Студопедия

Главная страница Случайная страница

Разделы сайта

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






Защита с использованием электронного ключа






 

This is one more proof, that the standard methods of protection, even from third-party manufacturers are vulnerable. We are talking about the keys HASP. Use the HASP Envelope utility, you can encrypt the file (in this case, the database) and allow access to it only from a secure application. It uses the mechanism of " transparent" encryption. Since the start of the operating system starts a process that tracks all access to a secure database file. If the appeal comes from conventional applications, such as ms Access - the file is read and the message of " unrecognizable database format". But if the file works specified in the encryption application, the data is transmitted to him in decrypted form. As a result, the program itself does not know about the availability of protection. Yes, the difficulty of breaking such a base has grown significantly. But it must be remembered that the application must be supplied dongle, price USD N and that the speed of access to data falls into two - three times.

Burglary protection.

Two ways to get your complete disposal database found.

- Firstly, the program code is proved to be vulnerable. Appeal to the base went with requests. Since the beginning of the debugger has been found inquiry, called in response to pressing the program button. Next, the request was instead of the text query to create a table in another database. After pressing the request button, the selected data table from a protected database and kept them in a different file.

- Second, it was written program that using a hook introduced its code into the address space protected HASP'om process and on its behalf simply copy the database file.

This method is not bad. In any case, there is real hope that the rescue. However, there are a number of limitations. Before mapping data they need to decrypt. There is no search capability on the part of the line in an encrypted field. The encryption algorithm and key are contained in the program, which means that there is a potential vulnerability. In this case, the reliability depends on the resistance to cracking of the program, working with the database. You can combine business with pleasure: do not encrypt, and compress the contents of the memo field. Understand the compression algorithm in the code activity boring.

Before you raise the issue of database protection method, you should consider it necessary. Do not rely on standard methods, but that is no reason for refusing to use Access. Specialist crack anything, but you can make it to be not so simple.

The following article describes transparent encryption Access database, which has several advantages over existing methods.

 

5. SAFETY PRECAUTIONS WHEN WORKING ON THE COMPUTER

 

In the environmental problems of computerization two components. The first is determined by the physiological peculiarities of the person behind the computer. The second - technical parameters of computerization means. These components - the " human" and " technical" - are closely intertwined and interdependent. Studies have similar problems - the subject of ergonomics, the science of human interaction, the main purpose of which is to create a perfect and safe technology, the most human-oriented, workplace organization, labor prevention.Ergonomics studies the labor activity in the complex, it integrates scientific discipline, which developed primarily independently. Therefore, the task of this essay can be formulated as - ergonomic safety analysis computer software and methods.

The fact that the work on the computer is not safe, before others felt in the most computerized country in the world - the United States of America. The epidemic of " white-collar" swept the United States, causing harm to the health of many people. According to the Labor Department, only one so-called " repetitive traumatic impact when working with a computer" (PTVRK) costing corporate America at $ 100 billion. Annually. Compensation paid to employees reaching astronomical proportions, and some victims of computer work have to pay severe pains throughout their lives.
The visual work behind a computer and its consequences

In the first years of computerization it was noted specific visual fatigue users displays became a common name " computer eye syndrome" (the CVS-the Computer the Vision Syndrome). The reasons for its occurrence a few. And above all - formed during millions of years of evolution of the human visual system, which is adapted to perceive objects in the reflected light (natural pictures, drawings, printed text, etc...), But not for display. The display is fundamentally different from the usual eye objects of observation - it shines; It consists of discrete points; it flickers, ie the point at a certain frequency turn on and off..; color computer image does not correspond to a natural color (phosphor emission spectra different from the absorption spectra of visual pigments in the retina eyes cones, which are responsible for our color vision). But not only the features of the image on the screen cause eye fatigue. When working at a computer for hours at the eye is needed relaxation phases, eye strain, their performance decreases. Most of the burden of the body feels when entering information, because the user is forced to often translate gaze from the screen on the text and keyboard at different distances and different lighting.

What is expressed in visual fatigue? Today millions of users complain of blurred vision, difficulty in transferring gaze from near to far and distant to near objects, the apparent change in the color of objects, their double vision, discomfort in the eye - a burning sensation, " sand", redness of the eyelids, pain in eye movement.

Microtrauma - is a gradual deterioration of the body as a result of daily stress. Most of the violations in the body is due to the accumulated micro traumas. This type of damage does not occur suddenly, like a broken arm or leg (makrotravma). Before you feel the pain, it may take a few months of sitting in the wrong posture or repetitive movements. The pain may be felt in different ways: in the form of burning, stabbing or shooting pain, tingling.

Repetitive actions lead to the accumulation of degradation products in the muscles. These products and cause pain. It is very difficult to prevent repetitive motion of the hands and hands while working on the computer, but regular breaks and exercises to stretch the muscles can prevent GCCC and PTVRK.

Based on the principles of ErgAerobics, injury prevention program, significantly reduce the likelihood of becoming a victim of PTVRK. Erg aerobics, developed by two experts in the field of physical therapy, or " medical ergonomics", includes the most innovative ergonomic principles, preventive and rehabilitative exercise.

 

 

5.1 Observing of Erg-Exercises

We call the proposed exercises here " erg-exercises" (ErgErcises). Erg exercise increases endurance and productivity of the computer user. They can be performed at any time and anywhere. Erg exercises are simple, do not attract attention to himself, and take up very little time. They can be done in the coffee breaks, talking on the phone or waiting at a bus stop. They help a person maintain excellent physical shape and imperceptibly become a natural way of performance - a healthy and painless.

Posture - a position that takes your body when you're sitting at the computer. Correct posture is essential for the prevention of diseases of the neck, arms, legs and back. It is also necessary to organize the workplace to be optimal posture, which reduces the risk of GCCC and PTVRK.






© 2023 :: MyLektsii.ru :: Мои Лекции
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав.
Копирование текстов разрешено только с указанием индексируемой ссылки на источник.