473,739 Members | 6,655 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

securing access

I've secured my Access database by creating an MDE file because it contains
confidential data. However, I find that anyone can simply use Microsoft
Access to link to or import the tables in that MDE. How do I stop my MDE
from sharing it's data to any application that requests it?
Nov 13 '05 #1
3 1804
An MDE is NOT security. All an MDE does is remove the source code from your
forms, reports, macros, and modules so that no user can modify these
objects. It does not affect tables and queries.

The only way to restrict access in the way that you want is to implement
Access Security. Explaining that is beyond the scope of a newsgroup post,
but Microsoft has produced a Security FAQ which has all the information you
need to do it. You can find it on the Microsoft site or you can also
download it from my website:
http://www.rogersaccesslibrary.com/knowledge.html. It is the link at the
top of the page.

Read the document carefully several times BEFORE doing anything and then
work on a COPY of your application.

--
--Roger Carlson
www.rogersaccesslibrary.com
Want answers to your Access questions in your Email?
Free subscription:
http://peach.ease.lsoft.com/scripts/...UBED1=ACCESS-L

<arch> wrote in message news:41******** @funnel.arach.n et.au...
I've secured my Access database by creating an MDE file because it contains confidential data. However, I find that anyone can simply use Microsoft
Access to link to or import the tables in that MDE. How do I stop my MDE
from sharing it's data to any application that requests it?

Nov 13 '05 #2
<arch> wrote in message news:41******** @funnel.arach.n et.au...
I've secured my Access database by creating an MDE file because it contains confidential data. However, I find that anyone can simply use Microsoft
Access to link to or import the tables in that MDE. How do I stop my MDE
from sharing it's data to any application that requests it?


The only "protection " provided by an MDE is your code. It has nothing to
do with data. You would have to use the User-Level security features in
Access to protest the data. Mind you that is mostly protection from the
uninformed and/or the lazy. A determined person who knows how to do a
Google search will always be able to hack into an Access file.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 13 '05 #3
DFS
Rick Brandt wrote:
<arch> wrote in message news:41******** @funnel.arach.n et.au...
I've secured my Access database by creating an MDE file because it
contains confidential data. However, I find that anyone can simply
use Microsoft Access to link to or import the tables in that MDE.
How do I stop my MDE from sharing it's data to any application that
requests it?


The only "protection " provided by an MDE is your code. It has
nothing to do with data. You would have to use the User-Level
security features in Access to protest the data. Mind you that is
mostly protection from the uninformed and/or the lazy. A determined
person who knows how to do a Google search will always be able to
hack into an Access file.


Thanks for telling him that. (really).

You didn't need to say "determined ." You can lazily download from
http://www.lostpassword.com/access.htm#order a $45 program that will let you
drag-n-drop an Access .mdb or .mdw file onto a panel and it will tell you
every user name, user group, user password and database password.

Access "security" is a joke. If your data is sensitive, host it elsewhere.

Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
1607
by: James | last post by:
What's the best way of securing online databases and web services? At present I am using a database password, which of course is not hard-coded into the web service, but this means re-submitting it with every function call from my windows client. Any alternatives?
11
1897
by: Susan Bricker | last post by:
Greetings. I am looking for some advice on making a database secure. By secure, I mean that I want only certain people to have write access to the database and I want the updates to be permitted while other read-only users may be browsing and generating reports. I am working with MS/ACCESS 2000 and would like to split the database into a front-end and back-end and then put the back-end onto a shared drive that all of my group has access...
4
1403
by: Tony | last post by:
G'day, The derivation of a (commercially valuable) relational schema has taken me a considerable amount of time. Now I want to secure the design in a client server environment. Hence to my question: How have developers successfully prevented access to their data tables and protected their database design? Looking forward to some suggestions. Tony
7
2211
by: Tom | last post by:
Can anyone give me any advice on how to secure a folder on a network server so that documents in the folder can only be opened through an Access database or by the database admin. I need to store MS Word docs in a folder on a network server. The database admin will save the docs to the folder. The docs must be available to Word automation out of a specific Access database and available to the database admin out of MS Word. Only users of...
11
3434
by: Wm. Scott Miller | last post by:
Hello all! We are building applications here and have hashing algorithms to secure secrets (e.g passwords) by producing one way hashes. Now, I've read alot and I've followed most of the advice that made sense. One comment I've seen alot about is "securing the hashing routine" but no-one explains how to accomplish this. So how do I secure my hashing routine? Do I use code access security, role based security, ACLs, etc or combination?...
1
3392
by: Mark Goosen | last post by:
Hi ive installed wse 2.0 SP3 and was running throught the demo downlaoded on the Securing the Username Token with WSE 2.0 page the Securing the Username Token with WSE 2.0. Im spose to change the access type for "SYSTEM and "ASPNET" to "READ" for the certificate in the certificate tool by clicking on the "view private key file properties.." button however i only have a general and summary tab. NO security tab. Is there a alternative way...
9
1787
by: carriolan | last post by:
Hi Hi As daft as it may sound I have carried out the approach detailed by Keith Wilby on his site www.keithwilby.com/ down to and inclusive of import objects. I have established that: 1. IPGAdmin is now a member of the ‘Admins’ group and owns the database and imported objects. 2. Admin the old user does not own the objects or the database and does not have any permissions.
4
3909
by: Brad P | last post by:
I have a 2K database with a front end linked to a back end. I need to lock down or secure both ends so a user can not access the raw data in tables etc. I also need usernames and passwords for 50+ users. I've experimented with securing the database but can't get it the way I want it. I can still use the shift key to obtain access. Anyone have a link to a site or something to give me a guideline as to what I can do? Thanks
4
2812
by: Stephen Poley | last post by:
Whenever anyone has a question about securing an Access database he/she is usually referred (unsurprisingly) to the Security FAQ. This is however incomplete/unclear with respect to databases with a separate front-end and back-end, which is rather surprising considering that all Access databases should be split into a separate front-end and back-end. Noticing that there are quite a lot of questions on this subject in the Access newsgroups...
10
3373
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Not sure if I quite follow that. 1. Data encrypted by AES key 2. AES key encrypted with Asymmetric public key (?)
0
8969
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9479
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9337
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
9266
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8215
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
6054
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
1
3280
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
2748
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2193
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.