473,405 Members | 2,210 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,405 software developers and data experts.

Protecting Database From Code Stealing and Installer Advice


Dear Group

I'd be grateful if you can give me some advice on the following.
An application I wrote uses an MSDE backend and I wonder whether
there's a way (even for the system administrator) of not seeing or
tracing stored procedure code, view and table designs?

And I also wonder whether you can advise me on an installer that
handles MSDE and database setup during installation without too much
effort but is still affordable < USD 1000.

Any articles, resources, advice hints for these two topics are very
appreciated.

Thank you very much for your help & efforts!

Martin

Aug 24 '05 #1
3 1137
The short answer regarding hiding your database code and data is that
you can't - a sysadmin has full access to all objects in MSSQL. You can
create some objects WITH ENCRYPTION, but that isn't a real solution, as
the encryption can been hacked, so it will only prevent casual users
from seeing it, not a determined attacker (and if the server is under
someone else's control, you can't secure it effectively anyway).

The best way to protect your intellectual property is probably a legal
contract rather than a technical solution, although if it's really
important to you then you could provide your application as a remotely
hosted service, not a local installation.

As for a packaging tool, Red Gate have one in that price range. I
haven't used it myself, but I have used some of their other SQL
products, and they seem to be quite good for what they cost:

http://www.red-gate.com/sql/sql_packager.htm

Simon

Aug 24 '05 #2
Am 24 Aug 2005 05:30:34 -0700 schrieb th************@hotmail.com:
Dear Group

I'd be grateful if you can give me some advice on the following.
An application I wrote uses an MSDE backend and I wonder whether
there's a way (even for the system administrator) of not seeing or
tracing stored procedure code, view and table designs?

And I also wonder whether you can advise me on an installer that
handles MSDE and database setup during installation without too much
effort but is still affordable < USD 1000.

Any articles, resources, advice hints for these two topics are very
appreciated.

Thank you very much for your help & efforts!

Martin


maybe this can help you:
http://www.sql-shield.com/

bye,
Helmut
Aug 24 '05 #3
Thanks Simon & Helmut :-)

Aug 26 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

22
by: Harold Crump | last post by:
Greetings, I have a PHP/MySQL application that I am deploying at a client's. I am fairly certain that they will steal my source code and re-sell to other companies. I would like to somehow...
3
by: Axier | last post by:
1. Make your code so good and general that you can resell it yourself. A lawsuite is not what you want and a lawyers contract is worth nothing if you are not sure you will go after them 110%. 2....
5
by: cfoley1970 | last post by:
I have an online directory of alumni from a high school that runs PHP with a MySql backend containing contact info, email addresses, etc. Some of the alumni have begun to complain about receiving...
10
by: simchajoy2000 | last post by:
Hi, I know that it is impossible to completely protect images on websites so that no one can get their hands on them. But there have to be a lot of ways to deter people from stealing images and...
3
by: DC Gringo | last post by:
Hi, I'm trying to use a custom action to modify a database (rather than create one) using the VS.NET '03's help example called "Custom Action to Create Database During Installation". I've made...
12
by: Paul H | last post by:
A little off topic this one because the database may not be written in Access. I am just looking for some advice.. I have an idea to help prevent a particular type of crime, a database will be...
34
by: Alan Larsson | last post by:
Is there a way i can look at the php code that is runnig a site, without any ind of admin access to the server?
22
by: flit | last post by:
Hello All, I have a hard question, every time I look for this answer its get out from the technical domain and goes on in the moral/social domain. First, I live in third world with bad gov., bad...
3
by: Boki | last post by:
Hi All, Could you please advice the serial number protecting method for software product ? Thank you very much! Best regards, Boki.
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.