>Is it? And even if it is, what will that tell him? I just don’t think
there is enough context.
Well atleast the file name of the caller could be extracted.
Let’s say he is able to determine that Outlook is reading the file. How
will he know whether it is destined for an address outside the company,
in which case he will want to eliminate the extra cruft?
Correct, I never said just doing this is going to solve it. OUTLOOK and
others are cases that need to be handled seperately. Infact, in the
prototype we developed, we had to use MSAA to track OUTLOOK and other office
apps, and a lot of API hooking (oops sorry, but I am trying to get rid of
all ofthem and find better approaches). Also the two file approach doesnt
help much, we are currently using it, and know where it fails.
If the reader
is zip.exe, or 7zip.exe, how will he know whether to keep the extra
info? The problem is unsolveable.
We will not, we will simply take it as a transformation operation and remove
the header from the doc and append it to the zip. Now lets take tht the zip
was emailed, that is where our taps into OUTLOOK can tell us whether the
mail is going within the org or outside it. I know, I know, it is not a good
approach, and I am trying to solve the “unsolveable problem”, and honestly
tim, I agree that it cannot be solved, unless the number of apps supported
by the program are the only ones that can ever be installed and run on the
machine.
And let’s say someone does e-mail an encrufted document to someone else
in the company, who saves it to disk. He is going to have to recognize
that the document contains the encruftion, so he can use that, instead
of creating it anew.
If the doc reaches the user properly, I dont think that would be herculian.
Infact maintaining the context and sending it across is the difficult part.
Can he ensure that it won’t be faked?
No I cannot. Atleast not today!!!
I just think he is on the wrong track with this.
Me too, just that I am sharing with you all the observations I have already
made on this issue.
I think it would be entirely practical to create and maintain some kind of
permanent journal
of all accesses and modifications to all files, and his “carry along”
technique would not generate any information that a sophisticated log
analysis utility couldn’t also generate.
And if he does that, that is the logs are maintained in a XML type of a file
seperate from the actual doc, then if the file is emailed, how does he send
the XML file also, or how does the zip operation get handled?
amitr0