On 07/13/2015 06:41 PM, Dmitry Yemanov wrote:
> 13.07.2015 18:24, swobje...@outlook.com wrote:
>> A potential attacker needs typically two elements breaking a password
>> auth mechanism.
>> In this case, the user with the highest granted permissions to corrupt
>> and/or destory anything is kwown to the attacker.
> The fact that SYSDBA exists inside the binaries does not mean that it
> exists inside the security database as well. If one needs to be
> absolutely secure, SYSDBA should just not be created (or should be
> dropped after installation).

Or without such extraordinary measures:

alter user sysdba inactive;


------------------------------------------------------------------------------
Don't Limit Your Business. Reach for the Cloud.
GigeNET's Cloud Solutions provide you with the tools and support that
you need to offload your IT needs and focus on growing your business.
Configured For All Businesses. Start Your Cloud Today.
https://www.gigenetcloud.com/
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to