Alpha Software Mobile Development Tools:   Alpha Anywhere    |   Alpha TransForm subscribe to our YouTube Channel  Follow Us on LinkedIn  Follow Us on Twitter  Follow Us on Facebook

Announcement

Collapse

The Alpha Software Forum Participation Guidelines

The Alpha Software Forum is a free forum created for Alpha Software Developer Community to ask for help, exchange ideas, and share solutions. Alpha Software strives to create an environment where all members of the community can feel safe to participate. In order to ensure the Alpha Software Forum is a place where all feel welcome, forum participants are expected to behave as follows:
  • Be professional in your conduct
  • Be kind to others
  • Be constructive when giving feedback
  • Be open to new ideas and suggestions
  • Stay on topic


Be sure all comments and threads you post are respectful. Posts that contain any of the following content will be considered a violation of your agreement as a member of the Alpha Software Forum Community and will be moderated:
  • Spam.
  • Vulgar language.
  • Quotes from private conversations without permission, including pricing and other sales related discussions.
  • Personal attacks, insults, or subtle put-downs.
  • Harassment, bullying, threatening, mocking, shaming, or deriding anyone.
  • Sexist, racist, homophobic, transphobic, ableist, or otherwise discriminatory jokes and language.
  • Sexually explicit or violent material, links, or language.
  • Pirated, hacked, or copyright-infringing material.
  • Encouraging of others to engage in the above behaviors.


If a thread or post is found to contain any of the content outlined above, a moderator may choose to take one of the following actions:
  • Remove the Post or Thread - the content is removed from the forum.
  • Place the User in Moderation - all posts and new threads must be approved by a moderator before they are posted.
  • Temporarily Ban the User - user is banned from forum for a period of time.
  • Permanently Ban the User - user is permanently banned from the forum.


Moderators may also rename posts and threads if they are too generic or do not property reflect the content.

Moderators may move threads if they have been posted in the incorrect forum.

Threads/Posts questioning specific moderator decisions or actions (such as "why was a user banned?") are not allowed and will be removed.

The owners of Alpha Software Corporation (Forum Owner) reserve the right to remove, edit, move, or close any thread for any reason; or ban any forum member without notice, reason, or explanation.

Community members are encouraged to click the "Report Post" icon in the lower left of a given post if they feel the post is in violation of the rules. This will alert the Moderators to take a look.

Alpha Software Corporation may amend the guidelines from time to time and may also vary the procedures it sets out where appropriate in a particular case. Your agreement to comply with the guidelines will be deemed agreement to any changes to it.



Bonus TIPS for Successful Posting

Try a Search First
It is highly recommended that a Search be done on your topic before posting, as many questions have been answered in prior posts. As with any search engine, the shorter the search term, the more "hits" will be returned, but the more specific the search term is, the greater the relevance of those "hits". Searching for "table" might well return every message on the board while "tablesum" would greatly restrict the number of messages returned.

When you do post
First, make sure you are posting your question in the correct forum. For example, if you post an issue regarding Desktop applications on the Mobile & Browser Applications board , not only will your question not be seen by the appropriate audience, it may also be removed or relocated.

The more detail you provide about your problem or question, the more likely someone is to understand your request and be able to help. A sample database with a minimum of records (and its support files, zipped together) will make it much easier to diagnose issues with your application. Screen shots of error messages are especially helpful.

When explaining how to reproduce your problem, please be as detailed as possible. Describe every step, click-by-click and keypress-by-keypress. Otherwise when others try to duplicate your problem, they may do something slightly different and end up with different results.

A note about attachments
You may only attach one file to each message. Attachment file size is limited to 2MB. If you need to include several files, you may do so by zipping them into a single archive.

If you forgot to attach your files to your post, please do NOT create a new thread. Instead, reply to your original message and attach the file there.

When attaching screen shots, it is best to attach an image file (.BMP, .JPG, .GIF, .PNG, etc.) or a zip file of several images, as opposed to a Word document containing the screen shots. Because Word documents are prone to viruses, many message board users will not open your Word file, therefore limiting their ability to help you.

