<snicker> Seen programmers on SQL hard code the SA login to bypass the db security level.... It is what you make it...
Also, how many times to you read about a PICK DB having virus related security issues? -----Original Message----- From: Jeff Schasny [mailto:[EMAIL PROTECTED] Sent: Tuesday, May 18, 2004 1:31 PM To: [EMAIL PROTECTED] Subject: RE: [U2] Cost of Oracle vs PICK Bull. Somewhere, somehow, you have to trust someone to correctly implement database integrity rules. You can trust your DBAs to do it at the database level or you can trust your applications programmers to do it at an application level. Neither inherently makes the database more secure. Improperly implemented database constraints and triggers are just as likely to happen as badly designed applications. -----Original Message----- From: Bob Gerrish [mailto:[EMAIL PROTECTED] [snip] I agree with the security side. In RDBMS models, in general, you can (must) embed constraints and business rules in the database, itself rather than the application. This makes the database more secure. ------- u2-users mailing list [EMAIL PROTECTED] http://www.u2ug.org/listinfo/u2-users ------- u2-users mailing list [EMAIL PROTECTED] http://www.u2ug.org/listinfo/u2-users
