Yes, basic4ppc created exe files CAN be decompiled.....into pure c# as they are converted to it during compilation
a SQLite database file can be read by any program that can use SQLite data files whether .NET or native code.
Ignoring wider questions as to how you protect the data in the database file it is standard security practice to NEVER decrypt a password. You should always store it encrypted and encrypt the users entry for comparison. The password security issue then becomes one of protecting the encryption key from compromise as well as enforcing the use of non-obvious passwords by usersSo, instead of having a stored unencrypted password and comparing that with the user input (password dialog) there would be a stored encrypted string that has to be decrypted with the user input (the password) ... Have I got this right?
The "scenario" is not described completely enough to comment. Security encompasses the entire application, its data, its environment, its potential user base and the threats that a security breach might produce. For pure password authentication use my re-implementation of the Unix Crypt in post #22 here http://www.b4x.com/forum/questions-help-needed/2214-base64-md5-crypt-ssl-basic4ppc.html might do.What is the best crypto algo to use for this scenario?
A hex editor and comparison with a normal SQLite data file gets round that one easily enough!Make the SQLite file (the db file) unreadable by writing some bytes to the file in the right places. Then on app start these bytes could be corrected and on app close these bytes could be put wrong again, so the file is un-usable.
Wrong I'm afraid. Not as easy as using Reflector on an un-obfuscated .NET assembly but still possible by using an X86 disassembler.Simplest would be to have an external VB6 dll that does all the security as these dll's can't be decompiled
it is standard security practice to NEVER decrypt a password. You should always store it encrypted and encrypt the users entry for comparison.
The "scenario" is not described completely enough to comment.
For pure password authentication use my re-implementation of the Unix Crypt in post #22
A hex editor and comparison with a normal SQLite data file gets round that one easily enough!
Wrong I'm afraid. Not as easy as using Reflector on an un-obfuscated .NET assembly but still possible by using an X86 disassembler.
I can claim some experience in the security field as I have in the past done computer security work and supplied encryption based software/hardware solutions to two of the UKs clearing banks.
A hex editor and comparison with a normal SQLite data file gets round that one easily enough!
Who? Where?Is it possible to use Robert Simpson's .net wrappers for SQLite?
That's what the Basic4ppc SQL library uses, version 1.0.40.0 at the moment.
No, the Basic4ppc libraries are compiled to reference a specific version of System.Data.SQLite.dll. This is how .NET works, it is a .NET security consideration not a Basic4ppc limitation. I suppose you could compile your own versions of the libaries if you wanted to try a later version.But can you use that exact file (the one on Robert Simpson's website) instead of the one that comes with the B4P installation?
I can't see that the different wrappers would make any difference as long as the underlying SQLite implementations are compatible. Basic4ppc SQLite databases can be manipulated by other non-.NET SQLite tools and vice versa.Not sure now if I can encrypt with that and then decrypt with Robert's wrapper
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?