<snicker>

Seen programmers on SQL hard code the SA login to bypass the db security
level....  It is what you make it...

Also, how many times to you read about a PICK DB having virus related
security issues?

-----Original Message-----
From: Jeff Schasny [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, May 18, 2004 1:31 PM
To: [EMAIL PROTECTED]
Subject: RE: [U2] Cost of Oracle vs PICK

Bull.  Somewhere, somehow, you have to trust someone to correctly
implement
database integrity rules.  You can trust your DBAs to do it at the
database
level or you can trust your applications programmers to do it at an
application level. Neither inherently makes the database more secure.
Improperly implemented database constraints and triggers are just as
likely
to happen as badly designed applications.



-----Original Message-----
From: Bob Gerrish [mailto:[EMAIL PROTECTED]
[snip]

I agree with the security side.  In RDBMS models, in general,
you can (must) embed constraints and business rules in the
database, itself rather than the application.   This makes the
database more secure.
-------
u2-users mailing list
[EMAIL PROTECTED]
http://www.u2ug.org/listinfo/u2-users
-------
u2-users mailing list
[EMAIL PROTECTED]
http://www.u2ug.org/listinfo/u2-users

Reply via email to