for a supplier owned / customer managed
system. Try Webmin and sudo.
I do not want them to have access to my code nor the postgres db.
It is vital that this is protected.
There are some php encoders available such as Zend Encoder.
Do these encoders do the job well?


There's Turck as well. Certainly Zend and Turck seem to work well. I've also
seen a couple of home made encoders which were a joke though (actually I
saw the output of them which took about 5 minutes to revert).

C.

Sep 2 '05 #2
Barry wrote:
Hi All

I have written an application in PHP that will be used by telecoms and
ISP's. It will be installed on a server that will only be running this
app. Will most probably be using the latest SuSE linux version.
I need to provide them with root access to the server so that
they may perform simple issues such as IP address changes and backups.

I do not want them to have access to my code nor the postgres db.
It is vital that this is protected.
There are some php encoders available such as Zend Encoder.
Do these encoders do the job well?

Could someone please advise me on the best way forward.

Much appreciated

Barry


Barry,

As Colin said - you do not have to provide them with root access - nor should
you do so! What happens if, for instance, they do

rm -R /

(Hint: do NOT try it on a system you care about!).

Backups I understand. But IP address changes? Why would those need to be done?
Static IP's are generally set up at install time, dynamic ones are handled
automatically. In either case, you don't need root access.

Check some of the Unix groups for more information on security.

As for encoding - they will stop the casual peeker. But they won't stop someone
who really wants to get at the code. But then if they really want it, even
compiled code (i.e. C/C++) can be gotten at.

It's just a matter of how much effort they're willing to expend.

--
==================
Remove the "x" from my email address
Jerry Stuckle
JDS Computer Training Corp.
js*******@attglobal.net
==================
Sep 2 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

24
by: Yang Li Ke | last post by:
Hi guys! Anyone know a way so that users purchasing my scripts would not be able to share them with other people ? Yang
2
by: Xenophobe | last post by:
I have a popup window (required by the client) containing a form and would like to prevent users from accessing it directly. They are instead required to access the page via a hyperlink on another...
1
by: edo | last post by:
Following is a summary of articles spanning a 7 day period, beginning at 12 Dec 2003 05:22:35 GMT and ending at 19 Dec 2003 04:09:06 GMT. Notes ===== - A line in the body of a post is...
4
by: Dennis C. Drumm | last post by:
Is there a way with C# to allow one class access to a method or field of another class, without making that method or field visible to all other classes, as would be the case when making the method...
0
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to...
12
by: Dr. Edmund M. Hayes | last post by:
I wrote a access program that works well enough that a handful of people would like to buy it from me. My problem is that if I sell it to someone there is no mechanism that I know of to protect...
8
by: sneddo | last post by:
Ok I am trying to do the above, I have got a script that will restrict the length but it requires the user to enter the field and hit a key, before it will work. This would normaly be find, but...
2
by: sant.tarun | last post by:
Hi, I am facing some some problem in restricting the access of a variable.... My question is described below..... Let I have two different C source files 'a.c' and 'b.c'. In the file 'a.c'...
7
by: shashi shekhar singh | last post by:
Respected Sir, I am really tired in solving of this issue that have been arises when i would like to restrict files to access only on my Test page , here i am retriving my files in iframe in Test...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.