473,385 Members | 1,518 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Securing Databases From Porting

AMK
I have a situation where I have an app that uses a sql server (msde)
database. The app will be used in environments where no one should be
able to manipulate the data except the developers (app admins) - not
even site database admins. When the application and msde is installed,
a default instance of the database gets attached to msde or built by
script. by default, a built in server acct and approle acct exist to
secure the data accordingly with passwords concealed. What can be done
to keep someone from copying the mdf and ldf files to another machine
where they have admin rights and manipulating data?

Thanks.

Jul 23 '05 #1
1 1017
Hi

Stopping a really determined administrator getting access to this is
virtually impossible.

You may want to look at some of the encryption products
http://www.sqlsecurity.com/DesktopDefault.aspx?tabid=30
the information on Encryptionizer says it will do this, but how it protects
it's keys I don't know.

John

"AMK" <ki*******@hotmail.com> wrote in message
news:11*********************@z14g2000cwz.googlegro ups.com...
I have a situation where I have an app that uses a sql server (msde)
database. The app will be used in environments where no one should be
able to manipulate the data except the developers (app admins) - not
even site database admins. When the application and msde is installed,
a default instance of the database gets attached to msde or built by
script. by default, a built in server acct and approle acct exist to
secure the data accordingly with passwords concealed. What can be done
to keep someone from copying the mdf and ldf files to another machine
where they have admin rights and manipulating data?

Thanks.

Jul 23 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: Craig | last post by:
I am completely new to PHP and have a couple questions. Can PHP access Microsoft Access databases? Are there any basic scripts, any good sites out there? I just want to extract simple data...
4
by: cppaddict | last post by:
Hi, Please let me know if there is a better newsgroup to post this question on, but here goes.... I want to learn the basics of having a C++ program interact with databases such as MySQL or...
3
by: Rock2005 | last post by:
Hi All, I have a hard drive that fails to boot with some mysql 4.1 data I would like to keep. Have slaved that drive to another PC (with mysql 4.1.12 loaded) and have saved other data and am able...
12
by: Prabhat | last post by:
Hi All, I have a website setup which has MS-Access DB. The web pages are in ASP and uses ADO to connect to DB. The DB is located in the Folder "/Database". I have the Connection string setup in...
4
by: Chris Travers | last post by:
Hi all; A few years ago, I set about porting a PHP application from MySQL to PostgreSQL, after realizing that MySQL wasn't going to be able to handle it. In order to do this, I built a light,...
2
by: James | last post by:
What's the best way of securing online databases and web services? At present I am using a database password, which of course is not hard-coded into the web service, but this means re-submitting it...
7
by: Andy | last post by:
Hi ! I split a simple Access2K database ( shared on network )and placed the files thusly : x:\app\frontend.mdb x:\app\back\backend.mdb Problem : I once read an article that laid out a...
11
by: Susan Bricker | last post by:
Greetings. I am looking for some advice on making a database secure. By secure, I mean that I want only certain people to have write access to the database and I want the updates to be permitted...
7
by: Tom | last post by:
Can anyone give me any advice on how to secure a folder on a network server so that documents in the folder can only be opened through an Access database or by the database admin. I need to store...
4
by: Stephen Poley | last post by:
Whenever anyone has a question about securing an Access database he/she is usually referred (unsurprisingly) to the Security FAQ. This is however incomplete/unclear with respect to databases with a...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.