473,769 Members | 2,166 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Is UserLevel Security Really Necessary?

First, I feel somewhat embarrassed and apologetic that this post is lengthy,
but in an effort to furnish sufficient information (as opposed to too little
information) to you, I wanted to supply all of the relevant facts. Second,
despite the fact that I think the obvious 'quick' answer to my question
would be 'Yes', I am seeking your wisdom and recommendation to the question
as to this particular set of circumstances.

I have 20 Security Guard posts scattered over an entire state (US). I am in
the final process of building an electronic Guard Activity Log (GAL) in
Access XP for the guards to document their security activity rather than
utilize the "old" method of handwriting their entries into a paper log book
(a couple of recent incidents convinced me that handwritten log book entries
are too easily altered or manipulated). The GAL is a single multi-field
data entry form which opens 'on top' whenever Windows is loaded. The
entered data is linked, locked and captured to a networked backend file
permitting security managers to view the activity at any given site for any
given time period. In addition to the company-required IT Window Logon
protocols, I've asked IT-Security to ensure no other programs are available
to the guards including IE, email and Games. Other relevant facts are:
1. The guards operate in three (3) 8-hour shifts (24/7 operation).
2. The computer at a particular site is tied by IT to that site only.
3. The GAL form has a default facility name value of that Facility's name.
4. The GAL has a mandatory 'Shift Sign-In' and 'Shift Sign-Out' fields with
system date/time entered automatically based upon their name and
that particular Facility.
5. As there are 3 guards needed to cover the shifts for a single day, there
are 6 guards authorized to work Security at each particular site (only
they have received site-specific training for that particular site).
6. The site operations manager has a weekly guard duty roster indicating
the name of the guard who is supposed to be on duty for a
particular day/shift as well as a list of the 6 guards authorized at his/her
site.

As I envision the set-up I want, since Guard 'B' is relieving Guard 'A', and
Guard 'C' relieves Guard 'B', there will be no need to ever 'shut down' GAL
(just as there is never a need to close the cover to a paper log book and
then re-open it). For security's sake, there are certain physical security
protocols a relieving guard must go through before being granted admittance
inside to get to his post.

So my question is, based on the foregoing, would there be any compelling
database security reason(s) to have the Security Officers 'logon' each shift
change, with a password., to GAL? This would require each outgoing Officer
to 'shut-down' and the incoming Officer to 'Logon' both to Windows and then
again to GAL (Access). Given the stated security protocols in place, I
personally feel that it would be unnecessary, but am trying to determine if
their is something I'm not considering.

Thanks so much...
Earl Anderson

Jun 17 '07 #1
18 2028
Hi, Earl.
So my question is, based on the foregoing, would there be any compelling
database security reason(s) to have the Security Officers 'logon' each
shift change, with a password., to GAL? This would require each outgoing
Officer to 'shut-down' and the incoming Officer to 'Logon' both to Windows
and then again to GAL (Access). Given the stated security protocols in
place, I personally feel that it would be unnecessary
So if I'm Guard B and I screw up, I can edit Guard A's database entry to
make it look like he did it instead. Since there's no separate Windows
login or Access database login, no one can track my strategic edit job.
Awesome! This is soooo much better than a log book, where people can tell
my handwriting looks different than Guard A's handwriting.

And if I'm late to work, I can edit the time the previous guard signed out
and the time I signed in, and no one can track those changes either! I'll
just press <CTRL><Gand enter the following two commands in the Immediate
Window:

CurrentDB().Exe cute "UPDATE tblShifts SET SignOut = #6/17/2007 8:00:16 AM#
WHERE Facility = 'Fort Knox' AND WeekNum = 25 AND Shift = 1;"

CurrentDB().Exe cute "UPDATE tblShifts SET SignIn = #6/17/2007 8:00:48 AM#
WHERE Facility = 'Fort Knox' AND WeekNum = 25 AND Shift = 2;"

Since the database application recorded the system time when we signed in
and out (as required), the previous guard must have been mistaken about when
I arrived, because we can all see that it's "8:00 A.M." in the database for
today's date, just like it should be.

I _love_ this database application! I can do no wrong! (At least no one
can prove it.)

HTH.
Gunny

See http://www.QBuilt.com for all your database needs.
See http://www.Access.QBuilt.com for Microsoft Access tips and tutorials.
Blogs: www.DataDevilDog.BlogSpot.com, www.DatabaseTips.BlogSpot.com
http://www.Access.QBuilt.com/html/ex...ributors2.html for contact
info.
Jun 17 '07 #2
Gunny,

I'm glad you brought up that circumstance of being able to edit another
guard's entry(ies). Inasmuch as my post was long enough, I didn't state
that once the entry is written and THEN added to the log (permanently as a
record), it can not be edited. That is to say, if Guard 'C' makes an entry
that, say, 'none of the alarms worked' and THEN adds that entry to the log
(again a permanent record) and afterwards sees that he made a mistake when
in fact 'all 'of the lights worked, he then must make another entry
referencing and correcting his original entry. As an mde, there is no
ability for the guards to tamper or edit any code and all 'Edit' and most
other menu bar options have been disabled.

Hope I presented that clearly enough...
Earl
"'69 Camaro" <Fo************ **************@ Spameater.orgZE RO_SPAMwrote in
message news:13******** *****@corp.supe rnews.com...
Hi, