How about using file level security, and common area in your
subroutines.  


Marc Harbeson
ERP/Systems Administrator
Brinly Hardy Company
O - (812) 218-7206
F - (812) 218-6084
[EMAIL PROTECTED]
www.brinly.com


-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of John Kent
Sent: Friday, May 27, 2005 2:03 AM
To: u2-users@listserver.u2ug.org
Subject: Re: [U2] Uniobjects hack

Steve,
    thanks for that

jak
----- Original Message ----- 
From: "Steve Johnson" <[EMAIL PROTECTED]>
To: <u2-users@listserver.u2ug.org>; "U2UG"
<u2-users@listserver.u2ug.org>
Sent: Friday, May 27, 2005 2:46 PM
Subject: Re: [U2] Uniobjects hack


> How about running a "monitor" program constantly in the
> background. It monitors all new logins to U2. The new login
> process must send a "sleeping pill" to the monitor within a
> short time after login -- "short" being relative to your
> system performance. If the monitor doesn't receive this
> "sleeping pill" then it kills the new login. The trick here is
> to keep the requirement for this "sleeping pill" as secret as
> possible; and to invent one that cannot be easily spoofed; and
> to insure that the monitor is always active.
> 
> Steve Johnson
> FXA Group Ltd
> Bangkok
> -------
> u2-users mailing list
> u2-users@listserver.u2ug.org
> To unsubscribe please visit http://listserver.u2ug.org/
-------
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
-------
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/

Reply via email to