Chapter 28 Using Connection Management
Your application may have a potential security hole if Java component implementation classes are deployed under the Jaguar html directory. An unauthorized user can implement a program that connects to Jaguar's HTTP port and downloads the component's implementation classes. The user can then decompile the classes and gain access to potentially sensitive information such as database passwords. To close this security hole, Sybase recommends one of the following approaches:
Copyright © 2000 Sybase, Inc. All rights reserved. |