Alpha Software Mobile Development Tools:   Alpha Anywhere    |   Alpha TransForm subscribe to our YouTube Channel  Follow Us on LinkedIn  Follow Us on Twitter  Follow Us on Facebook



The Alpha Software Forum Participation Guidelines

The Alpha Software Forum is a free forum created for Alpha Software Developer Community to ask for help, exchange ideas, and share solutions. Alpha Software strives to create an environment where all members of the community can feel safe to participate. In order to ensure the Alpha Software Forum is a place where all feel welcome, forum participants are expected to behave as follows:
  • Be professional in your conduct
  • Be kind to others
  • Be constructive when giving feedback
  • Be open to new ideas and suggestions
  • Stay on topic

Be sure all comments and threads you post are respectful. Posts that contain any of the following content will be considered a violation of your agreement as a member of the Alpha Software Forum Community and will be moderated:
  • Spam.
  • Vulgar language.
  • Quotes from private conversations without permission, including pricing and other sales related discussions.
  • Personal attacks, insults, or subtle put-downs.
  • Harassment, bullying, threatening, mocking, shaming, or deriding anyone.
  • Sexist, racist, homophobic, transphobic, ableist, or otherwise discriminatory jokes and language.
  • Sexually explicit or violent material, links, or language.
  • Pirated, hacked, or copyright-infringing material.
  • Encouraging of others to engage in the above behaviors.

If a thread or post is found to contain any of the content outlined above, a moderator may choose to take one of the following actions:
  • Remove the Post or Thread - the content is removed from the forum.
  • Place the User in Moderation - all posts and new threads must be approved by a moderator before they are posted.
  • Temporarily Ban the User - user is banned from forum for a period of time.
  • Permanently Ban the User - user is permanently banned from the forum.

Moderators may also rename posts and threads if they are too generic or do not property reflect the content.

Moderators may move threads if they have been posted in the incorrect forum.

Threads/Posts questioning specific moderator decisions or actions (such as "why was a user banned?") are not allowed and will be removed.

The owners of Alpha Software Corporation (Forum Owner) reserve the right to remove, edit, move, or close any thread for any reason; or ban any forum member without notice, reason, or explanation.

Community members are encouraged to click the "Report Post" icon in the lower left of a given post if they feel the post is in violation of the rules. This will alert the Moderators to take a look.

Alpha Software Corporation may amend the guidelines from time to time and may also vary the procedures it sets out where appropriate in a particular case. Your agreement to comply with the guidelines will be deemed agreement to any changes to it.

Bonus TIPS for Successful Posting

Try a Search First
It is highly recommended that a Search be done on your topic before posting, as many questions have been answered in prior posts. As with any search engine, the shorter the search term, the more "hits" will be returned, but the more specific the search term is, the greater the relevance of those "hits". Searching for "table" might well return every message on the board while "tablesum" would greatly restrict the number of messages returned.

When you do post
First, make sure you are posting your question in the correct forum. For example, if you post an issue regarding Desktop applications on the Mobile & Browser Applications board , not only will your question not be seen by the appropriate audience, it may also be removed or relocated.

The more detail you provide about your problem or question, the more likely someone is to understand your request and be able to help. A sample database with a minimum of records (and its support files, zipped together) will make it much easier to diagnose issues with your application. Screen shots of error messages are especially helpful.

When explaining how to reproduce your problem, please be as detailed as possible. Describe every step, click-by-click and keypress-by-keypress. Otherwise when others try to duplicate your problem, they may do something slightly different and end up with different results.

A note about attachments
You may only attach one file to each message. Attachment file size is limited to 2MB. If you need to include several files, you may do so by zipping them into a single archive.

If you forgot to attach your files to your post, please do NOT create a new thread. Instead, reply to your original message and attach the file there.

When attaching screen shots, it is best to attach an image file (.BMP, .JPG, .GIF, .PNG, etc.) or a zip file of several images, as opposed to a Word document containing the screen shots. Because Word documents are prone to viruses, many message board users will not open your Word file, therefore limiting their ability to help you.

