473,947 Members | 1,666 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Database security

I have read many long articles in this group about securing my
database for distribution. This is the advise I have taken:

1. Hardcoded the purchasing company's name into the program. The
limitations are that the company can't get a instant download as I
need to manually code their name. That's fine for now.

2. Make both the front and the backend databases MDE. This protects
my code.

3. I will implement the lock software at www.zappersoftware.com to
require a registration code on install which would be limiting only in
that the program would now be machine specific.

With those 2-1/2 or 3 things done, why would I want to implement MS
Security as found in the Security FAQ on the Microsoft site?

The way I see it, with #3 they can't really copy the database. If
they do figure out a way to copy it they would still be limited to
having that certain company name (#1) appearing on all forms &
reports. With #2, they can't touch my code.

Is there something I'm missing. What benefit would the MS Security be
for my situation?

Thanks,

Paul .V.
Nov 13 '05 #1
5 1298
One of the main reasons that people use Access security is so that they can
set up a variety of "roles"; some users can perform certain functions but
not others; other users may have a different set of functions they can
perform on the same database.

"Paul .V." <pr*******@shaw .ca> wrote in message
news:41******** *************** ***@posting.goo gle.com...
I have read many long articles in this group about securing my
database for distribution. This is the advise I have taken:

1. Hardcoded the purchasing company's name into the program. The
limitations are that the company can't get a instant download as I
need to manually code their name. That's fine for now.

2. Make both the front and the backend databases MDE. This protects
my code.

3. I will implement the lock software at www.zappersoftware.com to
require a registration code on install which would be limiting only in
that the program would now be machine specific.

With those 2-1/2 or 3 things done, why would I want to implement MS
Security as found in the Security FAQ on the Microsoft site?

The way I see it, with #3 they can't really copy the database. If
they do figure out a way to copy it they would still be limited to
having that certain company name (#1) appearing on all forms &
reports. With #2, they can't touch my code.

Is there something I'm missing. What benefit would the MS Security be
for my situation?

Thanks,

Paul .V.

Nov 13 '05 #2
On 4 Feb 2005 17:41:43 -0800, pr*******@shaw. ca (Paul .V.) wrote:

Re 2: There should typically not be any code in the backend db, so it
should be an MDB.

MacDermott is correct about the role-based security. Let's say there
is a Salary table that not everyone should have access to...

-Tom.

I have read many long articles in this group about securing my
database for distribution. This is the advise I have taken:

1. Hardcoded the purchasing company's name into the program. The
limitations are that the company can't get a instant download as I
need to manually code their name. That's fine for now.

2. Make both the front and the backend databases MDE. This protects
my code.

3. I will implement the lock software at www.zappersoftware.com to
require a registration code on install which would be limiting only in
that the program would now be machine specific.

With those 2-1/2 or 3 things done, why would I want to implement MS
Security as found in the Security FAQ on the Microsoft site?

The way I see it, with #3 they can't really copy the database. If
they do figure out a way to copy it they would still be limited to
having that certain company name (#1) appearing on all forms &
reports. With #2, they can't touch my code.

Is there something I'm missing. What benefit would the MS Security be
for my situation?

Thanks,

Paul .V.


Nov 13 '05 #3
I have setup my own internal security to limit users to specific
activities so it sounds to me like I do not need to use the Access
Security.

On another note, I put my current project backend to an mde because
somewhere in the help file I read that both files must be mde to work
although an older project I worked on I did exactly as you said...My
frontend is a mde and the backend is an mdb. I wonder why the help file
says that won't work.

Thanks for your input(s),

Paul .V.

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!
Nov 13 '05 #4
"Need" is always a relative term.
In my experience, as a general rule, developer-created internal security
systems are not as secure as Access's own security.
Which is not to tout Access Security -
a simple Google search will find you several low-cost options to crack
even that.
I've contended for some time that if you have an internal application, and
employees who are clearly circumventing the established rules about who can
do what in that application, you have an HR problem more than an IT problem.

As for the help files -
I'm not connected with Microsoft, other than as a user, but I see Help
file development like this:
You can't write an effective help file until the product is finished,
because what you document could change.
Once the product is finished, there's tremendous pressure to release it -
nobody wants to wait for the help files to be finished.
You can still find scattered references in the Help files to using
Access on McIntosh machines - something which has never, to my knowledge,
gotten past the drawing boards.
It's also been my experience that the quality of Access Help files has
declined with each release. (I still sometimes go back to Access 97 help,
because it's so much easier to find things there. But I can remember when
that first came out, how much I missed the printed Access 2.0 help.)
Nevertheless, Access Help is the first place I go to answer my Access
questions, and it's rare for me to have to go further than that. It's a
good product, but not perfect - doesn't excuse us from doing our own
thinking. But then, that's what we programmers do, isn't it?

