[comp.sys.mac.hypercard] Hypercard security

vespa@ssyx.ucsc.edu (Adam Alexander Margulies) (04/30/88)

	I hate security, copy protection, and secrecy, but I couldn't help
playing with some of hypercard's "security" features.

	It is difficult to keep someone from going to another stack and
typing into the message box "edit script of stack XYZ". I found that

         	on openStack
			set userlevel to 1
		.
		.
		.

nicely foils that (although I found that almost no "secure" stacks do
this. Through this method I have breached many a "secure" stack)

	Hypercard uses a lot of encryptionn (literally dozens of
different compression techniques, this is effective encryption)
so people cannot fedit your stack for passwords. To be truly secure
you must set the userlevel to 1 on openStack, intercept the
message box being opened, and stop blindtyping. Also putting a

	on idle
		hide menubar
	end idle

seems to be the best way of avoiding things like PopIt! from giving
access to the menubar, and it is easier than intercepting every 
menu item.

 	Anyone played with hypercard security and/or enjoy breaking
other people's security?


I said, type it NOW, Adam!  ||       ||Adam Margulies                         |
                          \ ||_   /| ||ARPA:   vespa@ucscb.ucsc.edu           |
                            ||\`o_O' ||BITNET: vespa@ucsci.BITNET             |
                            ||  ( )  ||UUCP: ...!ucbvax!ucscc!ssyx!vespa      |
----------------------------||--mU-m-||WEIRD:vespa%ssyx.ucsc.edu@RELAY.CS.NET |
|DISCLAIMER:                         ||ATT: (408)429-8868                     |
|       These are NOT my opinions. They are my dog's.                         |

ypay@portia.Stanford.EDU (daniel cory) (04/11/91)

I am working on a stack that will be used by a large number of people, some of
whom may be hypercard programmers. I cannot password protect it since I do want
other people to be able to use it. What code should I put into the scripts to
prevent the scripts and buttons and some of the data from being changed (This
stack works like a database - you can add a record and fill it out but may not
change old records)? Send me absolutely anything that may help prevent 
unauthorized access.

I will, of course, summarize the results and post them to the net if they are
sent to me, rather than the network.

Thanks,
Dan Cory

--
Dan Cory
If you look up through a eucalyptus tree, you see very few leaves.

mike@pyrite.SOM.CWRU.Edu (Michael Kerner) (04/12/91)

HA!  Right.  Security in anything below 2.0 is a joke.  If you are putting the
stack on an AppleShare server you could lock it and make sure none of your
users have write access to the directory.  That would make sure that noone
can change it.  The main problem is that if ANYONE gets write access, there is
a simple (relatively) way to get around the security, any security, but first
let me explain the effort I have gone through to protect our network front-end.

All the stacks intercept the doMenu message and usually veto requests, since
none of the users have any business in there (of course, since the highest
level I grant is typing - in the login stack, there are few options available).
The second thing I do is intercept the idle message and reset the settings to
cantModify and userLevel = 2.  That way if someone is fairly intelligent and
has done what I would try then they have to exert a lot more effort to get
there.

I'm not going to post how to get around the double-dipper, although most of you
(I'm sure) know how.  For those who may be interested, I'll EMAIL it.

Later,
Mikey.
Mac Admin
WSOM CSG
CWRU
mike@pyrite.som.cwru.edu