473,473 Members | 1,563 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

Re: how to protect the source

Le Monday 15 September 2008 13:02:58 Joćo Abrantes, vous avez écrit*:
Hello Everyone.
Hello,
>
I am building a client in python that will connect himself to a mysql
server with a certain username and password. I will compile this client
and turn him into a .exe . The thing is that I know that is possible to
get the source of the code back from an .exe and I don't want anyone to
know which username and password are they using because I don't want
them to access to the mysql server without my client. Do you have any
ideas of what can i do? Thanks!
You're going on the wrong path. It's far easier to sniff the network traffic
to get the password than to decompile the program. Furthermore you can't
achieve good security this way (games vendors try hard to do this but are
always defeated). You can't hope to gain control on what your users do with
the access you gave them.

So, the right thing to do is to only allow on the database server the
operations your client app needs given the account you created specifically
for it.

--
_____________

Maric Michaud
Sep 15 '08 #1
0 790

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

9
by: toufik toufik | last post by:
Hi, Is it possible to hide a source code PHP in order to protect it, I mean, I'm developpind a web solution for customers and I don't like that the customer or the host see my code. Thanks.
6
by: Daylor | last post by:
how can i protect my code from decompile ?
29
by: Frank Millman | last post by:
Hi all I am writing a multi-user accounting/business system. Data is stored in a database (PostgreSQL on Linux, SQL Server on Windows). I have written a Python program to run on the client,...
3
by: Narlen | last post by:
Hi there, I don't know much about web design but I proudly managed to password protect a page on my site. Later I realized that everyone looking at the source in any web browser can see the...
2
by: weixiang | last post by:
Hi, After compiling with C#, the target exe file can still be reverse-compiled by ildasm. Is there someway to protect code from that method? I already used strong-name in my module. Thank...
15
by: Fady Anwar | last post by:
Hi while browsing the net i noticed that there is sites publishing some software that claim that it can decompile .net applications i didn't bleave it in fact but after trying it i was surprised...
3
by: yservel | last post by:
Hi everybody. I was just wondering how did editors were protecting their source code from decompilers and reverse engeneering. I heard one method of source code protection was by obfuscation: ...
7
by: --== Alain ==-- | last post by:
Hi, Using the .NET reflector tool, i know that a DLL or EXE developed in ..NET platform can be decompiled and therefore code is available for all. I would like to know if exist a way how to...
4
by: FAQ server | last post by:
----------------------------------------------------------------------- FAQ Topic - How do I protect my javascript code? ----------------------------------------------------------------------- ...
7
by: =?Utf-8?B?TWlrZQ==?= | last post by:
Hi. I have an ASP.NET 2.0 web application which contains an Images directory with all website images. How can I prevent other websites from creating img tags with the source as my images? I want...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
0
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
0
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
0
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated ...
0
muto222
php
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.