Protecting files sent to clients

Posted on 2016-08-03
Last Modified: 2016-08-28
My team developed an interactive depiction of a network map for my client.  It is written in JScript.  Data (network equipment, IP addresses, contact information, physical addresses, etc.)  was fed into the database.  When you open the file, a network diagram appears, and when you click on the icons you can drill down to the particulars of that piece of equipment.  For example, click on one or the routers and it drills down to its version, IP address, contact info, etc.  Click on the IP address and it gives you more information about the local IP subnet, etc...
I didn't write it and know very little about it.
When I send the file to my client or to another party, I can zip it and password protect it.  I send the password separately.
Once it is opened however, all the raw code is available to look at.  My question...  Can I further password protect the raw JScript files that are extracted so that my client nor anybody else can see the raw files and be able to reverse engineer it and develop it themselves?
Basically I'm talking about giving the recipient the password to open and view the interactive network map, but hide the actual scripts.
Question by:Ted James
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3

Accepted Solution

James Bilous earned 500 total points (awarded by participants)
ID: 41741453
As far as I'm aware, you can only obfuscate the JS, but not encrypt it completely:

Author Comment

by:Ted James
ID: 41742853
That looks interesting.  Never heard of it.  So I don't really need to encrypt then.  Just need to make sure that who I send it to does not recreate it and/or modify it and peddle it as his own.  So if the obfuscator allows him to open it (using the password I send) and navigate thru it as a user, but not be able to get into the nuts and bolts, then that would be fine.

A little more about the app.  The developer said he wrote it in Visual Basic.  The app reads excel spreadsheets into the Json to create the network map visual.
Make sense?

Expert Comment

by:James Bilous
ID: 41742897
Why are you so concerned about the JS? The real intellectual property is probably in the server side application and database - JS is usually just part of the presentation layer to help make requests to the server and update the display.
Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.


Author Comment

by:Ted James
ID: 41746569
This is much simpler than that.  Right now there is no server connection with what I am sending them.  It is just more or less a snapshot.  We haven't yet published the whole app connected to the database at this time.

Expert Comment

by:James Bilous
ID: 41746593
I see. Personally, if I was in your shoes I would rely on an opt in terms of use since the preventative measures available to you are mere speed bumps to someone who would be determined to copy your application.

Author Comment

by:Ted James
ID: 41749135
That was actually my first thought but I didn't want to broach the subject with my client and fellow contractors.  I just wanted to subtly do it when I send it.  Not talk about it, just do it.

So the java script obfuscator will do the trick for my files?

Featured Post

Is your NGFW recommended by NSS Labs?

Ours is! NSS Labs Next Generation Firewall Test gives the WatchGuard Firebox M4600 a "Recommended" rating! Curious where your NGFW landed on the  Security Value Map? See the map and download the full report today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Liquid Web and Plesk discuss how to simplify server management with a single tool  in their webinar.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compliā€¦
The viewer will learn how to count occurrences of each item in an array.
The viewer will learn how to look for a specific file type in a local or remote server directory using PHP.

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question