Similarly, if you are uploading a zipped archive, you should simply create a .ZIP file and not a self-extracting .EXE as many users will not run your EXE file.
See more
See less

Database Hacking Security

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    Database Hacking Security

    Hi just a simple question as I build my first app.

    Which ways can you open up a Database in Alpha 5.

    Are there any back door methods I should be alert to?

    Are there keyboard shortcut keys or any tricks I am not aware of.

    I want to test these and need to make sure my system is play proof.

    Thanks

    Joe

    #2
    Re: Database Hacking Security

    Only thing I know about is that unless you encrypt the DBF tables, they can be opened using almost any software tool - Excel, Notepad, etc. So encrypt them if you have concern over theft of the data.
    Steve Wood
    See my profile on IADN

    Comment


      #3
      Re: Database Hacking Security

      You can access the actual program by holding the ctl+shift when you start the db. This will open a window that allows you to bypass autoexec etc. It is used for when a developeractually locks them selves out of design. It can be turned off, but can be turned back on later in settings->preferences. As Steve says you can protect the tables by encrypting them making them password access, but this only protects the tables to my knowledge and the method before still gets into design. If users have the runtime only, then this will only show them tables, forms and codes etc, but will not allow access to open them. So if someone has full alpha they can get in if you do not turn the access method off.

      It is also worth considering using custom menus and custom tool bars to stop changes to settings. If you leave acces to the settings preferences area then users can do some things you need to protect against
      -----------------------------------------------
      Regards
      Mark Pearson
      [email protected]
      Youtube channel
      Website

      Comment


        #4
        Re: Database Hacking Security

        Basically, if you encrypt your tables, hide the CP, and use Alpha's built-in security model, no one can get in. Well, maybe a good hacker can, but that will keep out 99.99% of anybody, I think.
        Peter
        AlphaBase Solutions, LLC

        [email protected]
        https://www.alphabasesolutions.com


        Comment


          #5
          Re: Database Hacking Security

          Added to what has been said...write all code as functions and scripts, call these from Object Events and either compile all your code into an .aex file or password protect all scripts and functions.
          Mike W
          __________________________
          "I rebel in at least small things to express to the world that I have not completely surrendered"

          Comment


            #6
            Re: Database Hacking Security

            If you need to use an AEX file, make sure you put in OPTION ENCRYPTED_TOKENS to protect it from hacking. Even then, I'm not really sure how secure the AEX is.
            Peter
            AlphaBase Solutions, LLC

            [email protected]
            https://www.alphabasesolutions.com


            Comment


              #7
              Re: Database Hacking Security

              Hi Joe,
              You may want to make your
              system play proof
              think along the lines of trying to make it Fool Proof.
              Regards
              Keith Hubert
              Alpha Guild Member
              London.
              KHDB Management Systems
              Skype = keith.hubert


              For your day-to-day Needs, you Need an Alpha Database!

              Comment


                #8
                Re: Database Hacking Security

                Guys again thanks for your help.

                Its appreciated.

                Joe

                Comment


                  #9
                  Re: Database Hacking Security

                  Joe, I have tried to break the encryption by all the methods I know - including "V". Didn't manage it. Also sent a encypted table to a Gvmt dept who do this and they didn't manage it in a short time either.
                  See our Hybrid Option here;
                  https://hybridapps.example-software.com/


                  Apologies to anyone I haven't managed to upset yet.
                  You are held in a queue and I will get to you soon.

                  Comment


                    #10
                    Re: Database Hacking Security

                    Thanks for the reply Ted.

                    Joe

                    Comment


                      #11
                      Re: Database Hacking Security

                      after looking at the generated aex file, I do NOT want to try and hide anything there. If you put any encryption key and passwords in it by way of a script, it is fully readable. NO THANKS.

                      I do encrypt and password protect my scripts, etc, but do not want to put it where someone else can read it.
                      Dave Mason
                      [email protected]
                      Skype is dave.mason46

                      Comment


                        #12
                        Re: Database Hacking Security

                        The AEX contains some clear text unless you begin your script with:

                        OPTION ENCRYPTED_TOKENS

                        ...your code

                        If you do, then the AEX is encrypted, can't read a thing.
                        Steve Wood
                        See my profile on IADN

                        Comment

                        Working...
                        X