Kenneth Kixmoeller/fh wrote:
On Feb 6, 2007, at 11:43 AM, Fletcher Johnson wrote:
Certainly, if the code is in a table, it is
subject to modification (potentially malicious),
Thank you for your thoughts, Fletcher.
Regardless of my application construction, this is something that I
am
On Feb 7, 2007, at 9:22 AM, Ricardo Aráoz wrote:
You might also have a field with some kind of coded checksum, so your
program would notice if the code has been tampered with.
Thanks -- good idea.
Ken
___
Post Messages to: ProFox@leafe.com
On Feb 6, 2007, at 11:43 AM, Fletcher Johnson wrote:
Certainly, if the code is in a table, it is
subject to modification (potentially malicious),
Thank you for your thoughts, Fletcher.
Regardless of my application construction, this is something that I
am wondering about. Maybe somebody
3 matches
Mail list logo