On Oct 27, 2005, at 2:49 AMGMT-04:00, Ian Joyner wrote:
But what if some hacker (sic)
Do you mean malicious programmer?
Anyway, I think I have found the answer in Chapter 6, p 140 on
delegates, that the session object is a delegate of
EODistributionContext and these delegate methods are c
Ian Joyner wrote:
Anyway, I think I have found the answer in Chapter 6, p 140 on
delegates, that the session object is a delegate of
EODistributionContext and these delegate methods are called to check
security before operations are allowed on the server side. These return
false if the u
I've been researching this topic for a few days, since I realized
that the scheme outlined in Chapter 25 of WO JCDA on building a login
window was dependent on the fact that your client application used a
login window before you could access the server. But what if some
hacker built a clien