473,586 Members | 2,839 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Access 97 .mdws with Access XP databases

I'm working at a company that is upgrading from Access 97 to 2002. We
have a number of '97 databases that are .mdw secured, but in no case
has anyone saved the original PIDs and SIDs used to create the security
files and accounts.

I'm wondering about the possibility of continuing to use the '97 .mdws
with the converted 2002 databases. Are there side effects? I have
heard that '97 .mdws sometime bloat when used with Access 2K databases.

Any info would be appreciated.

Nov 13 '05 #1
7 2049
"brucedodds 2" <br*********@fm global.com> wrote in
news:11******** **************@ o13g2000cwo.goo glegroups.com:
I'm wondering about the possibility of continuing to use the '97
.mdws with the converted 2002 databases. Are there side effects?
I have heard that '97 .mdws sometime bloat when used with Access
2K databases.


I haven't seen that, but I've only used that setup very
occasionally.

Keep in mind that A2K+ MDWs bloat a lot more than A97 ones, so it
may be an issue that only looks significant on the surface.

--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
Nov 13 '05 #2
brucedodds2 <br*********@fm global.com> typed:
: I'm working at a company that is upgrading from Access 97 to 2002. We
: have a number of '97 databases that are .mdw secured, but in no case
: has anyone saved the original PIDs and SIDs used to create the
: security files and accounts.
:
: I'm wondering about the possibility of continuing to use the '97 .mdws
: with the converted 2002 databases. Are there side effects? I have
: heard that '97 .mdws sometime bloat when used with Access 2K
: databases.
:
: Any info would be appreciated.

Sadly I'm in the same situation. My .mdw was originally created in
Access 2.0 -- it converted and worked fine with Access 97, but I'm
unable to read the group and user information using Access 2002 (I get
"Record(s) cannot be read; no read permission on 'MSysAccounts'" , KB
article 306077 has the details). I'm looking at rebuilding the groups
and users and re-securing my front and back-ends. :(

Unless someone here knows of a utility to convert the .mdw...

--
Please remove the under_scores if replying by mail.
Nov 13 '05 #3
Thanks for the KB article.

I have found out by reading this newsgroup that .mdw secured databases
aren't very secure. There are utilities available that can break that
security, provided the user has both the database and the .mdw file for
it. So Access security it's not as safe as it looks, though depending
on the level of protection your client needs it may still be sufficient
for your ap[plication.

Nov 13 '05 #4
David W. Fenton wrote:
Keep in mind that A2K+ MDWs bloat a lot more than A97 ones, so it
may be an issue that only looks significant on the surface.


Never realized there was a cbloat issue with mdws and haven't done any
secured apps lately and none in A2003. Nevertheless, how does one go
about compacting them other than via code? Is there a way?

--
Tim http://www.ucs.mun.ca/~tmarshal/
^o<
/#) "Burp-beep, burp-beep, burp-beep?" - Quaker Jake
/^^ "Whatcha doin?" - Ditto "TIM-MAY!!" - Me
Nov 13 '05 #5
Tim Marshall <TI****@PurpleP andaChasers.Moe rtherium> wrote in
news:dj******** **@coranto.ucs. mun.ca:
David W. Fenton wrote:
Keep in mind that A2K+ MDWs bloat a lot more than A97 ones, so it
may be an issue that only looks significant on the surface.


Never realized there was a cbloat issue with mdws and haven't done
any secured apps lately and none in A2003. Nevertheless, how does
one go about compacting them other than via code? Is there a way?


An MDW is just a special MDB with a different extension (it does
have some properties specific to MDWs). As long as the MDW is not in
use (i.e., not your default system.mdw file and not in use via the
workgroup switch of a command line), you can open it just like an
MDW.

And browse the tables of users and groups.

And view the enctryped passwords.

And compact the thing.

I'm surprised someone as experienced as you would never have
actually tried this before. It does demonstrate why it wasn't
exactly hard to crack Jet security.

--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
Nov 13 '05 #6
David W. Fenton wrote:
I'm surprised someone as experienced as you would never have
actually tried this before. It does demonstrate why it wasn't
exactly hard to crack Jet security.


