Win a copy of The Little Book of Impediments (e-book only) this week in the Agile and Other Processes forum!
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic

Modify Question

 
Matt Ghiold
Ranch Hand
Posts: 213
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hey guys,
For the modify in remote mode do we need to take into account whether the person has the correct lock and is not just arbitratly calling the lock method?
Meaning, do I need to worry about malicious users manipulating my code? Currently, I have modify locked down very hard in remote mode, needing a valid key etc, but I was wondering if it's needed as my locking mechnasim works just fine, so in my code I know that if I get to the modify method I do have the correct key, but should I code for malicous users?
When I say malicious users I mean on the programming side, on the end user side, there's no way for them to do what I am saying above.
-Matt
 
Max Habibi
town drunk
( and author)
Sheriff
Posts: 4118
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
No, you really don't. In a real application, this might be concern. But here, I think it will just add complexity you are not really required to provide.
All best,
M, author
The Sun Certified Java Developer Exam with J2SE 1.4
[ December 20, 2002: Message edited by: Max Habibi ]
 
Matt Ghiold
Ranch Hand
Posts: 213
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Thank's I was thinking it was a little overkill on my side as well.
 
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic