My client runs a system that my co owns.
They want to get the data out of the database.
We have told them we would build an interface for them to get the data.
However they have some guy hacking around in the database trying to piece it together.
Is there anything I can do to stop this happening?
The source code is encrypted however the DB is an open book really SP's, design, keys.
They want to get the data out of the database.
We have told them we would build an interface for them to get the data.
However they have some guy hacking around in the database trying to piece it together.
Is there anything I can do to stop this happening?
The source code is encrypted however the DB is an open book really SP's, design, keys.
Comment