I don't do much with secured mdbs. In fact, I can probably count the
number of secured mdbs I've developed on one hand. The vast majority of
what I do is reporting front ends on Oracle back ends where I normally
restrict the user view connected to via ODBC to one with read only
access, so Access/Jet security is not needed.

I must say, I thought an mdw was a special non-mdb file of some sort.
This may well be something I missed from the Access security FAQ (which
I must follow closely anytime I do tackle security, as I forget most
things) - is it mentioned in there?

I'll have to poke around some mdw files now when I get back to work
tomorrow!
--
Tim http://www.ucs.mun.ca/~tmarshal/
^o<
/#) "Burp-beep, burp-beep, burp-beep?" - Quaker Jake
/^^ "What's UP, Dittoooooo?" - Ditto
Nov 13 '05 #7
There is a KB article on use of A97 .mdw files with later versions. You
have to read past the start to get the information:

http://support.microsoft.com/kb/282357/

It doesn't raise any red flags.

Nov 13 '05 #8

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
1813
by: Rupe | last post by:
I have a web site on a remote, shared host with a bunch of individual Access databases. I want to switch my databases from Access to MS SQL and have some questions. I update some of my Access databases through web-based content management systems. Other databases I update locally (through a bunch of Access forms) and FTP them periodically...
27
3609
by: Chuck Grimsby | last post by:
(Repost, due to lack of submissions...) The Microsoft Access Product Group (the people who build Microsoft Access) want your help! One of the main things we're working on for the near future is a conversion tool to take Microsoft Access 97 databases (primarily, but also Microsoft Access 2000 or 2002/XP databases) up to Microsoft Office...
2
1865
by: edo | last post by:
100 Day Analysis Following is a summary of articles spanning a 100 day period, beginning at 10 Sep 2003 06:41:30 GMT and ending at 19 Dec 2003 04:09:06 GMT. Notes ===== - A line in the body of a post is considered to be original if it
3
6191
by: Robin | last post by:
Hi all, I'm working with a VB app, using DAO 3.6, that used to generate Access '97 databases using the following code: Set dbsNew = wrkDefault.CreateDatabase(strLPAccessInv, dbLangGeneral, dbVersion30) I was able to have it create databases in Access 2000 by changing "dbVersion30" to "dbVersion40". Do I generate a database in Access
1
5155
by: Mike | last post by:
Hi Hi We are currently upgrading from access 97 to office 2003 on site. We would like to upgrade our access databases to Access 2003 but we wish to remove Microsoft access software from our end users so that we can control the creation of databases. Is there a way that our end users can still use these upgraded access databases without...
1
3327
by: com | last post by:
Extreme Web Reports 2005 - Soft30.com The wizard scans the specified MS Access database and records information such as report names, parameters and subqueries. ... www.soft30.com/download-1-11975.htm - 31k - Cached - Similar pages MDBSecure 1.0.8.0 - Soft30.com Utility which makes it easy to create secure MS Access Databases, ... MS...
17
4398
by: Mell via AccessMonster.com | last post by:
Is there a way to find out where an application was created from? i.e. - work or home i.e. - if application sits on a (work) server/network, the IT people know the application is sitting there, but is there a way they can find out if that application was put there from a CD or email or created at work? Hint: It's not on a client/server...
9
3822
by: Wayne Smith | last post by:
I've come up against a major headache that I can't seem to find a solution for but I'm sure there must be a workaround and I would really be grateful of any help. I'm currently building a web site for a small club I belong to and one of the features I would like to include is the ability to allow users to upload image files. ...
5
3601
by: Anns via AccessMonster.com | last post by:
My establishment has about 20 ms access db's that will be converted over (see subject). When we pull all the BE's over to SQL and the FE's on Sharepoint (.net) surely we don't have to change every user face, we should be able to use the same FE in as before as now on Sharepoint? ANSWER:
0
7836
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language...
0
8199
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. ...
0
8212
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
0
6606
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
1
5710
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes...
0
3835
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
0
3863
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
1447
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
1175
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.