473,732 Members | 2,146 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Access & Security

Hello all,

Newbie Here (please go easy, you cant make me fell more stupid than I
allready do)

I have a small, but complex data base, in Access 2000, that I am
creating, I have allready starting to add data to it. Alot of data
(around 30 hours work, creating and entering data).

I did a stupid thing, I protected the thing. . . . Using the Security
Wizard, It did not ask me for any password when I was running through
it (i am actually not sure about this). But, now I cant get back into
it.

I can however get into a read-only version (limited) of Secure (the
Microsoft Access Workgroup Information[MAWI]) file using my name
"mike" and my password that I use for everything (thats why I think I
did enter a password in the Security Wizard.

There are no tables visible in the MAWI, but there are 4 Quieries,

MSysGroupList
With 1 Field (Name) and 5 Records,
Record [Admins]
Record [Full Data User]
Record [Full Permission]
Record [Read-Only User]
Record [User]

MSysGroupMember s
Asks for Group Name
Group Name
Admins Mike (only 1 record)
Full Data User (no records)
Full Permission (no records)
Read-Only User (no records)
User (no records)

MSysUserList
With 1 Field (Name) and 4 Records
Record admin
Record Creator
Record Engine
Record Mike

MSysUserMebersh ips
asks for Username
Username Name
admin Users (only 1 record)
Creator (no records)
Engine (no records)
Mike Admins (2 records)
Users
I have tried logging on to the data base with the users name of Mike,
Admin, Creator, Engine, mike, admin, creator, and engine, all with and
without the password that I would have added to the Security Wizard.

Any help would be really (um. . ) helpfull, and greatfully
appreciated. . .

Kind Regards
Mike Marriott

Feel free to ask any questions, if I have left anything vital out. . .
..
Nov 13 '05 #1
3 2145
Futher to this, I downloaded a password recovery utility. . .
When I run this through, I have to choose if it is a Access 2000 database or
Access 97 or prior.

When I select Access 2000 (coz thats what it is), it gives me a message
saying that the database is not protected.

When I select Access 97 or prior, it shows me the first 2 charachters of the
password B".

I might see if I can purchase the program. . . . .

It is LastBit Password Tools for Access, I downloaded from;
http://lastbit.com/access/default.asp

Kind Regards
Mike Marriott
Nov 13 '05 #2
wh***********@h otmail.com (Mike Marriott) wrote:
I did a stupid thing, I protected the thing. . . . Using the Security
Wizard, It did not ask me for any password when I was running through
it (i am actually not sure about this). But, now I cant get back into
it.


Hi Mike.

Have you tried the user name "Admin" with no password? Other than that,
the only thing I can advise is to always work on a copy of your files and
to read and understand MS's KB article on Access security. To quote Larry
there is no filler, you need to read and understand it all. Once you've
done that you can refer to the step-by-step example on my web site (you'll
find it in there somewhere;-)).

Regards,
Keith.
www.keithwilby.org.uk
Nov 13 '05 #3
> Hi Mike.

Have you tried the user name "Admin" with no password? Other than that,
the only thing I can advise is to always work on a copy of your files and
to read and understand MS's KB article on Access security. To quote Larry
there is no filler, you need to read and understand it all. Once you've
done that you can refer to the step-by-step example on my web site (you'll
find it in there somewhere;-)).

Regards,
Keith.
www.keithwilby.org.uk


Thanks Kieth. . . .

I think i will heed your advised and understand something before I do it. .
..

My Computer does not like to run for any more than about 5 hours, and I had
visitors, so I rebooted, and it let me back into the back up file it made
when I ran the Security Wizard, So I have just renamed that, and I have it
all back with full permission. . . (few !)

But thank you once again for your advise. . .

Kind Regards
Mike Marriott
Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
8286
by: lobrys | last post by:
hi I build a VB .NET application that makes file access, environnemet acess, database access, etc.... If I ran the app locally, everything works....(normal) If I copy the app on a server, and execute it, everything works until a file/environnement/database access !..... I just want that my app may run in every machine!
5
8908
by: MLH | last post by:
With Access 2.0, it was simple. 97 doesn't seem so obvious. Where do I start. I launched c:\windows\system32\Wrkgadm.exe and joined system.mdw in that same dir. Upon launching Access 97, I wasn't prompted for a name 'n pass. What should I do?
1
2666
by: Struggling Coder | last post by:
We have a database here at work and the person who created has been gone for two years. The original project manager wants to use this database on his New project, but the database is secured. I can get in to the database using the shift key, but all the objects are secured. I checked the users and all that show up are "admin" & "user". I guess that's what is in my SYSTEM.MDW. I can not retrieve the original MDW file because his computer...
8
2512
by: Tim Marshall | last post by:
I have a problem in that users can't seem to access menu bars created by a developer in the admins group. Details are as follows: I'm following the MS Access Secirty FAQ version 2.41 and I can't seem to find an answer to the following problem in an A97 FE on a Oracle database (Pretty sure Oracle has nothing to do with this, but thought I'd mention it). My users are members of one of three groups (plus there is the admins group of...
12
6179
by: PMA | last post by:
Hi all, I am porting a web application from IE 6.0 to FireFox 1.5. I have solved almost all compatibility issues (quite a lot but not too bad) except two of them : 1) Clipboard access thru' JavaScript (programmatical copy and paste actions) 2) Monitoring and driving Insert/Overwrite mode on input fields
2
1169
by: Dorei-Pry | last post by:
Dear All! I have try to get all data of one MS ACCESS from one application building with .NET. But when i have open that MS ACCESS i can not see any TABLES when ever that file is 100MB of full data. Very secure data...
2
8343
by: mbsevans | last post by:
New user here. I have constructed a database to track basic employee information. I wish to place finished database on a the network. I need to obviously retain full admin persmissions for all aspects of the database. More importantly I need to allow one clerical user to enter data and thats it. Now...I have been through various explanations of how to set this up but none of it is making sense to me. Even the Access 2003 security wizard is...
0
1180
by: Tony Toews [MVP] | last post by:
Folks To make a long story short Office 2000 security patches are *not* included in the Microsoft Update. Although you can find them in the rather unobtrusive Office Update. For an explanation with more details see http://msmvps.com/blogs/access/archive/2007/11/09/access-2000-security-patches.aspx Tony
1
1335
by: Prasu TKP | last post by:
I have developed an Access Application and given to the pople to work through 'Share folder'. There are six people using every day. I have disabled the byepass key also. Very recently one peson copy this application and down loaded to another Access Database. Security wise it is serius Issue. Please let me know how to prevent download Access objects to other database.
0
8773
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
9445
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
9234
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9180
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8186
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
4548
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4805
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
3259
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
3
2177
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.