Re: HA best pratices with postgreSQL
| От | Albretch Mueller |
|---|---|
| Тема | Re: HA best pratices with postgreSQL |
| Дата | |
| Msg-id | 9ef66fac0806190701oadb39e7q8b95a6d1d3a40b21@mail.gmail.com обсуждение исходный текст |
| Ответ на | Re: HA best pratices with postgreSQL ("Douglas McNaught" <doug@mcnaught.org>) |
| Список | pgsql-general |
On Wed, Jun 18, 2008 at 10:36 PM, Douglas McNaught <doug@mcnaught.org> wrote: > . . . SQL permissions should be all you need. > > -Doug ~ What about the security implications? Is the J2EE server enough to control access to the DB? ~ Java does not allow for buffer overruns and such hacking venues, but what would happen if a hacker somehow gains access to the data directly, bypassing the J2EE server? ~ The thing is that for performance reasons I could not nicely model highly hierarchical data objects using SQL tables, so I have to come up with complicated data structures that I serialize and keep in fields as BLOBs ~ And yes, I know, my approach was very roundabout ;-) I was trying to fancy a hacker-proof scenario and it would all be based on scripts ~ I think SCSI disks even have a switch to -physically- avoid writing to them. I'd wish I could use such features in regular SATA disks. I definitely trust Physics ~ thanx lbrtchx
В списке pgsql-general по дате отправления: