On Sun, Jun 02, 2013 at 06:29:05PM -0500,
gtwi...@yahoo.com wrote:
> Unfortunately, this particular bunch has given me solid reasons to
> not trust them, it is also been a request of the entity that actually
> owns the show. Not crazy about the idea, only trying to accommodate
> my clients request.
Actually installing anything on the clients machine to do this
surreptitiously would almost certainly fall foul of the computer misuse
act in the UK I don't know if there are equivalents where ever you are.
This leave you using a Script cue in QLab itself but robustly deleting
the audio *without* knowing where the bundle has been copied to and
without the possibility of deleting anything else by mistake might be
problematic and again would cause your problems if you manage to delete
some of the clients data by mistake.
How clueful is the end user? If they have zero clue and the machine is
yours then you configure an account to:
- Enable Parental Controls
- Use Simple Finder
- Only Allow QLab and nothing else to be launched
- Open the show file on login
The 'Simple' Finder only allows access to 'Applications' 'Documents'
and 'Shared' folders. So placing the audio assets anywhere else on the
machine QLab will be able to see them but the user will not be able to
navigate to them and see them in the finder.
If the client has non-zero clue then deleting the bundled assets isn't going to
help you as the malicious user will just have copied them elsewhere.
Additionally it's possible to get round the precautions outlined above
trivially by booting the machine from external media however this
means they have to have slightly more clue than just dragging files
around.
-p
--
Paul Gotch
--------------------------------------------------------------------