> Because we are also trying to proctect the un/pw from the 
> PROGRAMMERS.  With the form based model, a programmer could 
> theoretically slip a back door in and capture this data and 
> do nafarious things.  Sometimes I wounder if management here 
> think we are the NSA or something.

My goodness, that's ridiculous. If you run a programmer's code without
auditing every line of source code, you are in essence trusting that
programmer. I could just as easily slip a back door into code that uses
browser authentication as I could into code that uses forms-based
authentication, I think. Keep in mind that, by default, CF code runs as
SYSTEM on Windows servers.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized 
instruction at our training centers in Washington DC, Atlanta, 
Chicago, Baltimore, Northern Virginia, or on-site at your location. 
Visit http://training.figleaf.com/ for more information!


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Discover CFTicket - The leading ColdFusion Help Desk and Trouble 
Ticket application

http://www.houseoffusion.com/banners/view.cfm?bannerid=48

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:193359
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to