473,545 Members | 1,893 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Access Security

Does anyone know where I can find a straightforward explanation of
Access security? From what I have been able to understand from the
small amount that I've read on security, it starts with securing
Access itself on the user's PC. Is this the case and how does this
affect multiple users on a network?
Nov 12 '05 #1
2 3045
Pat
Here is a link to the MS Access Security FAQ. It's answered a lot of
questions for me:

http://support.microsoft.com/?id=207793

I've also come across this page that links to the FAQ and summarizes the
steps:

http://www.ltcomputerdesigns.com/Security.htm
"Wayne Aprato" <cq*******@volc anomail.com> wrote in message
news:4d******** *************** ***@posting.goo gle.com...
Does anyone know where I can find a straightforward explanation of
Access security? From what I have been able to understand from the
small amount that I've read on security, it starts with securing
Access itself on the user's PC. Is this the case and how does this
affect multiple users on a network?

Nov 12 '05 #2
The security FAQs are quite thorough, but are somewhat cryptic. There are
other specific newsgroups that are good sources of security info, like
microsoft.publi c.acecess.secur ity. In addition, you can look into this:

http://www.geocities.com/jacksonmacd...sSecurity.html

"Pat" <pa*@noemail.ih atespam.bum> wrote in message
news:dj******** *********@twist er.austin.rr.co m...
Here is a link to the MS Access Security FAQ. It's answered a lot of
questions for me:

http://support.microsoft.com/?id=207793

I've also come across this page that links to the FAQ and summarizes the
steps:

http://www.ltcomputerdesigns.com/Security.htm
"Wayne Aprato" <cq*******@volc anomail.com> wrote in message
news:4d******** *************** ***@posting.goo gle.com...
Does anyone know where I can find a straightforward explanation of
Access security? From what I have been able to understand from the
small amount that I've read on security, it starts with securing
Access itself on the user's PC. Is this the case and how does this
affect multiple users on a network?


Nov 12 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

32
2768
by: Mike MacSween | last post by:
Further to 'Security - more complex than I thought' Has anybody ever seen any studies? Or anecdotal evidence? Done any studies themselves? Done any lab testing - you know - 10 users asked to get past Access (or other) security? It'd be interesting to know. And no, I don't have any prejudices. Yours, Mike MacSween
13
3288
by: BigDaDDY | last post by:
Um yeah....In case you haven't figured it out, Microsoft sucks. I'm going to be kicked back in my chair eating popcorn and watching football 10 years from now, while all you clowns are scrambling to rewrite all your code because Microsoft upgraded all their crap and nothing you wrote 10 years earlier works. It doesn't take a rocket scientist...
7
1957
by: Mark Thiel | last post by:
I am working on a project for my company, which has a structure of six major areas. Certain people need to have access to all of the data, whereas other people only require access to the information for one area. Since the users do not know Access, I created a form to make it easy to generate a report. Is it possible, either when the...
11
2168
by: Will | last post by:
I am looking at using a table with user names, passwords and user rights, which I would administer. I have read a lot about the shortfalls of this and the lack of security but the customer does not wish to use Access security and what they are more focused on is a solution for when a user performs a critical action the system can verify that...
3
1851
by: mar10 | last post by:
I am creating a database in Access 2002 for a small firm that would like security on the tables. They want some employees to have write access only to tables, while others read-only. I have not done anything with security since way back in version '97. I'm reading some white papers I've found to gain knowledge of current security issues. ...
0
2079
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to allow it ro run then it will execute, the code execution depends on the permission provided to the assembly. If the code is not trusted wnough to run...
17
2465
by: DaveG | last post by:
Hi all I am planning on writing a stock and accounts program for the family business, I understand this is likely to take close to 2 years to accomplish. The stock is likely to run into over a thousand items and the accounting side will be used for hopefully many years so the entries are likely to be vast. The delema is what is best to...
38
3856
by: Oldie | last post by:
I have built an MS Access Application under MS Office XP (but I also own MS Office 2000). I have split the application in the pure database tables and all the queries, forms, reports and macro's. Now i want to use this application for different foundations in the Netherlands but I want to secure my application so no one can change it, copy...
23
2620
by: Reggie | last post by:
Hi and TIA. I developed several A2K dbs which are now being run on my clients computer which have been upgraded to Access 03. I'm not sure exactly what they mean but of you know or could point me in a direction to find info on how to prevent and/or fix the db's so that these message don't pop up when the app is started. Error messages...
7
2614
by: thebarefootnation | last post by:
Hi, I have created an access db that I would like to secure. The database will exist on a shared drive and be used at a number of different locations hence the reason to secure the database. The users of the database also use other databases therefore I want to secure this database without using the wizard so it does not effect their...
0
7486
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
1
7442
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For...
0
7776
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
0
6001
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
1
5347
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes...
0
4965
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert...
0
3473
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
0
3456
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
1905
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.