Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations gkittelson on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Hi everyone, i have a table in vfp 5.0 4

Status
Not open for further replies.
Jan 20, 2007
237
US
Hi everyone,
i have a table in vfp 5.0 that a field "user id" values are encrypted, do you know if i can un-encrypted ?

the application was done in VFP 5.0, it is SBT PRO 5.0, i would like to rename the value in that field for several records but the data in that field is encrypted, i have the whole source.
Thanks in advance
 
If you have the source, you must study it and see if you can find a decryption function.
 
Hi Mike,
Yes you are correct, the reason i am trying to replace the value of that field for a couple of record is because the way to do it using the software is a really long process and the user i will copy from, need to be out of the system or i have to do this after hours, anyway i will look the prg file where the decryption function is, it is probably easier than go through the software process.
Thanks in advance
 
Most people would encrypt in a one-way manner - so the encrypted value does not contain the original information and thus it cannot be recovered.



Regards

Griff
Keep [Smile]ing

There are 10 kinds of people in the world, those who understand binary and those who don't.

I'm trying to cut down on the use of shrieks (exclamation marks), I'm told they are !good for you.
 
Well, only for passwords, decryptable data also is a norm used with Cryptor typically in a way "transparent".

So data on HDD is encrypted but using a dbf you read the data decrypted automatically. Protection against data manipulation from outside, exactly what landfla is trying to do.

Bye, Olaf.

Olaf Doschke Software Engineering
 
That makes sense

Regards

Griff
Keep [Smile]ing

There are 10 kinds of people in the world, those who understand binary and those who don't.

I'm trying to cut down on the use of shrieks (exclamation marks), I'm told they are !good for you.
 
ok guys,
all i am trying to do is rename the user id by another user id, will explain below.

user id "KHUB" is an old employee who left, so a new employee replaced him and in order to avoid all the long process of creating a new "user id" plus all the privileges needed for the new user id, then what we do is tell the new user, use this existing user id, so we don't need to go to the whole process, but in reality when we press F5(a shortcut that will display the users active in that application, SBT 5.0 ACCOUNTING APP) then i can see KHUB as "KEITH HUBBEL"(as the is the user name) which in reality, is "Nicole Hamlin", as she is the one who is using "KHUB" user id. so what happen is that, we need to start recalling oh Nicole is using "Keith Hubbel" user id, so we need to cross reference.

since i have access to the table, where the "user id" and other fields as privileges/permissions, i opened that table and the values under the field "userid" are encrypted, i would like to replace it by the corresponding new "user id", so i was pretending to replace "khub" by "nico" where her name is Nicole, as user id only allow 4 characters, that was all.

Thanks in advance
 
It's not clear why a user ID (as opposed to a password) would ever be encrypted. After all, according to your example, the ID is a simple contraction of their full name, which presumably everyone knows. But let's accept that it is encrypted.

It seems the most sensible thing to do would be to set up a new user account for Nicole. You say that it means going to a lot of trouble. Well, maybe that's something you need to look at in the future - find a way of simplifying the process. Nevertheless, trying to force one user into another's shoes doesn't look like a good approach.

In the longer term, you could introduce a system where a new user "inherits" the rights and permissions of an existing (or former) user. Or you could set up user groups, so that users with similar rights and permissions belong to the same group. There are other possibilities.

Mike



__________________________________
Mike Lewis (Edinburgh, Scotland)

Visual FoxPro articles, tips and downloads
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top