REGISTER | LOGIN
Breaking News
Comment
mclaus
User Rank
Author
Re: Part V: Case Study: Highlighting a Successful Design Example
mclaus   11/30/2012 12:43:36 PM
NO RATINGS
There is - but since update in basically an automated process, we have essentially embedded a password into the code - a very bad practice.  It is encrypted and known to only a few in our organization, but still it is probably vulnerable to being hacked if somebody were to work at it hard enough.  We are planning to change to a dynamically generated key that will be provided via a newwork connection back to our central service organization - but we don't have that infrastructure quote ready yet. 



Like Us on Facebook