Show Bid Request
data base protection
Bid Request Id: 6472
|
|
|
Posted by: |
silicon (7 ratings)
(Software buyer rating 10)
|
Non-action Ratio: |
Very Good - 16.67%
|
Buyer Security Verifications: |
Good
|
Approved on: |
Dec 13, 2001 4:26:13 PM EDT
|
Bidding Closes: |
Dec 27, 2001 4:28:18 PM EDT
|
Viewed (by coders): |
735 times
|
|
|
|
Description:
i need a protection for a database so that it can not be opened or viewed by any one unless from my vb program i need this protection to include the database in my exe program .any new idea is welcomed. this work must be done in max. 2 weeks from bid acceptance
Deliverables: Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. Complete copyrights to all work purchased.
Remember that contacting the other party outside of the site (by email, phone, etc.) on all business projects < $500 (before the buyer's money is escrowed) is a violation of both the software buyer and seller agreements.
We monitor all site activity for such violations and can instantly expel transgressers on the spot, so we thank you in advance for your cooperation.
If you notice a violation please help out the site and report it. Thanks for your help.
|
|
Bidding/Comments:
|
All monetary amounts on the site are in United States dollars.
Rent a Coder is a closed auction, so coders can only see their own bids and comments. Buyers can view every posting made on their bid requests. |
See all rejected bids (and all comments)
Name |
Bid Amount |
Date |
Coder Rating |
|
|
This bid was accepted by the buyer!
|
$150 (USD)
|
Dec 13, 2001 4:55:35 PM EDT
|
10
(Excellent)
|
|
|
Hi,
I can guide you through this process and send you a sample program that will demonstrate it with a sample project and database. It does it as you suggest, embeds the database file inside the exe, then when you run the exe, it will create the database file in their windows/temp directory (we can make it named anything so even if they look in their temp directory, they would not know it was a database...) Then when the program is done using it, we can delete the temp file from their temp directory leaving no trace of it :)
If this sounds like what you need let me know and I'll have you the sample in a day or two. Thanks again,
Chuck Hall |
|
|
|
|
|