国产探花免费观看_亚洲丰满少妇自慰呻吟_97日韩有码在线_资源在线日韩欧美_一区二区精品毛片,辰东完美世界有声小说,欢乐颂第一季,yy玄幻小说排行榜完本

首頁 > 數據庫 > SQL Server > 正文

SQL Server加過密的存儲過程可以被解密?

2024-08-31 00:48:03
字體:
來源:轉載
供稿:網友
,歡迎訪問網頁設計愛好者web開發。
1. protecting the stored procedure and making it totally non-decryptable is technically impossible. there has to be a way to reverse it so that sql server can generate the execution plan and execute the query.

2. the encryption that sql server is offering is obfuscation of stored procedures through a feature called stored procedure encryption. obfuscation allows the stored procedures to be used by database end-users while making it more difficult for those end users to view or change the contents of the stored procedures. in order to execute the stored procedures, sql server must have access to the original source form of the stored procedures. as a result, a determined sql server system administrator could obtain access to the source form of the stored procedures (although non-system administrators do not have this ability). because the obfuscation feature is not intended to protect the source form of stored procedures from being copied or viewed by a determined sql server administrator, one should not rely solely on the feature for that purpose.

3. obfuscation of stored procedure is similar to what other database vendors offer. it is true that there exists utilities to decrypt procedures protected by obfuscation, and this is similar there also exists decompiles for java as well. the point is, if one can run the code and get access to an executable form, it's always technically possible to reverse engineer the code.

4. an alternative you may want to try is to use extended stored procedures and dll. by creating a dll version of the code, makes it harder to break but it is still possible to reverse-engineer a dll.

5. the protection that is available for all software development firm interested in protecting their asset are same across all data products:

a. obfuscation.
b. legal protection (copy write, patents, etc).

it is not possible to depend only upon either one of these two core pillars of intellectual property protection.

發表評論 共有條評論
用戶名: 密碼:
驗證碼: 匿名發表
主站蜘蛛池模板: 丹棱县| 丽江市| 临泽县| 航空| 蛟河市| 温州市| 德安县| 丹江口市| 久治县| 金坛市| 佛山市| 玉溪市| 合肥市| 秭归县| 灵璧县| 永嘉县| 同德县| 翁源县| 扎鲁特旗| 安平县| 阜新| 新乡市| 麻阳| 墨竹工卡县| 峡江县| 黄龙县| 拜泉县| 泌阳县| 旅游| 延长县| 惠州市| 靖安县| 怀来县| 眉山市| 菏泽市| 女性| 泉州市| 南宁市| 津南区| 福泉市| 泰顺县|