Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. prevent code stealing

prevent code stealing

Scheduled Pinned Locked Moved The Lounge
csharpcollaborationquestion
27 Posts 19 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Shog9 0

    Bobum wrote: Remove Internet Access, LAN only access Remove CDRW burners from dev PC's Remove Floppydrives Remove/disable USB ports Remove any network printers from dev PC's Remove/diasble com & parrallel ports Woah woah woah! Better not stop there, gotta disable all the development tools also, and maybe the OS just to be safe. Can't be having those developers writing software that might allow them to transmit data using radio signals generated by altering their monitor refresh rates. Hmm, better take away the monitor too, as they might be able to read the code and remember it long enough to copy it down when they got home. Oh, and don't forget about strip searches...

    Shog9

    I'm not the Jack of Diamonds... I'm not the six of spades. I don't know what you thought; I'm not your astronaut...

    A Offline
    A Offline
    Andy Brummer
    wrote on last edited by
    #12

    You'd let them go home? Chain them to their desks.


    I can imagine the sinking feeling one would have after ordering my book, only to find a laughably ridiculous theory with demented logic once the book arrives - Mark McCutcheon

    S 1 Reply Last reply
    0
    • S Shog9 0

      The bastards! :omg: Jeremy's suggestion would work if you could put even a tiny bit of trust in these wicked souls, but given their crafty, honorless minds you can bet they'll find a way around anything you could establish. No, your only hope is to fire the whole lot, preferably on a holiday and after carefully locking down the code and the building so that they can't sneak back in. Then hire some people you can put faith in not to do anything odd with your code. I suggest RPG programers in their mid 40s.

      Shog9

      I'm not the Jack of Diamonds... I'm not the six of spades. I don't know what you thought; I'm not your astronaut...

      T Offline
      T Offline
      Tom Archer
      wrote on last edited by
      #13

      Shog9 wrote: I suggest RPG programers in their mid 40s. Hey! I coded RPG III/400 :mad: But I'm only 40 :-D Cheers, Tom Archer - Archer Consulting Group Programmer Trainer and Mentor and Project Management Consultant

      1 Reply Last reply
      0
      • J Jim Crafton

        ColinDavies wrote: All this activity will cost you money so you had better do a cost benefit analysis to determine at which extreme is worthwhile. And to an extent it will cost you your companies self respect (at least option 3 or 4) if your employees ever find out. If I found out that my employer actually hired a PI to try and entrap me to test my honesty and integrity as a potential employee, I think I'd be tempted to quit on the spot. As a general rule, there's a point where this becomes ridiculous. That said, there *are* some situations where this would be OK IMHO. Anyone working in secure environments like the CIA or NSA or whatever should fully expect this kind of background checking. However for just a run of the mill job? Seems like overkill. ¡El diablo está en mis pantalones! ¡Mire, mire! Real Mentats use only 100% pure, unfooled around with Sapho Juice(tm)! SELECT * FROM User WHERE Clue > 0 0 rows returned Save an Orange - Use the VCF!

        C Offline
        C Offline
        ColinDavies
        wrote on last edited by
        #14

        The main point I should have made, is to get the right people to start off with. Then to create and continue a culture where you will retain them and they will respect the company. While I have no personal experience worthy of mentioning I feel many corporates have screwed themselves up in regards to this due to be controlled by bean counters who try to save money through cost cutting rather than lift production and sales. Regardz Colin J Davies The most LinkedIn CPian (that I know of anyhow) :-)

        J 1 Reply Last reply
        0
        • C ColinDavies

          The main point I should have made, is to get the right people to start off with. Then to create and continue a culture where you will retain them and they will respect the company. While I have no personal experience worthy of mentioning I feel many corporates have screwed themselves up in regards to this due to be controlled by bean counters who try to save money through cost cutting rather than lift production and sales. Regardz Colin J Davies The most LinkedIn CPian (that I know of anyhow) :-)

          J Offline
          J Offline
          Jim Crafton
          wrote on last edited by
          #15

          OK, well there I agree 200% with you! I have always been utterly amazed at how slack all the places I have been employed at have been at checking backgrounds, following up on references, and/or actually conducting a thorough interview. The only place I have interviewed at that I thought did a competent job was (eeewww, get ready for this!) Microsoft. Most places have been absolutely derelict in actually determining whether or not I was actually up to snuff. Maybe this is just the way things work, but coming from a conservatory background where "interviews" are ferociously competitive it was rather weird to experience. ¡El diablo está en mis pantalones! ¡Mire, mire! Real Mentats use only 100% pure, unfooled around with Sapho Juice(tm)! SELECT * FROM User WHERE Clue > 0 0 rows returned Save an Orange - Use the VCF!

