473,666 Members | 2,144 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

best security for dispatching access database?

8 New Member
Hi,

I'm looking for the best way to dispatch my database to many computers which I don't want any access to the source!

my database is for entring the data by users without see what is inside the database.
I have to use login at the start of database by different users and different access to allow view thre records or updating the records?

with user level-Security, many people can find the users pass and also admin pass with many cracks file which can find easily in internet.
and with mde I can not hide my table of login information, because by importing this table from another mdb file can see all the pass of users!!!

what you think,,,
which way is the best for dispatching like this database?


thanks
Ali
Jun 5 '07 #1
5 1632
Rabbit
12,516 Recognized Expert Moderator MVP
Hi,

I'm looking for the best way to dispatch my database to many computers which I don't want any access to the source!

my database is for entring the data by users without see what is inside the database.
I have to use login at the start of database by different users and different access to allow view thre records or updating the records?

with user level-Security, many people can find the users pass and also admin pass with many cracks file which can find easily in internet.
and with mde I can not hide my table of login information, because by importing this table from another mdb file can see all the pass of users!!!

what you think,,,
which way is the best for dispatching like this database?


thanks
Ali
Make the mde but keep the passwords and log-in in the code. If you need the flexibility to add new users then you'll have encrypt your passwords table.
Jun 5 '07 #2
Fekri
8 New Member
Thanks for your respond,

but I never use this encrypt !!!!

Can you explain me what is this and what is usefull?

Thanks a lot
Ali
Jun 6 '07 #3
Rabbit
12,516 Recognized Expert Moderator MVP
Thanks for your respond,

but I never use this encrypt !!!!

Can you explain me what is this and what is usefull?

Thanks a lot
Ali
Encryption algorithms are varied. There are a lot, I've never made one personally but basically an encryption algorithm takes data and transforms it into something not understandable unless you know how they did it.

A simple one is letter replacement where a letter is substituted for another letter.
Jun 6 '07 #4
Fekri
8 New Member
Hi,
thanks for your respond..

But I don't know how I should Encrypt the database??

Is it in the Access Menu?? or there is special way to do it?

I think this is what I need but please guide me how I can create it!!


Thanks
Ali
Jun 8 '07 #5
Rabbit
12,516 Recognized Expert Moderator MVP
Hi,
thanks for your respond..

But I don't know how I should Encrypt the database??

Is it in the Access Menu?? or there is special way to do it?

I think this is what I need but please guide me how I can create it!!


Thanks
Ali
You have to program one yourself or find it online, there's no native functionality for it. If you're looking for security then Access notoriously lacks it.
Jun 8 '07 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

11
2289
by: Dave Smithz | last post by:
Having adopted someone else's PHP cope and completing a crash course in the language I came across a (probably common) problem with the current code. On a registration form, whenever users names have an apostrophe in them it causes problems as they do not get added to the DB correctly for reasons that immediately become apparent. Before implementing my own workaround I noticed the functions. addslashes, stripslashes and directive...
1
2493
by: Terry | last post by:
Hi, could someone please exmaplin to me what dynamic method dispatching is and how it's connected to virtual methods? Thanks Terry
5
4942
by: great_googley_moogley | last post by:
Greetings, I am in the process of installing a SQL database at a customer location. I have determined that there are 3 ways to do this, and I wanted to know which is the best of the 3. 1 Install From Script. In this method I create the database and its objects in scripts that are run via osql utility on the SQL server machine. For loading any initial data that I need in the database I also run bcp commands.
11
9243
by: DrUg13 | last post by:
In java, this seems so easy. You need a new object Object test = new Object() gives me exactly what I want. could someone please help me understand the different ways to do the same thing in C++. I find my self sometimes, trying Object app = Object(); Object *app = Object(); Object app = new Object();
116
7490
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data and some who couldn't but that it wasn't important right now. And I said, 'sure, we can do that later'. So now I've developed an app without any thought to security and am trying to apply it afterwards. Doh!, doh! and triple doh!
0
4221
by: Anonieko Ramos | last post by:
ASP.NET Forms Authentication Best Practices Dr. Dobb's Journal February 2004 Protecting user information is critical By Douglas Reilly Douglas is the author of Designing Microsoft ASP.NET Applications and owner of Access Microsystems. Doug can be reached at doug@accessmicrosystems.com. --------------------------------------------------------------------------------
3
1461
by: Michael Tsai | last post by:
Hi, It said that IIS 6 use HTTP.sys as the front end for handling HTTP request, and pass ASP.NET requests to w3wp.exe, but after some simple experiments, I found the security settings (e.g. Authentication method) in IIS metabase is still applied before the HTTP request reach my ASP.NET application. Anyone one can explain this for me? or point to an article that explains: when a user requests an ASP.NET
20
6592
by: Keith G. Murphy | last post by:
I'm trying to get a feel for what most people are doing or consider best practice. Given a mod_perl application talking to a PostgreSQL database on the same host, where different users are logging onto the web server using LDAP for authentication, do most people 1) have the web server connecting to the database using its own user account (possibly through ident), and controlling access to different database entities strictly through...
0
793
by: David Helgason | last post by:
I think those best practices threads are a treat to follow (might even consider archiving some of them in a sort of best-practices faq), so here's one more. In coding an game asset server I want to keep a large number of file revisions of varying sizes (1Kb-50Mb) inside the database. Naturally I want to avoid having to allocate whole buffers of 50Mb too often.
0
8781
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
8551
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8639
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7386
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
5664
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4198
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4368
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
2011
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
2
1775
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.