Alpha Software Mobile Development Tools:   Alpha Anywhere    |   Alpha TransForm subscribe to our YouTube Channel  Follow Us on LinkedIn  Follow Us on Twitter  Follow Us on Facebook

Announcement

Collapse

The Alpha Software Forum Participation Guidelines

The Alpha Software Forum is a free forum created for Alpha Software Developer Community to ask for help, exchange ideas, and share solutions. Alpha Software strives to create an environment where all members of the community can feel safe to participate. In order to ensure the Alpha Software Forum is a place where all feel welcome, forum participants are expected to behave as follows:
  • Be professional in your conduct
  • Be kind to others
  • Be constructive when giving feedback
  • Be open to new ideas and suggestions
  • Stay on topic


Be sure all comments and threads you post are respectful. Posts that contain any of the following content will be considered a violation of your agreement as a member of the Alpha Software Forum Community and will be moderated:
  • Spam.
  • Vulgar language.
  • Quotes from private conversations without permission, including pricing and other sales related discussions.
  • Personal attacks, insults, or subtle put-downs.
  • Harassment, bullying, threatening, mocking, shaming, or deriding anyone.
  • Sexist, racist, homophobic, transphobic, ableist, or otherwise discriminatory jokes and language.
  • Sexually explicit or violent material, links, or language.
  • Pirated, hacked, or copyright-infringing material.
  • Encouraging of others to engage in the above behaviors.


If a thread or post is found to contain any of the content outlined above, a moderator may choose to take one of the following actions:
  • Remove the Post or Thread - the content is removed from the forum.
  • Place the User in Moderation - all posts and new threads must be approved by a moderator before they are posted.
  • Temporarily Ban the User - user is banned from forum for a period of time.
  • Permanently Ban the User - user is permanently banned from the forum.


Moderators may also rename posts and threads if they are too generic or do not property reflect the content.

Moderators may move threads if they have been posted in the incorrect forum.

Threads/Posts questioning specific moderator decisions or actions (such as "why was a user banned?") are not allowed and will be removed.

The owners of Alpha Software Corporation (Forum Owner) reserve the right to remove, edit, move, or close any thread for any reason; or ban any forum member without notice, reason, or explanation.

Community members are encouraged to click the "Report Post" icon in the lower left of a given post if they feel the post is in violation of the rules. This will alert the Moderators to take a look.

Alpha Software Corporation may amend the guidelines from time to time and may also vary the procedures it sets out where appropriate in a particular case. Your agreement to comply with the guidelines will be deemed agreement to any changes to it.



Bonus TIPS for Successful Posting

Try a Search First
It is highly recommended that a Search be done on your topic before posting, as many questions have been answered in prior posts. As with any search engine, the shorter the search term, the more "hits" will be returned, but the more specific the search term is, the greater the relevance of those "hits". Searching for "table" might well return every message on the board while "tablesum" would greatly restrict the number of messages returned.

When you do post
First, make sure you are posting your question in the correct forum. For example, if you post an issue regarding Desktop applications on the Mobile & Browser Applications board , not only will your question not be seen by the appropriate audience, it may also be removed or relocated.

The more detail you provide about your problem or question, the more likely someone is to understand your request and be able to help. A sample database with a minimum of records (and its support files, zipped together) will make it much easier to diagnose issues with your application. Screen shots of error messages are especially helpful.

When explaining how to reproduce your problem, please be as detailed as possible. Describe every step, click-by-click and keypress-by-keypress. Otherwise when others try to duplicate your problem, they may do something slightly different and end up with different results.

A note about attachments
You may only attach one file to each message. Attachment file size is limited to 2MB. If you need to include several files, you may do so by zipping them into a single archive.

If you forgot to attach your files to your post, please do NOT create a new thread. Instead, reply to your original message and attach the file there.

When attaching screen shots, it is best to attach an image file (.BMP, .JPG, .GIF, .PNG, etc.) or a zip file of several images, as opposed to a Word document containing the screen shots. Because Word documents are prone to viruses, many message board users will not open your Word file, therefore limiting their ability to help you.

Similarly, if you are uploading a zipped archive, you should simply create a .ZIP file and not a self-extracting .EXE as many users will not run your EXE file.
See more
See less

Interface with R&R if A5 encrypted?

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    Interface with R&R if A5 encrypted?

    I haven't posted here in months. I bought A5 V4.0 in Jan 2001. Was thinking about making an alternative version of an xbase product the vendor was killing. Found out you couldn't query on child tables whcih was a show stopper for me. But that you could in 5.0 which would be out in a "couple months".

    About 6 months later, I got tired of waiting and started doing it in Access. And I'm making real progress.

    But now that Ver 5.0 appears like it might really happen, I'm intrigued with the idea of trying it in A5. One argument against xbase is that there's no security. A5V5 solves that with the security and encryption.

    But, I'd also like to use R&R Report Writer against those datafiles. Will there be some method for letting 3rd party tools use the encrypted files?

    Tom Mills

    #2
    RE: Interface with R&R if A5 encrypted?

    Tom,

    I attended the recent developer's conference and the encryption feature was mentioned. It's my impression that the values in the table are scrambled, and stored that way, so that third party tools (like WordPerfect or Excel) can't open and use them meaningfully. If R&R needs to use the tables directly it's going to have the same trouble, I would imagine. And, I might add, this makes sense to me. If the data is encrypted I wouldn't want a stranger to be able to buy a copy of R&R and immediately be able to decrypt my files. -- tom

    Comment


      #3
      RE: Interface with R&R if A5 encrypted?

      If you establish an ODBC connection to a SQL database, or an Access secured database, you can only open the database if you supply the correct login information.

