473,738 Members | 9,555 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

A-97 Alzheimer moment... what were the basic components of securing an app?

MLH
1) Create secure workgroup system database, remove user
ADMIN from the ADMINs group
2) Encrypt the source MDB front end database
3) Create 'n distribute MDE from the encrypted MDB

Is that all? Or, am I forgetting some step(s)?

If I can ask, what exactly does ENCRYPTing do to an
unencrypted MDB file?
Nov 13 '05 #1
2 1316
MLH wrote:
1) Create secure workgroup system database, remove user
ADMIN from the ADMINs group
2) Encrypt the source MDB front end database
3) Create 'n distribute MDE from the encrypted MDB

Is that all? Or, am I forgetting some step(s)?


If you're asking, then don't try it. You *will* regret it.

Read the security FAQ available at
http://support.microsoft.com/default...b;en-us;165009

Read it carefully and ensure you understand it.

Don't try messing with security without reading and understanding this
document. It's very, very easy to think you've secured an mdb and not
have done so.

DId I say read the security FAQ? Don't ask any more questions until
you've downloaded this and read it and understand it. RTFM, etc.

That's all I'll say.
--
Tim http://www.ucs.mun.ca/~tmarshal/
^o<
/#) "Burp-beep, burp-beep, burp-beep?" - Quaker Jake
/^^ "Whatcha doin?" - Ditto "TIM-MAY!!" - Me
Nov 13 '05 #2
> If I can ask, what exactly does ENCRYPTing do to an
unencrypted MDB file?


ENCRYPTing is a separate issue from ms-access "workgroup" security (you can
encrypt..but not use workgroup security).

What encrypting does is scramble the "text" inside of the mdb file. So, if
you open up the mdb file with a "file" editor, or a "hex" editor to view the
"raw" text, you will see the contents scrambled.

Even for databases that I implement security, the first thing I turn off is
that encryption. Why? Because then winzip, or in my case "inno install" does
NOT compress the mde file by any amount.

So, if you are not worried about users looking at the file with a "file"
editor, then you best turn off encryption, as then winzip etc. can compress
the file for emailing, or downloading from a web site.
--
Albert D. Kallal (Access MVP)
Edmonton, Alberta Canada
pl************* ****@msn.com
http://www.members.shaw.ca/AlbertKallal
Nov 13 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
1759
by: Matt | last post by:
I know we can write ASP with VB Script. Some people told me the big ASP projects usually use Visual Basic for the business logic. Is that the case? What I mean is an ASP project is the combination of server-side ASP code and Visual Basic components (.cls) Please advise. thanks!!
22
2354
by: Bradley | last post by:
Has anyone else noticed this problem? I converted the back-end to A2000 and the performance problem was fixed. We supply a 97 and 2000 version of our software so we kept the backend in A97 to make upgrading simple for users. We've done it like that for years but a new client has been having severe performance issues... solved by converting the backend to 2000. -- regards, Bradley
3
2170
by: Pieter Linden | last post by:
I have a database of rental units etc that I'm using the CreateTableFromRecordset code from ADH 2000. Well, at the moment, I'm doing a sanity check and testing it on my computer, with A2002, but anyway.... I'm trying to create is building by building (a table for each pair of buildings), so the format is something like this: Building AptNo AptType Tenant Annual Income Rent
1
1459
by: Andrew Chanter | last post by:
I have taken over support of an A97 application which has presented an interesting and confounding scenario involving workgroup security. I cant figure out whether my predecessor deliberately engineered this situation or has hit on a bug in the security model and exploited this. The system is in 4 components, a database back end, an application front end (ODBC links to back end), an administration front end and a workgroup security...
11
1397
by: MLH | last post by:
I was reading up on A97 security and found a blurb saying Microsoft Access provides two traditional methods of securing a database: setting a password for opening a database, or user-level security, which can be used to limit what parts of the database the user can access or change. Which of these two do I configure to prevent opening the database unless the correct system database is joined? This topic came up as a result of another...
4
1497
by: Salad | last post by:
Last Friday I decided to reinstall Access97 on my machine. At the time, I didn't have the ability to save a table as a text file. This occurred after I had removed A2K. (I might have saved myself some time by simply re-registering MSText35.Dll) Anyway, I got into installation hell when I removed Office97 from my computer and reinstalled. I got the Hatten.TTF no license problem I got the Htmlmarq.ocx no registration error I got...
11
2001
by: MLH | last post by:
My alzheimer moments occur with greater frequency these days, it seems. I sometimes open Access and the same dbase in a second instance and work on items. If I modify a form and discover later that I'm working in a 2nd instance of Access, I close it. The modifications are not present in the first instance of the program and I have to make them again. Is there a setting I can make that will prevent me from inadvertently doing just that?
0
2009
by: =?Utf-8?B?UmljaA==?= | last post by:
Hello, Mysteriously, the components for the Toolbox for Report Items (RDLC reports - VS2005 - designer) have all changed to Textbox. There is no List component, Matrix, Table, Line, Chart, Image,... I ran VS2005 setup in Maintenance/Repair mode, but that did not fix it. I uninstalled VS2005 and re-installed it, but that did not fix it. My guess is that some IT operation in our company has corrupted something on my workstation. I...
1
1192
by: roserings | last post by:
How to grant permission to Visual basic components?
0
8969
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9476
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9335
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
8210
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6751
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6053
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4570
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4825
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
3279
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.