473,545 Members | 2,032 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Checking for passwords

If someone has created a database for me and transferred it over is
there any way that I can check I have full access to all areas?

I am a beginner with Access and so the development has been done by a
temporary employee who has now handed the database over to me. Not
that I think he is an untrustworthy character but I would sleep easier
at night if I could check he has given me 100% of the database and
three months down the line I am not going to get told I can't change
something due to a security setting or without a password he has put
in there.

Any help/ suggestions would be very much appreciated.

Thanks

S

Jun 7 '07 #1
2 2093
I would start by accessing clicking Tools Startup and check that all
the boxes are ticked. If you can't see a 'Startup' option you have had
already some restriction imposed.

Then look for the database window and make sure you can see all the
tables, queries, forms, reports, macros, modules, etc and check you
can access reports and forms in 'design' view.

Also try to access the VBA modules (Alt + F11) and see the written
code.

But the best one I think would be to ask your colleague!

Jun 7 '07 #2
Hi, Simon.
I would sleep easier
at night if I could check he has given me 100% of the database and
three months down the line I am not going to get told I can't change
something due to a security setting or without a password he has put
in there.
Let me play Devil's Advocate here. If you're a beginner now such that an
experienced Access database developer needed to create the database instead
of you, then three months from now you're still going to be a beginner.
You'll have learned a lot, but you'll still be a beginner in three months
because Access has a fairly steep learning curve. Therefore, an experienced
Access database developer is going to need to make those changes, unless
they're rather simple. An expert Access database developer can get past any
password or security setting, so you needn't worry that the next temporary
developer hired will be locked out of the database (unless your organization
refuses to hire an expert, which is a management decision and is completely
out of your hands -- so don't do any worrying about this on their behalf).

Now that you know the database is accessible despite your current level of
knowledge, will that help you sleep better?

If you're worried about passwords, there are only three kinds of passwords
built into Access: User-Level Security (which requires User ID and
password), Shared-Level Security (which is the database password), and the
VBA password. That doesn't mean that the developer didn't add passwords to
forms or reports using user-defined VBA procedures, but you'll have to look
at the VBA code yourself to determine that. And if you're asking us here
for that, then no amount of advice we can give you is going to help you
sleep better until you either hire someone to look at the code for you or
you get enough experience yourself.

What to check for on built-in password functionality:

1.) Navigate to the database file in Windows Explorer and double-click on
the file name. Are you prompted for a database password or a User ID and
user password? No? Then there aren't any passwords on the database file
you don't know about.

2.) Once the database file is opened, use the Database Window to select the
modules tab, then double click on one of the names to open it in the VB
Editor. Are you prompted for a VBA password? No? Then there isn't a VBA
password you don't know about.

3.) Go back to the Access Window. Select the Tools -Options... menu to
open the Options dialog window. Select the View tab. Ensure the "Show
System Objects" check box is marked, then select the "OK" button. Select
the Tables tab in the Database Window and open the MSysObjects table. Check
the first two columns, "Connect" and "Database." If they're both empty,
then you don't have any linked tables and therefore no linked tables'
passwords you don't know about.

If either of those two columns has information, then it tells you what
database or file is being connected to for that particular table and you can
use that information to try to open that database or file. If you aren't
prompted for a password when you try to open it from whatever method is
appropriate outside of Access, then there aren't any linked tables'
passwords you don't know about.

Move over to the "Name" column and check for any row starting with "~sq_"
which is an embedded query (such as the row source for a combo box on a
form). You'll need to check the rest of the name to determine which
database object that embedded query is referring to so that you can check
the correct Record Source Property or Row Source Property for any password
used to connect if it happens to be a remote query in another Access
database file.

4.) Go back to the Database Window and select the Queries tab. Open each
query in Design View and right click in the upper pane above the grid.
Select "Properties " in the pop-up menu. Is the Source Connection Str
Property empty? Yes? Then there aren't any remote queries for other
databases, and therefore no external database passwords that you don't know
about. If it's not empty, then the connection information will tell you if
a password is required, just like the "Connect" column in the MSysObjects
table.