      That's what I'm thinking about here. Either the ability to launch a program through A5 and have A5 unencrypt the data, or have you application supply the login to A5.

      If you can do that, you open up a world of third party applications.

      That's a good thing!!

      Comment


        #4
        RE: Interface with R&R if A5 encrypted?

        Tom,

        my impression is that the encryption feature physically alters the way in which the field values are stored in each record. I think you would need to copy or export the decrypted field values in order to use third party applications. This means creating temporary tables at report time, and should not be all that difficult.

        -- tom

        Comment


          #5
          RE: Interface with R&R if A5 encrypted?

          Tom,

          Alpha has nothing to do with it, at that point.

          Go to www.codebase.com and post your question there. I understand were you are coming from. I do this with crystal reports all the time, against SQL2000 and need to login first.

          Codebase must have a way for third-party applications to send the proper login credentials to unencrypt the data and retrieve information from it's tables.

          Keep us posted.

          Hope this Helps,
          RF-ARS-Motorola

          Comment


            #6
            RE: Interface with R&R if A5 encrypted?

            Tom:

            To do what you do with Access and SQL would mean that Alpha would have to write an ODBC driver for A5 tables. Selwyn told me at the conference that they have no plans to do this.

            Finian
            Finian

            Comment


              #7
              RE: Interface with R&R if A5 encrypted?

              Hi Finian,

              Is version 5 still using codebase?
              If so, codebase should have ODBC drivers.

              RF-ARS-Motorola

              Comment


                #8
                RE: Interface with R&R if A5 encrypted?

                My intent may be unclear here. I was using Access and SQL as examples of how a 3rd party program can attach to a database and the database will require a login.

                One of the arguments against xbase is that it is non-secure. So the abilty to encrypt the database is a good thing.

                But....

                If that means all 3rd party tools, can no longer access A5, that's a real drawback.

                What I'm hoping for is the best of both worlds. An encrypted A5 so that any old dbf viewer can't open it, but the ability for 3rd party tools to read the data, as long as the correct login/password is supplied.

                As a non-programmer (which is why I'm interested in A5) there's no way I can make this happen. I'm envisioning some kind of inteface between the 3rd part apps and the encrypted A5. It would probably take the form of a DSN which requires the Login/Password and then can unencrypt data as it goes to the 3rd party program. I assume some .dll does the actual work.

                Comment


                  #9
                  RE: Interface with R&R if A5 encrypted?

                  Tom, I'm curious. Does anyone else do what you are asking of Alpha Five? i.e. can Access or MS_SQL encrypt the tables, but expose them to R&R for direct access by that program?

                  -- tom

                  Comment


                    #10
                    RE: Interface with R&R if A5 encrypted?

                    I have not investigated encryption in the V5 beta but what A5 encrypts it can decrypt so perhaps you could design a routine to decrypt the data to temp tables and start the report writer.

                    Bill
                    Bill Hanigsberg

                    Comment


                      #11
                      RE: Interface with R&R if A5 encrypted?

                      I think upon further investigation that Finian essentially answered my question. I was under the impression that an xbase connection wasn't ODBC but I guess it is. So I think my answer is No. Hopefully at some point the answer will change.

                      Tom Cone, I'm not sure. Since you can't get to Access data if you've set a password, I've never encrypted, which would be an additional step. I'll try it and let you know.

                      But encryption would be the only way of enforcing security outside of A5.

                      Comment


                        #12
                        RE: Interface with R&R if A5 encrypted?

                        another option is to use a non-alpha encryption tool - that way you could supply the "key" to any program

                        if you go to the code archive, one of the developers has such a tool - which works well
                        Cole Custom Programming - Terrell, Texas
                        972 524 8714
                        [email protected]

                        ____________________
                        "A young man who is not liberal has no heart, but an old man who is not conservative has no mind." GB Shaw

                        Comment


                          #13
                          RE: Interface with R&R if A5 encrypted?

                          The answer to Tom Cones' Access question is Yes. I established an ODBC connection to Access from R&R. Then put a password on, and it made me login. Then I encrypted. And after the login the data was normal.

                          So the ODBC handles the login and the de-cryption.

                          Maybe at some point, A5 will make an ODBC driver. That would let people use Crystal, R&R, Word (directly, Excel), all without exports, yet still maintain security.

                          In the meantime, I'll peek at those scripts. Thanks for everyone's help.

                          Comment


                            #14
                            RE: Interface with R&R if A5 encrypted?

                            Hi Tom,

                            I was under the impression that the encryption was being done by the codebase engine, I was mistaken, it is being done by Alpha 5.

                            Will A5 give you the ability to send API or COM calls to the underlying encrypting mechanism???

                            Five years ago, we had a similar situation with paradox, one of the first local databases capable of encrypting tables. At that time we were using Report Smith for our reporting software.

                            In paradox, we created a READ ONLY USER for reporting purposes. Before we ran our report against our table, we would make an API call to the Borland Database Engine.

                            Example

                            1. SessionAddPassword, �TableName�,�UserName�,�Password�;
                            2. We would run the report
                            3. Then make a second API call
                            4. SessionRemovePassword, �TableName�,�UserName�,�Password�;

                            What you need here is a way to be able to pass information to the encrypting mechanism being used by A5. All this outside of A5, could be through API, COM, ADO, or even ODBC, but A5 must make this available to developers.

                            I know they have no intention of creating an ODBC driver, what about giving you the opportunity through API or Com?

                            I don't think A5 is reinventing the wheel, so thay might be using an encrypted mechanism already on the market that could be capable of accepting these calls.

                            Good Luck,
                            RF-ARS-Motorola

                            Comment

                            Working...
                            X