Similarly, if you are uploading a zipped archive, you should simply create a .ZIP file and not a self-extracting .EXE as many users will not run your EXE file.
See more
See less

word to the wise

  • Filter
  • Time
  • Show
Clear All
new posts

  • word to the wise

    Since Ransome ware and other Viruses can now follow drive letters right into a server, It is suggested to use direct rather than mapped drives to access the data tables like:
    Dave Mason
    [email protected]
    Skype is dave.mason46

  • #2
    Re: word to the wise

    Hi Dave,
    can you elaborate where this replacement might be needed to be used?
    Mike W
    "I rebel in at least small things to express to the world that I have not completely surrendered"


    • #3
      Re: word to the wise

      Certainly good advice, but the saying goes "You can run, but you cannot hide..."

      Paths / shares are also hit by newer (2-3 years old) crypto attacks. The mapped drive encryption issue was first seen 3 - 4 years ago. Since then, the crypto coders have moved on to scanning the network because people like you were too smart for them.

      I make sure the end users are running up-to-date quality corporate AV, and that backups are disconnected after they run. Regardless, you are right in that you can never have enough protection for data.

      I'll keep your sound advice in mind as I upgrade apps in the future. There are 20 apps I wrote back in 2001 ~ 2010 that are to be upgraded soon. I'll talk to them about this, as there are links hard-coded in massive scripts that will need to be adjusted. An example might be temporary tables, and txt files that are created as well as PDF reports. I wish I knew about this crypto crap 20 years ago.

      I maintain a large accounting office in Manhattan, and there are still so many apps that use mapped drives, like Sage 50 accounting. I see it even with POS software. I guess old habits die hard.

      Thanks Much!


      • #4
        Re: word to the wise

        When you map a drive, you are setting the mapping to server. You can do the same with alpha instead of using a mapped drive. from runtime, when you connect to the server data, instead of pathing to the mapped drive, map to the server and drive/folder the app is on.
        need more? contact me?
        Dave Mason
        [email protected]
        Skype is dave.mason46


        • #5
          Re: word to the wise

          Got it Dave. Thanks.
          Mike W
          "I rebel in at least small things to express to the world that I have not completely surrendered"


          • #6
            Re: word to the wise

            Typically, in your code, or in the database itself, with a mapped drive you would just use drive letter\foldername\tablename.dbf.

            What Dave is saying is to not use a drive letter at all, and as long as the server folder is shared and the users have FULL permission, use \\servername\share name\folder\tablename.dbf



            • #7
              Re: word to the wise

              I don't get it. What about portability? The use of a mapped drive in scripts and operations allows the app to run on different servers.

              Discernment is not needed in things that differ, but in those things that appear to be the same. - Miles Sanford


              • #8
                Re: word to the wise

                I called Trend Micro a few days ago. One of my accounts has a 45 computer license. The tech said mapped or unmapped doesn't matter since around 2017 and on. All variants since then easily enumerate any shared path on any network server or machine. Logical mapping no longer increases vulnerability.

                He showed me how to use PowerShell to list a servers shared folder in less than a second, even if the shared path is hidden with a $.

                Open PowerShell, and copy the following in replacing SERVER2 with any machine name or IP Address other than the one you are on (Leave the quotes...) :

                Get-WMIObject -ComputerName "SERVER2" -Query "SELECT * FROM Win32_Share" | FL

                (arp -a lists IP Addresses and MAC addresses on the network.)

                I ran it on a DC that has a Group Policy on it to hide all shares from populating as you type, and the computers do not appear under network, even if the client is on the domain.

                PowerShell reported back every share, so my Group Policy is a waste of time, except for keeping the novices out.

                The tech did say if a machine is completely unprotected (No AV), it could conceivably get a virus from, say, 2014 on it, and then the mapped drive would be exploited, but anyone who is not running AV software that is up-to-date is, well, asking for trouble.

                Besides running a corporate AV app, I limit shared folders to essential personnel. (Probably a bad idea to share to "Everyone".)

                Also, run more than one backup every day on a machine no one uses with no shared folders on it. If you can get someone to disconnect and swap backup drives every day, that's a plus, but I have no one onsite who will accept the responsibility.

                So, anyway, I wasn't looking to step on any toes, nor am I saying not to take every precaution. Extreme diligence is the best way to protect your files and network. It's up to each to decide what measures to take.
                Last edited by CraigSchumacker; 03-14-2020, 08:51 PM.


                • #9
                  Re: word to the wise

                  i really appreciate this advice.
                  thank you sir daveM for your professional advice.
                  "Knowledge without application is useless."