[DUG] In case you're interested (or buy stuff)

Dennis Chuah dennis_cs_chuah at hotmail.com
Thu May 4 13:17:23 NZST 2006


Backdoors are inherently dangerous.  If found out, they can be exploited to 
hack into your client's system.

> What do you do if the client phones up and they have lost their password 
> to access your app ?

Integrate with active directory and you never have to worry about passwords, 
etc. again.  Push the problem back to the client and let their IT dept sort 
it out themselves.

> What do you do if the user has sent their database over for some fault 
> finding and you cant access it without the clients password ?

Surely, you can compile a local version of the application that does not 
require passwords.

> What do you do when you are contracting and you want to prove you did 
> [snip]

Source Control.

Furthermore, if you have been contracted to work as part of a team, then by 
virtue of your source code check-in's, you have proved that you did the 
work.

Otherwise, if you have been contracted to complete an application / module, 
outside of the team, then the delivery of the application / module is proof 
enough!

In any case, I think putting your name into source code is very poor 
practise.  It is better to write good requirements and add comments rather 
than rely on the knowledge of the programmer.  Use source control to keep an 
audit trail of changes.


----- Original Message ----- 
From: "Rohit Gupta" <r.gupta at xtra.co.nz>
To: "NZ Borland Developers Group - Delphi List" <delphi at ns3.123.co.nz>
Sent: Thursday, May 04, 2006 10:51 AM
Subject: Re: [DUG] In case you're interested (or buy stuff)


> Really !!
> What do you do if the client phones up and they have lost their password 
> to access your app ?
> What do you do if the user has sent their database over for some fault 
> finding and you cant access it without the clients password ?
>
> What do you do when you are contracting and you want to prove you did the 
> work, but the idiotic contractee keeps removing all reference to you from 
> the code ?  One memorable instance of this was  when I wrote a CPM clone 
> optimised for Z80 for Sord Computers and they kept removing my name from 
> the code.  Eventually I had to invent an error message and code that 
> looked legit.  But if three specific keys were pressed simultaneously, it 
> popped up a message saying that I wrote it.
>
> We generally have a continuously variable master password to let us in as 
> a legit user.  There are also various environment variables, registry 
> entries and ini file settings that allow us to maintain the system 
> effectively.
>
> For any of these to work, we need physical access to the machine with the 
> app and database.  We dont any remotely controlled access.
>
> Heres an interesting point relating to Elsie4, the Bonus Bonds app.  It 
> runs on Windows but Windows has been restricted and hobbled so that you 
> can not do anything else but run the app.  When the device is at our 
> office, we can still get in though to change printers or apply updates 
> etc.  Is this a back door ?
>
> tracey wrote:
>> Your only app without a back door???
>> That sounds pretty scary to me.  How many other devs leave back doors???
>>
>>
>>
>>
>
>
> _______________________________________________
> Delphi mailing list
> Delphi at ns3.123.co.nz
> http://ns3.123.co.nz/mailman/listinfo/delphi
> 


More information about the Delphi mailing list