Login ProductsSalesSupportDownloadsAbout |
Home » Technical Support » DBISAM Technical Support » Support Forums » DBISAM General » View Thread |
Messages 11 to 11 of 11 total |
Reading Description of Encrypted Tables |
Wed, Nov 15 2006 4:27 PM | Permanent Link |
Tim Young [Elevate Software] Elevate Software, Inc. timyoung@elevatesoft.com | Chuck,
<< What about deciding within the init, decrypt and encrypt events how to handle the encryption. I see that the sender is the DBISAMEngine, which doesn't seem to help much. I looked at the runtime properties of the DBISAMEngine, and nothing looked promising. Is there a way to determine what dataset or file is being processed from the DBISAMEngine? >> Unfortunately, no, because the encryption is used for remote communications between the client session and database server in addition to the table encryption. -- Tim Young Elevate Software www.elevatesoft.com |
« Previous Page | Page 2 of 2 | |
Jump to Page: 1 2 |
This web page was last updated on Saturday, May 4, 2024 at 12:54 AM | Privacy PolicySite Map © 2024 Elevate Software, Inc. All Rights Reserved Questions or comments ? E-mail us at info@elevatesoft.com |