5.) Select the Tools -Security -User and Group Permissions menu.
Select the "Change Owner" tab, and select "Database" in the "Object Type"
combo box. If the <Current Databaseobject says Admin is the "Current
Owner," then you are home free. There is no User-Level Security applied to
the database file, and there are no user passwords you don't know about.

However, if it says <Unknownis the current owner, then User-Level Security
has been implemented (although not correctly, because _you_ snuck in without
the correct credentials) and you are not joined to the correct Workgroup
Information File. If the owner is any other user, then User-Level Security
has been implemented, and you need to know the password of the owner of the
database so that you can make future changes, or convert to an MDE database
file, or remove security so that you can either replicate the database or
convert the database to future versions of Access. The database developer
should tell you the User ID's and passwords of the database owner and any
other relevant users (such as test users). You don't need to know the
password of any real users to do your job, so don't ask.

Don't forget that any hacker can do these steps, too, so whatever passwords
you find, he'll find, too. A good rule of thumb is to never save a password
in an Access database file, because that's one of the first places hackers
look to find passwords, since beginning Access developers are so willing to
forgo security for convenience.

HTH.
Gunny

See http://www.QBuilt.com for all your database needs.
See http://www.Access.QBuilt.com for Microsoft Access tips and tutorials.
Blogs: www.DataDevilDog.BlogSpot.com, www.DatabaseTips.BlogSpot.com
http://www.Access.QBuilt.com/html/ex...ributors2.html for contact
info.
Jun 7 '07 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
2632
by: Philip D Heady | last post by:
Hi, I'm validating a simple form for input via post ($PHP_SELF). Near the end I check for username and password. I'm using simple if, elseif, else statements. I require them to enter password twice and check that they match. Problem is script doesn't valide past username input and I dont know why!! If you don't enter a password it doesn't...
11
4276
by: Florian Lindner | last post by:
Hello, I've a scripts that allows limited manipulation of a database to users. This script of course needs to save a password for the database connection. The users, on the other hand need read permission on the script in order to execute it but should not be able to read out the password. What is the common way to solve this problem? My...
14
4045
by: Miranda | last post by:
Hi, I have a ASP/vbscript program that generates random passwords. The problem is I need to insert those passwords into an Access database of 327 clients. I have the random password program generating the 327 passwords, but have had no luck inserting them. =============================================== Here is the code that generates the...
2
12566
by: Peter Rilling | last post by:
How does Windows store passwords that it uses? For instance, when you install a service, you can provide it the username and password. This information is stored somehow so that at a later date the service can start without interaction from the user. Also for COM+ components. This is what I want to be able to do. I want the ability to...
1
1368
by: Shapper | last post by:
Hello, I created a login system and I my passwords are being hashed. I need to check if everything is working so I need to generate some hashed passwords to replace the actual passwords I have in this moment in my database. How can I do this? I have the following data in my database: USER PASSWORD
15
2482
by: Dino Vliet | last post by:
Hi folks, probably this is a question you've heard so many times but I wasn't able to find a solution to it. I'm using a shell script to create a textfile for me. It looks like #!/usr/local/bin/bash psql -c "select foo from bar;" -d database1 -t psql -c "\q" -d database1 exit 0
5
5076
by: Macca | last post by:
Hi, My application uses passwords to limit access to certain parts of the app. I was considering storing these in my database but have heard that there can be problems with this. I have heard using the Global Assembly Cache (GAC) would be a good place. Does anyone have any opinions on this and how would I implement the GAC scenario?
19
2425
by: Cord-Heinrich Pahlmann | last post by:
Hi, I have written a tool wich de/encrypts a few of my forum and bloggin-Passwords. My question is how secure it is. The following describes how I have encrypted my passwords. When I log in, the Login-Password is changed into a md5-Hash and is compared to the login-password in the db. If the passwords are the same the use is logged in...
1
1997
by: geetamadhavi | last post by:
Hi All, I have developed a php applciaiton where a new window is opening on checking the whether valid user orntot how to make that in same window after checking i have die(' not valid user ' ); i even tried with echo also how to solve this the message should come under in the same window only see my code it is program ---- <?php //...
0
7475
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
0
7409
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language...
0
7921
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
0
7771
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
0
5982
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
0
3465
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
0
3446
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
1900
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
1
1023
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.