"Paul V" <pr*******@shaw .ca> wrote in message news:42******** **@127.0.0.1...
I have setup my own internal security to limit users to specific
activities so it sounds to me like I do not need to use the Access
Security.

On another note, I put my current project backend to an mde because
somewhere in the help file I read that both files must be mde to work
although an older project I worked on I did exactly as you said...My
frontend is a mde and the backend is an mdb. I wonder why the help file
says that won't work.

Thanks for your input(s),

Paul .V.

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!

Nov 13 '05 #5
Yep, you're right. My internal security probably isn't as secure as
Access security but I did realise that upon setting it up. I also agree
with you in that that poses the question more of HR problems rather than
IT problems. The way I see it for now, if someone decides to mess with
the tables then "I'm on by the hour" to fix what has been done. It's
always possible to make something more secure but for the intended
purpose of this program, my security messures should suffice.

Thanks again for all your input. It sounds as though I have taken the
necessary steps to secure my database for distribution.

Paul .V.

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!
Nov 13 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
3144
by: Sarah Tanembaum | last post by:
I was wondering if it is possible to create a secure database system using RDBMS(MySQL, Oracle, SQL*Server, PostgreSQL etc) and web scripting/programming language(Perl, PHP, Ruby, Java, ASP, etc) combination? I have the following in mind: I wanted to store all my( and my brothers and sisters) important document information such as birth certificate, SSN, passport number, travel documents, insurance(car, home, etc) document, and other...
2
3949
by: Fran Tirimo | last post by:
I am developing a small website using ASP scripts to format data retrieved from an Access database. It will run on a Windows 2003 server supporting FrontPage extensions 2002 hosted by the company 1&1 with only limited server configuration via a web based control panel. My query relates to the ASP security model and how it relates to FrontPage options for setting file access on a database file. If you know of any online documentation...
3
359
by: Nascimento, Daniel | last post by:
i tried to create a conecction to a database MSAccess 2002 with Microsoft JET 4.0 OLE Provider but it gives me the error: 'Teste connection failed because of an error in initializating provider. cannot start your application. the workgroup information file is missing or opened exclusively by another user.' how can i fix this problem???
4
2668
by: Nicolae Fieraru | last post by:
Hi All, I am working on a web site in asp which will be hosted on a Windows 2003 server. I use the following code to connect to the database: Set objConn = Server.CreateObject("ADODB.Connection") Set objRS1 = Server.CreateObject("ADODB.Recordset") objConn.Provider = "Microsoft.Jet.OLEDB.4.0"
5
2595
by: kai | last post by:
Hi, All I try to block some one import my Access database tables using Access database. I used password protection, but if some one crack through my password, are there any other methods to block some one importing my tables using Access database? Thanks
5
2979
by: lappy | last post by:
Hello, I have written a small programme to compact an access 97 database. Dim je As New JRO.JetEngine ' Compacts database Data.Mdb to Data2.mdb. je.CompactDatabase "Provider=Microsoft.Jet.OLEDB.4.0;" & "Data Source=C:\Dump\DataOld.Mdb", _ "Provider=Microsoft.Jet.OLEDB.4.0;" & "Data Source=C:\Dump\Data.Mdb"
4
1739
by: Ant | last post by:
I am trying to apply security to a database I have just finished. The application is split into a back end of tables and a front end of forms etc. I need some users to have access to forms based on some queries but not others. My question is do I run the security wizard in the back end DB or the front end? If I just do the front end I seem to have more control (Queries, individual forms etc) but what’s to stop some one just opening the...
6
3173
by: clusardi2k | last post by:
Hello again, I have to go home and read up on Access. But, I have read else-where in this newsgroup that I can just save the password in the database under scrutiny. Wouldn't it be wasteful to create a password column for all database entries?
3
4181
by: jason | last post by:
I've been playing around with new (for 2.0) membershp functionality. I was able to build a simple login form that secures a directory on a project I built locally on my development desktop. However, when I attempt to follow the same steps on the remote test server (a website I access via filesystem security accross my lan ).. I get the following when I attempt to select the security tab from the administer selection of the login...
6
5904
by: Ted | last post by:
I am construvcting a number of databases, some of which contain sensitive data and most of which do not. I am attempting to handle the security issues involved in protecting sensitive data in part by putting it in its own database. If the sensitive data is in a database called d_SensitiveData, and in that database there is a table called 't_A' (I know, not very informative, but this is only a trivially simple example :-), and I have a...
0
10164
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9986
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
1
11352
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10694
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9896
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
8256
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
7431
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
6337
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
4540
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.