          C 1 Reply Last reply
          0
          • J Jim Crafton

            OK, well there I agree 200% with you! I have always been utterly amazed at how slack all the places I have been employed at have been at checking backgrounds, following up on references, and/or actually conducting a thorough interview. The only place I have interviewed at that I thought did a competent job was (eeewww, get ready for this!) Microsoft. Most places have been absolutely derelict in actually determining whether or not I was actually up to snuff. Maybe this is just the way things work, but coming from a conservatory background where "interviews" are ferociously competitive it was rather weird to experience. ¡El diablo está en mis pantalones! ¡Mire, mire! Real Mentats use only 100% pure, unfooled around with Sapho Juice(tm)! SELECT * FROM User WHERE Clue > 0 0 rows returned Save an Orange - Use the VCF!

            C Offline
            C Offline
            ColinDavies
            wrote on last edited by
            #16

            It's a time consuming and expensive job to conduct thorough background checks, which is my guess why most palces don't do it. But as you say MS do it and they have built a "special" culture around having the right people behaving in the right way. All the folk I know who work for MS seem to love being involved with the company, although I'm sure there are dissenters. Regardz Colin J Davies The most LinkedIn CPian (that I know of anyhow) :-)

            1 Reply Last reply
            0
            • A Andy Brummer

              You'd let them go home? Chain them to their desks.


              I can imagine the sinking feeling one would have after ordering my book, only to find a laughably ridiculous theory with demented logic once the book arrives - Mark McCutcheon

              S Offline
              S Offline
              Shog9 0
              wrote on last edited by
              #17

              :)

              Shog9

              I'm not the Jack of Diamonds... I'm not the six of spades. I don't know what you thought; I'm not your astronaut...

              1 Reply Last reply
              0
              • D David Wulff

                If you don't trust your own co-/workers you need to get that sorted long before you think about protecting your code. A trusting workplace is a productive workplace.


                Ðavid Wulff The Royal Woofle Museum
                Audioscrobbler :: dwulff

                Everybody is entitled to my opinion

                J Offline
                J Offline
                Jerry Hammond
                wrote on last edited by
                #18

                David Wulff wrote: If you don't trust your own co-/workers you need to get that sorted long before you think about protecting your code. A trusting workplace is a productive workplace. Sing it, brothe'. Sing it. He said this was like painstakingly assembling the first layer of a house of cards, then boasting that the next 15,000 layers were a mere formality.--The Code Book, pp. 331 Toasty0.com DotNetGroup.org

                1 Reply Last reply
                0
                • B Bobum

                  heh - this is a good one... Remove Internet Access, LAN only access Remove CDRW burners from dev PC's Remove Floppydrives Remove/disable USB ports Remove any network printers from dev PC's Remove/diasble com & parrallel ports Hire honest people and pay them enough so that they won't feel that stealing your software is necessary. I don't know how many of the top pieces of information are actually feasable in your instance - but I worked at a place that had nearly that exact same setup...

                  N Offline
                  N Offline
                  NormDroid
                  wrote on last edited by
                  #19

                  Bobum wrote: heh - this is a good one... Remove Internet Access, LAN only access Remove CDRW burners from dev PC's Remove Floppydrives Remove/disable USB ports Remove any network printers from dev PC's Remove/diasble com & parrallel ports heh - heh, and then watch your developers leave, good one - not.

                  R 1 Reply Last reply
                  0
                  • B Bobum

                    heh - this is a good one... Remove Internet Access, LAN only access Remove CDRW burners from dev PC's Remove Floppydrives Remove/disable USB ports Remove any network printers from dev PC's Remove/diasble com & parrallel ports Hire honest people and pay them enough so that they won't feel that stealing your software is necessary. I don't know how many of the top pieces of information are actually feasable in your instance - but I worked at a place that had nearly that exact same setup...

