limiting browse based on login?

Bruce Easton bruce at stn.com
Wed Sep 2 09:34:43 PDT 2009


Mark wrote September 02, 2009 12:23 PM:
> 
> Is it just me, or did Tom Aldridge say:
> > 
> > We own many restaurants, and our managers do everything from cash 
> > control to inventory and ordering to employee database 
> functions and 
> > much more where we want to carefully control what records they have 
> > access to, but then want all the data back in one file for creating 
> > consolidated reports, etc. Works flawlessly day in and day 
> out and the 
> > end users see and know nothing other than "their" stuff.
> 
> If they can ever get access to the shell or to full *clerk, 
> all bets are off, as a qualified file is not "protected".
> 
> Never underestimate the intelligence or resourcefulness of 
> your users.  All it takes is one person with half a brain and 
> a little willpower to bring that crashing down.
> 
> As an example, I don't know if you still have and use 
> WordPerfect, but that had a shell-out capability.  That was 
> one reason a bank downtown was nowhere near as secure as they 
> thought. they "thought" the had shell access eliminated.  
> Wrong.  Well, that and not having a password on the "bin"
> user...something covered in most every administration book back then.
> 
> There are lots of ways to a shell that people don't remember 
> they have exposure from.
> 
> mark->


Mark - how is a qualified file not 'protected' verses an unqualified file?

Bruce

Bruce Easton
STN, Inc.



More information about the Filepro-list mailing list