473,796 Members | 2,645 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

I have a completely secured database and I want to completely unsecure it

MLH
Is there a quick way to do it?

I'm logged in as the superuser
and owner of database and all
database objects. I would like
to export it to a completely un-
secured application.

Do I have to go through all
objects and security measures
one-by-one the slow and pain-
ful way?
Nov 13 '05 #1
5 1414
Presumably do the opposite of what securing a database does.

Move user Admin back into Admins, with a blank password and give the Admins
group rights to everything. You can multiselect objects you know, shift
click to select All tables, or all forms or whatever. Shouldn't take that
long.

Or if you import into your new user when logged on as the default
Admin/blank password/full rights doesn't that do it all?

Mike


"MLH" <CR**@NorthStat e.net> wrote in message
news:4f******** *************** *********@4ax.c om...
Is there a quick way to do it?

I'm logged in as the superuser
and owner of database and all
database objects. I would like
to export it to a completely un-
secured application.

Do I have to go through all
objects and security measures
one-by-one the slow and pain-
ful way?

Nov 13 '05 #2
"MLH" <CR**@NorthStat e.net> wrote in message
news:4f******** *************** *********@4ax.c om...
Is there a quick way to do it?

I'm logged in as the superuser
and owner of database and all
database objects. I would like
to export it to a completely un-
secured application.

Do I have to go through all
objects and security measures
one-by-one the slow and pain-
ful way?


Give full permissions on all objects back to the Users Group (the object
listbox is multi select, so you don't have to do it one by one).

Then rejoin the system.mdw, open Access and create a new database and import
all the objects from you secure mdb.
--
Joan Wild
Microsoft Access MVP
Nov 13 '05 #3
MLH
Both seem doable to me.
Guess I'll try Joan's suggestion,
then your's, Mike. Ladies first.
Nov 13 '05 #4
"MLH" <CR**@NorthStat e.net> wrote in message
news:2k******** *************** *********@4ax.c om...
Both seem doable to me.
Guess I'll try Joan's suggestion,
then your's, Mike. Ladies first.


And considerably more experience too, I suspect <g>
Nov 13 '05 #5
MLH
I don't know about you, but I can guarantee a lot more than I have.
xxxxxxxxxxxxxxx xxxxxxxxxxxxxxx x

And considerably more experience too, I suspect <g>


Nov 13 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
1880
by: Ed Jaffe | last post by:
All: 1) Could any one show me any website which is using asp, ssl, sql server? 2) Is ASP/IIS technology good enough to create a commerical secured internet web application? 3) People said most of the secured internet web application (e.g. banking...) is using java, is that true? Simon
5
1789
by: Jonas Daunoravicius | last post by:
I currently have a SSL domain where the SSL cert is applied to the whole FQDN. So, the whole domain is https://***. Also, we have another domain that does not have SSL. Using ASP, vbscript, and html, I'm linking certain logos and pdf files from the unsecured domain to the secured domain. The problem is that when a user logs in the secured site and goes to that specific page that has the logo that is pulled from http://***, the...
2
1314
by: Joe | last post by:
Hi, We want to build a couple of secured pages which will be viewable only to those who have an account. One way of implementing the security is using session cookies (temporary cookies). When a user logs in a session cookie is created. When the browser window is closed the session cookie disappears. This way when the browser is closed the session is over. So that even if one tries to copy and past the URL of a secured page, they...
4
2393
by: Oreo Bomb | last post by:
I have a secured database that contains a Read-Only group. This group has permissions to view reports, but cannot add, edit, or delete any DB objects. One of the reports the group needs access to is generated with a Make-Table Query. Since the Make-Table Query deletes the previous table it created everytime it's ran, this poses a problem since the Read-Only group doesn't have the permission to delete objects. This causes the report...
4
1391
by: xunitinmullik | last post by:
Hello ppl: I am facing a problem that I ahve never experienced before with the secured database. I created an MS Access 2000 application (.mdb) using MS Access 2002 and secured it using exactly the procedure described in the Access Security FAQ and as I have been doing since the time I have started using Access. So let the access application be xxx.mdb. After completing the whole development for xxx.mdb, i secured it using the procedure...
3
1950
by: TK | last post by:
Excuse me for multiple posting because I've posted this message to aspnet.security NG but have not got any response yet. I'm building an ASP.NET application works in Forms Authentication mode with custom user account database. And it shows clients a list of hyperlinks to content pages located in some separated subfolders. This application and content pages are entirely secured, so everyone must logon to the application. The application...
1
650
by: James | last post by:
I have a VB windows forms application that accesses a Microsoft Access database that has been secured using user-level security. The application is being deployed using No-Touch deployment. The objective in utilizing this new deployment method is to reduce the maintenance overhead as well as making it easier for my users to setup and run the application initially. I have VS 2002, Windows XP, Access XP(2000 format). He is my problem....
2
1178
by: MLH | last post by:
The guy I've given it to is running Access 2003. He says he tries to open the file and is presented with a message to the effect that he doesn't have permission. He tried it with 2002 and it told him he had to join a workgroup to do it. Have I missed something in my effort to completely unsecure the A97 app? Well, obviously, I have. But I'm at a loss as to what.
8
2788
by: aklein | last post by:
I was given a database to update and am running into the following problem: The database appears to have been secured using Access security (it is an MDB, not MDE). Every form etc that I try to open (in the development environment) gives me 2 messages: 1) "You do not have exclusive access to the database at this time etc." 2) "You don't have permission to read frmWhatever... etc."
0
9685
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10239
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
10019
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9057
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7555
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6796
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
1
4122
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3736
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2928
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.