hay iam back . so itis shotokan too? weired i dk but here brown belt is 2 and 1 kius blue one is called 3kiu , green, orange 6 and 5 kiu, yellow 6 and 7 . that is the system here and shotokan too, but anyways itis just amartial art, and yap keep ur self strong :)
i have another question for u (told ya u won't get rid of me XD)
this time i don't have adata base or something complicated i just want to ask about the access programme abilities and limits. so i want to know is it possible to creat a user name and password for specific users.
for example , like when i logg in in yahoo account.i sign up then i logg in after my user name and password are saved in yahoo db
in access let's say i have a table with 7 names, and i closed my database so no one can access this data base but i want only those 7 people to access the data base, is this possible in access???
thank you
4 1617 NeoPa 32,562
Recognized Expert Moderator MVP
It is possible (or was at least - I hear they stopped it in Access 2007), but it is really not a very good system for many reasons, one of which is that you either have a scenario where anyone can quite easily get in as Administrator, or you have to manage the whole thing with the possibility of losing access to the file completely if you lose the System.Mdw file. Not to mention how much of a head-ache it is keeping it up-to-date when you make any amendments.
Personally, where this is a requirement, I tend to get the logged on user's name and check it against the allowed users list (that I store in a table) for each object.
The code I use for this is : - 'GetUser returns the user's logged on name.
-
Public Function GetUser() As String
-
Dim strUserKey As String
-
-
If Environ("OS") = "Windows_NT" Then
-
strUserKey = "SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"
-
GetUser = RegRead(conHKLM, strUserKey, "DefaultUserName")
-
Else
-
'Windows
-
strUserKey = "Network\Logon"
-
GetUser = RegRead(conHKLM, strUserKey, "username")
-
End If
-
End Function
It uses an OS function from another module which is : - Private Declare Function RegOpenKeyEx Lib "advapi32.dll" _
-
Alias "RegOpenKeyExA" (ByVal hKey As Long, _
-
ByVal lpSubKey As String, _
-
ByVal ulOptions As Long, _
-
ByVal samDesired As Long, _
-
phkResult As Long) As Long
-
Private Declare Function RegCloseKey Lib "advapi32.dll" (ByVal hKey As Long) _
-
As Long
-
Private Declare Function RegQueryValueExStr Lib "advapi32.dll" _
-
Alias "RegQueryValueExA" (ByVal hKey As Long, _
-
ByVal lpValueName As String, _
-
ByVal lpReserved As Long, _
-
lpType As Long, _
-
ByVal lpData As String, _
-
lpcbData As Long) As Long
-
-
Public Function RegRead(ByVal lngHive As Long, _
-
ByVal strKey As String, _
-
ByVal strValue As String) As Variant
-
Dim intIdx As Integer, intHK As Integer
-
Dim strWork As String
-
Dim lngRet As Long, cbLen As Long, lngHKey As Long, lngType As Long
-
-
RegRead = Null
-
strKey = strKey & Chr(0)
-
lngRet = RegOpenKeyEx(lngHive, strKey, 0, conKeyRead, lngHKey)
-
If lngRet = conOK Then
-
'Create buffer to store value
-
strWork = Space(255)
-
cbLen = 255
-
lngRet = RegQueryValueExStr(lngHKey, _
-
strValue, _
-
0&, _
-
lngType, _
-
strWork, _
-
cbLen)
-
RegRead = Left(strWork, cbLen - 1)
-
If Len(RegRead) = 254 Then RegRead = Null
-
'Close key
-
Call RegCloseKey(lngHKey)
-
End If
-
End Function
NeoPa 32,562
Recognized Expert Moderator MVP
It's Wado-Ryu, not Shotokan. My mistake.
Kyus from 1 to 9 are :
Brown (3 stripes); Brown (2 stripes); Brown (1 stripe); Blue; Green; Orange; Yellow; Red; White.
I moved your question btw as each question should be in its own thread, though you may post links between threads if it's relevant at all. I will do that here to ensure the conversation makes sense.
This was split from How to structure an access database.
yeah itis my mistake srry i should have made anew thread
thanks so much i gave ur answer to my boss and it was a valuable thanx if there is another question i will come to u defenitly :)
NeoPa 32,562
Recognized Expert Moderator MVP @kurai hikari
Not a big problem. There are things you need to learn in time but you're still quite new.
Sign in to post your reply or Sign up for a free account.
Similar topics |
by: Mike MacSween |
last post by:
Further to 'Security - more complex than I thought'
Has anybody ever seen any studies? Or anecdotal evidence? Done any studies
themselves? Done any lab testing - you know - 10 users asked to get past
Access (or other) security?
It'd be interesting to know. And no, I don't have any prejudices.
Yours, Mike MacSween
|
by: BigDaDDY |
last post by:
Um yeah....In case you haven't figured it out, Microsoft sucks. I'm going
to be kicked back in my chair eating popcorn and watching football 10 years
from now, while all you clowns are scrambling to rewrite all your code
because Microsoft upgraded all their crap and nothing you wrote 10 years
earlier works. It doesn't take a rocket scientist...
|
by: Mark Thiel |
last post by:
I am working on a project for my company, which has a structure of six
major areas. Certain people need to have access to all of the data,
whereas other people only require access to the information for one
area. Since the users do not know Access, I created a form to make it
easy to generate a report. Is it possible, either when the...
|
by: Will |
last post by:
I am looking at using a table with user names, passwords and user rights,
which I would administer. I have read a lot about the shortfalls of this
and the lack of security but the customer does not wish to use Access
security and what they are more focused on is a solution for when a user
performs a critical action the system can verify that...
|
by: mar10 |
last post by:
I am creating a database in Access 2002 for a small firm that would
like security on the tables. They want some employees to have write
access only to tables, while others read-only.
I have not done anything with security since way back in version '97.
I'm reading some white papers I've found to gain knowledge of
current security issues.
...
| |
by: Namratha Shah \(Nasha\) |
last post by:
Hey Guys,
Today we are going to look at Code Access Security.
Code access security is a feature of .NET that manages code depending on its
trust level. If the CLS trusts the code enough to allow it ro run then it
will execute, the code execution depends on the permission provided to the
assembly. If the code is not trusted wnough to run...
|
by: DaveG |
last post by:
Hi all
I am planning on writing a stock and accounts program for the family
business, I understand this is likely to take close to 2 years to
accomplish. The stock is likely to run into over a thousand items and
the accounting side will be used for hopefully many years so the
entries are likely to be vast.
The delema is what is best to...
|
by: Oldie |
last post by:
I have built an MS Access Application under MS Office XP (but I also
own MS Office 2000). I have split the application in the pure database
tables and all the queries, forms, reports and macro's.
Now i want to use this application for different foundations in the
Netherlands but I want to secure my application so no one can change
it, copy...
|
by: Reggie |
last post by:
Hi and TIA. I developed several A2K dbs which are now being run on my
clients computer which have been upgraded to Access 03. I'm not sure
exactly what they mean but of you know or could point me in a direction
to find info on how to prevent and/or fix the db's so that these
message don't pop up when the app is started. Error messages...
|
by: thebarefootnation |
last post by:
Hi,
I have created an access db that I would like to secure.
The database will exist on a shared drive and be used at a number of
different locations hence the reason to secure the database.
The users of the database also use other databases therefore I want to
secure this database without using the wizard so it does not effect
their...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
| |
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in...
| |
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |