473,586 Members | 2,839 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

hacking to the core of access

Hi Gurus

I have often wondered if you can change settings that are at "the core" of
access.

For example:
- the format of a new combo box
- the next number of an autonumber
- etc....

Is there a limit to the things you can set in Access. Are some settings
beyond control/hard wired???

TIA

- Nicolaas
Nov 13 '05 #1
5 1316
You could probably open the .exe in a hex-editor and change a few values at
random, it might be worth a laugh if nothing else. <g>

--
Michael Hopwood
"WindAndWav es" <ac****@ngaru.c om> wrote in message
news:nv******** **********@news .xtra.co.nz...
Hi Gurus

I have often wondered if you can change settings that are at "the core" of
access.

For example:
- the format of a new combo box
- the next number of an autonumber
- etc....

Is there a limit to the things you can set in Access. Are some settings
beyond control/hard wired???

TIA

- Nicolaas

Nov 13 '05 #2
Stephen Lebans has written lots of code to use the API to do things Access is
not directly able to do. Check out http://www.lebans.com.

On Sun, 13 Jun 2004 19:37:06 +1200, "WindAndWav es" <ac****@ngaru.c om> wrote:
Hi Gurus

I have often wondered if you can change settings that are at "the core" of
access.

For example:
- the format of a new combo box
- the next number of an autonumber
- etc....

Is there a limit to the things you can set in Access. Are some settings
beyond control/hard wired???

TIA

- Nicolaas


Nov 13 '05 #3
that is the one! LOL Good fun
Nov 13 '05 #4
Yes, you can change the format of a new combo box - search
around in help or google for how to set the defaults for
controls.

You can set the next autonumber of a table using ADOX or DDL.
- search around in help or google for information.

(david)
"Michael Hopwood" <la******@spamm ers.co.uk> wrote in message
news:ib******** ************@br ightview.com...
You could probably open the .exe in a hex-editor and change a few values at random, it might be worth a laugh if nothing else. <g>

--
Michael Hopwood
"WindAndWav es" <ac****@ngaru.c om> wrote in message
news:nv******** **********@news .xtra.co.nz...
Hi Gurus

I have often wondered if you can change settings that are at "the core" of access.

For example:
- the format of a new combo box
- the next number of an autonumber
- etc....

Is there a limit to the things you can set in Access. Are some settings
beyond control/hard wired???

TIA

- Nicolaas


Nov 13 '05 #5
Michael Hopwood wrote:
You could probably open the .exe in a hex-editor and change a few values at
random, it might be worth a laugh if nothing else. <g>


I used to do that in DOS, e.g. in command.com I would change the message
"Access Denied" to "No way José", needed a reboot though as DOS would
hang with an "Invalid command.com, system halted" message right after
modifying it.

I also tried on a windows program once, DataEase Express it was, there
was a hand pointer for some operations, for laffs I wanted to change the
finger that did the pointing IYSWIM so I used the resource editor that
came with MS C/C++, which was able to manipulate resources within exe
files directly. That didn't work, Express would GPF. Shame really.
Express was written in Borland C so perhaps there was something in the
exe that the MS program didn't understand or take care of fully.

--
Error reading sig - A)bort R)etry I)nfluence with large hammer
Nov 13 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
7062
by: Gowhera Hussain | last post by:
Use This for Learning Only .... Do Not Try To Act Smart HACKING WITH JAVASCRIPT Dr_aMado Sun, 11 Apr 2004 16:40:13 UTC This tutorial is an overview of how javascript can be used to bypass simple/advanced html forms and how it can be used to override cookie/session
0
1256
by: Michele Simionato | last post by:
Here is a hack to implement attribute access (say for a Web framework) the way I always wanted it to be. I say "hack" since it uses sys._getframe and it sets the locals of a class, which is not recommended. Still, it seems to work. I post the recipe here since since I would like to know if 1. it really works; 2. if yes, is there a chance...
0
1676
by: ChangAya | last post by:
I use binary log on mysql system. Yesterday i found some hacking attempt on my machine. ( I found some unknown queries on binary log) But i don't get any information about hacking query connection on binary log file.. ( username, host.. i don't know anything ) only thing that i know is "thread_id".
0
3773
by: masterjuan | last post by:
Networks Hacking (hack C:/ drives, severs...)and security holes all on my website & hacking commands and I explain ways of erasing your tracks so you dont get caught doing "bad" things... What do you think? check out my website its about hacking networks and step by step guides of how to do it all. Any suggestions on information or...
2
5226
by: kevingabbert | last post by:
For anyone wanting to do something fun with tools at hand. I have Developed some code in C# to control your iRobot Roomba vacuum from your computer. (Don't forget to Download Visual Studio express!) http://msdn.microsoft.com/vstudio/express/visualcsharp/ The core of the code is a C# class that implements the iRobot Software Command...
62
4397
by: robert | last post by:
I'd like to use multiple CPU cores for selected time consuming Python computations (incl. numpy/scipy) in a frictionless manner. Interprocess communication is tedious and out of question, so I thought about simply using a more Python interpreter instances (Py_NewInterpreter) with extra GIL in the same process. I expect to be able to directly...
6
12883
by: enes naci | last post by:
i would like to know about hacking in python too whether its illegal or not is not the point and anyway it doesn't mean i'm gong to use it.
8
2476
by: diana.ruwanika | last post by:
hey how do you hack in to computers ?
15
6233
by: singhraghvendra | last post by:
Hi I have a function as below void print(char* str) { printf(str); } now the user of the function can pass anything as the argument for
0
7911
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
0
8200
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. ...
1
7954
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For...
0
6610
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
1
5710
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes...
0
5390
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert...
0
3836
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
1
1448
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
1179
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.