PROBLEM 2
SlighSoftware Inc. writes a database program with a nifty piece of code that rewrites the access method on April 1, 2004. When the users of SlighSoftware start the program on April 1, 2004 they are denied access to their data because the program has modified the encryption method. SlighSoftware then notifies the users that the new software is required and the user will have no access until the new software is purchased. Can the user circumvent the access controls to get to their own data from the data file?