[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Protecting files sent to clients

Posted on 2016-08-03
7
Medium Priority
?
90 Views
Last Modified: 2016-08-28
My team developed an interactive depiction of a network map for my client.  It is written in JScript.  Data (network equipment, IP addresses, contact information, physical addresses, etc.)  was fed into the database.  When you open the file, a network diagram appears, and when you click on the icons you can drill down to the particulars of that piece of equipment.  For example, click on one or the routers and it drills down to its version, IP address, contact info, etc.  Click on the IP address and it gives you more information about the local IP subnet, etc...
I didn't write it and know very little about it.
When I send the file to my client or to another party, I can zip it and password protect it.  I send the password separately.
Once it is opened however, all the raw code is available to look at.  My question...  Can I further password protect the raw JScript files that are extracted so that my client nor anybody else can see the raw files and be able to reverse engineer it and develop it themselves?
Basically I'm talking about giving the recipient the password to open and view the interactive network map, but hide the actual scripts.
0
Comment
Question by:Ted James
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 9

Accepted Solution

by:
James Bilous earned 2000 total points (awarded by participants)
ID: 41741453
As far as I'm aware, you can only obfuscate the JS, but not encrypt it completely:

https://javascriptobfuscator.com/
0
 

Author Comment

by:Ted James
ID: 41742853
That looks interesting.  Never heard of it.  So I don't really need to encrypt then.  Just need to make sure that who I send it to does not recreate it and/or modify it and peddle it as his own.  So if the obfuscator allows him to open it (using the password I send) and navigate thru it as a user, but not be able to get into the nuts and bolts, then that would be fine.


A little more about the app.  The developer said he wrote it in Visual Basic.  The app reads excel spreadsheets into the Json to create the network map visual.
Make sense?
0
 
LVL 9

Expert Comment

by:James Bilous
ID: 41742897
Why are you so concerned about the JS? The real intellectual property is probably in the server side application and database - JS is usually just part of the presentation layer to help make requests to the server and update the display.
0
Moving data to the cloud? Find out if you’re ready

Before moving to the cloud, it is important to carefully define your db needs, plan for the migration & understand prod. environment. This wp explains how to define what you need from a cloud provider, plan for the migration & what putting a cloud solution into practice entails.

 

Author Comment

by:Ted James
ID: 41746569
This is much simpler than that.  Right now there is no server connection with what I am sending them.  It is just more or less a snapshot.  We haven't yet published the whole app connected to the database at this time.
0
 
LVL 9

Expert Comment

by:James Bilous
ID: 41746593
I see. Personally, if I was in your shoes I would rely on an opt in terms of use since the preventative measures available to you are mere speed bumps to someone who would be determined to copy your application.
0
 

Author Comment

by:Ted James
ID: 41749135
That was actually my first thought but I didn't want to broach the subject with my client and fellow contractors.  I just wanted to subtly do it when I send it.  Not talk about it, just do it.

So the java script obfuscator will do the trick for my files?
0

Featured Post

Will your db performance match your db growth?

In Percona’s white paper “Performance at Scale: Keeping Your Database on Its Toes,” we take a high-level approach to what you need to think about when planning for database scalability.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question