                    T Offline
                    T Offline
                    Ted Ferenc
                    wrote on last edited by
                    #20

                    Thta is not s silly as it sounds, I know of banks that have that configuration on their PCs


                    "An expert is a person who has made all the mistakes that can be made in a very narrow field." - Neils Bohr

                    1 Reply Last reply
                    0
                    • B Bobum

                      heh - this is a good one... Remove Internet Access, LAN only access Remove CDRW burners from dev PC's Remove Floppydrives Remove/disable USB ports Remove any network printers from dev PC's Remove/diasble com & parrallel ports Hire honest people and pay them enough so that they won't feel that stealing your software is necessary. I don't know how many of the top pieces of information are actually feasable in your instance - but I worked at a place that had nearly that exact same setup...

                      B Offline
                      B Offline
                      benjymous
                      wrote on last edited by
                      #21

                      Before I got my current job I spent a long period temping, and one of the assignments was at an RAF base They were in the process of rolling out a new system that was incredibly paranoid From memory: Only internal email (there'd be a departmental email address that was visable from outside, that only a particular computer could access, so people had to go to that and forward stuff to their own internal account) No internet access No access to *any* drive or folder on the computer bar My Documents DirectX, Media Player, and any kind of audio/video codec stripped out Firewire, USB, serial, parallel all disabled Network printing disabled (erm... how can you print?) and hundreds of other little things that you'd always find yourself needing Oh, by the way, I was working in a graphics/media shop (doing lots of graphics and video work - so the lack of the ability to print or use video would've been quite a problem, as was the fact that the promo videos being produced would no longer play on anybody's computers due to the lack of player codecs) Joy -- Help me! I'm turning into a grapefruit! Phoenix Paint - back from DPaint's ashes!

                      1 Reply Last reply
                      0
                      • J JonathanMarsh

                        hello I supervise a team for developing software in c# and I always worry some of my members may steal the code to modify part of them and then to sell them as software components or as a complete program. What measures could I take to prevent this ? We develop in a software components approach to build up a large software.

                        A Offline
                        A Offline
                        Antony M Kancidrowski
                        wrote on last edited by
                        #22

                        Just to add to your paranoia. No matter what measures you take, you can not take away their knowledge to produce the code again...and second time round it is likely to be better! ;) Seriously, you need to trust your co-workers and make them feel important / wanted. In this sort of environment people are less likely to want to stray. Ant. I'm hard, yet soft.
                        I'm coloured, yet clear.
                        I'm fruity and sweet.
                        I'm jelly, what am I? Muse on it further, I shall return!
                        - David Walliams (Little Britain)

                        1 Reply Last reply
                        0
                        • N NormDroid

                          Bobum wrote: heh - this is a good one... Remove Internet Access, LAN only access Remove CDRW burners from dev PC's Remove Floppydrives Remove/disable USB ports Remove any network printers from dev PC's Remove/diasble com & parrallel ports heh - heh, and then watch your developers leave, good one - not.

                          R Offline
                          R Offline
                          Ryan Binns
                          wrote on last edited by
                          #23

                          norm.net wrote: Bobum wrote: heh - this is a good one... Remove Internet Access, LAN only access Remove CDRW burners from dev PC's Remove Floppydrives Remove/disable USB ports Remove any network printers from dev PC's Remove/diasble com & parrallel ports heh - heh, and then watch your developers leave, good one - not. Believe it or not, that's standard for military projects like the one I'm working on :)

                          Ryan

                          "Punctuality is only a virtue for those who aren't smart enough to think of good excuses for being late" John Nichol "Point Of Impact"

                          1 Reply Last reply
                          0
                          • J Jeremy Falcon

                            If they are your employees, make 'em sign a Non-Disclosure Agreement and/or Non-Compete Agreement. If they are your business partners and you're that paranoid, then maybe you shouldn't be in business with people you're afraid will rob you blind. Jeremy Falcon

                            realJSOPR Offline
                            realJSOPR Offline
                            realJSOP
                            wrote on last edited by
                            #24

