Click here to Skip to main content
14,240,857 members

Running a Business

 
AnswerRe: How to protect my code from getting stolen by employees? Pin
Paul Conrad5-Sep-15 17:54
professionalPaul Conrad5-Sep-15 17:54 
AnswerRe: How to protect my code from getting stolen by employees? Pin
Amarnath S7-Sep-15 21:41
professionalAmarnath S7-Sep-15 21:41 
AnswerRe: How to protect my code from getting stolen by employees? Pin
raddevus25-Jan-16 16:09
mvaraddevus25-Jan-16 16:09 
AnswerRe: How to protect my code from getting stolen by employees? Pin
ekesa14-Jun-16 21:07
memberekesa14-Jun-16 21:07 
GeneralRe: How to protect my code from getting stolen by employees? Pin
CHill6014-Jun-16 23:54
protectorCHill6014-Jun-16 23:54 
AnswerRe: How to protect my code from getting stolen by employees? Pin
s.smith9312-Jul-16 23:15
members.smith9312-Jul-16 23:15 
AnswerRe: How to protect my code from getting stolen by employees? Pin
Sid pathan30-Oct-16 20:52
memberSid pathan30-Oct-16 20:52 
AnswerRe: How to protect my code from getting stolen by employees? Pin
DCE Security Ltd.4-Jul-17 15:39
memberDCE Security Ltd.4-Jul-17 15:39 
In computer science, method of maintaining proof of authorship (PoA) in code is done in the style of one of two approaches. The chosen approach is either A) a tangible, or B) an un-tangible.

Tangible PoA methods are usually either literally simple like writing your name, username, ID number, into the code. This does work to some extent but can be removed, even if the thief doesnt remove the string, you must be able to show PoA of this string. So, make sure the string you use is verifiable to you as the string has to be able to show by verifification that you have PoA of the string (tag/ID number/email address etc.). Using this method, you could include a ciphertext string in the code if the plaintext had been encrypted using your public key. If the plaintext consisted of 'mr.xx wrote this code and owns all including intellectual rights to this code' for example, before insertion of the ciphertext string into the code, remember that the encryption key for this string must be one which your private key can decrypt. This therefore stamps the code with an easily provable PoA element, so if the code pops up somewhere else, you could demonstrate your explicit and exclusive PoA of the code.
Another useful tangible approach method is adding 'red herrings' into the codebase. A red herring in this context is anything in the code that is nonsensical and usually syntactically invalid.
If you added a few letters at random to the end of randomly-selected and randomly-ordered code lines it could be used an PoA as only you could explain it (showing your valid PoA); nowadays you could even include an encrypted statement of ownership and timestamp ciphertext that can only be decrypted by using your private key, then build a pseudorandom ciphertext-bit distribution process. The reverse of the distribution algorithm will collect and reconstruct the original ciphertext. You could then decrypt this ciphertext and show those who are concerned that you have PoA over the code.
Whereas an intangible method would likely be computerised; one example is, the use of compartmentalisation to keep code secret from those who didnt code it. This can be done by writing chunks of code in various containers, such as;
a written in javascript in a HTML setting. or
a Python script batch that is called upon by the C++ applicationcodebase or even just host the secured script on sister server and code the applications interaction with the code via APIs like you would in most applications.

Hope this helps
AnswerRe: How to protect my code from getting stolen by employees? Pin
Matt Comb21-Dec-17 2:53
professionalMatt Comb21-Dec-17 2:53 
QuestionHow to Start Small IT Firm with lowest investment? Pin
RK Samy5-May-15 18:50
memberRK Samy5-May-15 18:50 
AnswerRe: How to Start Small IT Firm with lowest investment? Pin
Richard MacCutchan5-May-15 21:26
protectorRichard MacCutchan5-May-15 21:26 
QuestionCan you give me some advices about IT outsourcing? Pin
Member 1139989325-Jan-15 3:08
memberMember 1139989325-Jan-15 3:08 
AnswerRe: Can you give me some advices about IT outsourcing? Pin
laurelanne26-Feb-15 4:12
memberlaurelanne26-Feb-15 4:12 
QuestionWhy there are no good software Projects in Odesk, elance etc. Pin
pandu web dev28-Jul-14 6:39
memberpandu web dev28-Jul-14 6:39 
AnswerRe: Why there are no good software Projects in Odesk, elance etc. Pin
CodingK17-Oct-14 15:13
professionalCodingK17-Oct-14 15:13 
GeneralRe: Why there are no good software Projects in Odesk, elance etc. Pin
Daniel Miller19-Oct-15 14:09
professionalDaniel Miller19-Oct-15 14:09 
AnswerRe: Why there are no good software Projects in Odesk, elance etc. Pin
jschell26-Dec-14 9:19
memberjschell26-Dec-14 9:19 
Questionabout paper licenec from microsoft Pin
cetec29-May-14 0:35
membercetec29-May-14 0:35 
AnswerRe: about paper licenec from microsoft Pin
Richard MacCutchan29-May-14 1:26
protectorRichard MacCutchan29-May-14 1:26 
QuestionManage a remote development team Pin
Mike Dev Br24-Jan-14 1:59
memberMike Dev Br24-Jan-14 1:59 
AnswerRe: Manage a remote development team PinPopular
jschell24-Jan-14 12:29
memberjschell24-Jan-14 12:29 
JokeRe: Manage a remote development team Pin
Vivic11-Feb-14 14:06
professionalVivic11-Feb-14 14:06 
GeneralRe: Manage a remote development team Pin
Mike Dev Br17-Feb-14 1:58
memberMike Dev Br17-Feb-14 1:58 
AnswerRe: Manage a remote development team Pin
sam81gmail16-Feb-14 1:15
membersam81gmail16-Feb-14 1:15 
GeneralRe: Manage a remote development team Pin
Mike Dev Br17-Feb-14 2:00
memberMike Dev Br17-Feb-14 2:00 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.