Mexx;
In this scenario, because there is no specific documentation on how it is implemented, the trust you put on the password protection mechanism derives from the trust you have in National Instruments and its reputation. It is equivalent to the trust you have in LabVIEW -
National Instruments is behind it.
That is OK. This is not the first nor the last time trust must be derived from another source. (Of course, we can all gain positive assurance if the protection mechanism can be examined by the community.)
This type of trust is also historically-based. It will be good to know if somebody had the bad experience of knowing that their source code was compromised because somebody was able to crack the password. Personally, I am not aware of that.
It is being
argued that National Instruments can "recover" a password-protected VI. There may be
legal issues involved in that and my understanding is that they won't do it. That is good news which affect positively NI reputation.
There are tools to crack VIs passwords, but are still limited. Check out my page at www.visecurity.com/links.shtml for this and more security-related links on LabVIEW. (If you or anybody knows of additional artivles I can point from my website, please e-mail me.)
Take special consideration in the length and composition of the password, and (if it apply) in how you are going to distribute the password. As a baseline, make sure it is longer than 6 characters.
Regards;
Enrique Vargas
www.visecurity.com
www.vartortech.com