                            A no-compete agreement can be successfully defeated in court in right-to-work states. Afterall, you gain a certain level of expert knowledge for a program you write, and you can take that expert knowledge with you to another company, and write different code based on that knowledge. Nobody can legally prevent you from exercising your expert knowledge or you chosen profession of "programmer". For instance, I spent 12 years writing estate planning software for one company and I gained a LOT of knowledge about the tax codes and other estate planning related stuff , and I could have quit at any time and went to work for one of our competitors, and my old employer couldn't have done a thing about it UNLESS I also used code fromt their program, and at that point, they could have sued my new employer as well. Employers are also reluctant to allow a programmer to bring in code from outside (code from CP notwithstanding). ------- sig starts "I've heard some drivers saying, 'We're going too fast here...'. If you're not here to race, go the hell home - don't come here and grumble about going too fast. Why don't you tie a kerosene rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

                            1 Reply Last reply
                            0
                            • B Bobum

                              heh - this is a good one... Remove Internet Access, LAN only access Remove CDRW burners from dev PC's Remove Floppydrives Remove/disable USB ports Remove any network printers from dev PC's Remove/diasble com & parrallel ports Hire honest people and pay them enough so that they won't feel that stealing your software is necessary. I don't know how many of the top pieces of information are actually feasable in your instance - but I worked at a place that had nearly that exact same setup...

                              R Offline
                              R Offline
                              rbid
                              wrote on last edited by
                              #25

                              Bobum wrote: heh - this is a good one... Remove Internet Access, LAN only access Remove CDRW burners from dev PC's Remove Floppydrives Remove/disable USB ports Remove any network printers from dev PC's Remove/diasble com & parrallel ports Jail?... I guess nobody would like to work on a place like that. -- **Ricky Marek** (_AKA: rbid_) -- "Things are only impossible until they are not" --- Jean-Luc Picard My articles

                              1 Reply Last reply
                              0
                              • S Shog9 0

                                Bobum wrote: Remove Internet Access, LAN only access Remove CDRW burners from dev PC's Remove Floppydrives Remove/disable USB ports Remove any network printers from dev PC's Remove/diasble com & parrallel ports Woah woah woah! Better not stop there, gotta disable all the development tools also, and maybe the OS just to be safe. Can't be having those developers writing software that might allow them to transmit data using radio signals generated by altering their monitor refresh rates. Hmm, better take away the monitor too, as they might be able to read the code and remember it long enough to copy it down when they got home. Oh, and don't forget about strip searches...

                                Shog9

                                I'm not the Jack of Diamonds... I'm not the six of spades. I don't know what you thought; I'm not your astronaut...

                                realJSOPR Offline
                                realJSOPR Offline
                                realJSOP
                                wrote on last edited by
                                #26

                                You must not be aware of Longhorn's ability to allow System Admins to turn off access to ALL removable storage media. Want to burn a CD with source code? Nope, can't do it. Okay then, I'll just stick in a thumb drive... nope, the USB ports don't recognize storage devices. You think it's difficult for a Sys Admin to monitor EVERYTHING you do on your computer? Longhorn will make it even eaiser. ------- sig starts "I've heard some drivers saying, 'We're going too fast here...'. If you're not here to race, go the hell home - don't come here and grumble about going too fast. Why don't you tie a kerosene rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

                                1 Reply Last reply
                                0
                                • B Bobum

                                  heh - this is a good one... Remove Internet Access, LAN only access Remove CDRW burners from dev PC's Remove Floppydrives Remove/disable USB ports Remove any network printers from dev PC's Remove/diasble com & parrallel ports Hire honest people and pay them enough so that they won't feel that stealing your software is necessary. I don't know how many of the top pieces of information are actually feasable in your instance - but I worked at a place that had nearly that exact same setup...

                                  B Offline
                                  B Offline
                                  Blake Miller
                                  wrote on last edited by
                                  #27

                                  You forgot to enable the case intrusion alarm... In case they take the whole hard drive home for the evening...

                                  1 Reply Last reply
                                  0
                                  Reply
                                  • Reply as topic
                                  Log in to reply
                                  • Oldest to Newest
                                  • Newest to Oldest
                                  • Most Votes


                                  • Login

                                  • Don't have an account? Register

                                  • Login or register to search.
                                  • First post
                                    Last post
                                  0
                                  • Categories
                                  • Recent
                                  • Tags
                                  • Popular
                                  • World
                                  • Users
                                  • Groups