O'Reilly logo

Microsoft® Mobile Development Handbook by Peter Foot, Daniel Moth, Andy Wigley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Perimeter Security: Securing Access to the Device

So far in this chapter, we've discussed applications of encryption, including how to authenticate a user name and password to protect access to your application and how to encrypt data in databases and files. We have also discussed input validation. If you, the developer, have done your job properly, it really doesn't matter if the device is lost or stolen, does it?

Because there's no such thing as perfect security, you must use defense in depth: Put many obstacles in front of your attackers. If your devices run Windows Mobile, the first thing you should do is use the built-in power-on password. This feature is disabled by default, and when activated you can choose between a simple four-digit personal ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required