From: Steve Nelson <[EMAIL PROTECTED]>


     My
    solution ended up being a combination, the key was both in 
the code AND
    in the database.  that way you have to break into both 
servers to access
    the full key.  Not a perfect solution, but better than if it 
was only in
    one place.
    
In my case, the control I need is access to the database; so 
having keys in the database wouldn't solve anything; there still 
needs to be some way to get into the database, and once that 
occured, the user could theirself get the pieces to get to the 
data.

I suspect that the problem is that Web is just too insecure for 
this type of application.


-- 
Larry W. Virden <URL: mailto:[EMAIL PROTECTED]> 
<URL: http://www.purl.org/net/lvirden/>
Even if explicitly stated to the contrary, nothing in this 
posting
should be construed as representing my employer's opinions.


------------------------------------------------------------------------------------------------
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists or send a message 
with 'unsubscribe' in the body to [EMAIL PROTECTED]

Reply via email to