|
Posted by helmut woess on 11/06/05 09:28
Am Sat, 5 Nov 2005 21:31:16 +0100 schrieb Mike Epprecht (SQL MVP):
> ... I will generally be more
> inquisitive as to why it was done, and in the name of ensuring that the
> procedure does not execute any code that could harm the system or the
> corporate security, I will decrypt it and see what it is doing. ...
>
And what is with other software where you have no sourcecode? Do you
disassemble them to see that they are not dangerous? :-))
I want to secure my knowledge which is in the stored procs, because i am a
company and i don't want that everybody can copy my ideas so easy.
Customers can trust me or they buy another solution. But i cannot decide if
a prospective client is a potential buyer or a competitor who wants to get
some knowledge about my product.
bye,
Helmut
Navigation:
[Reply to this message]
|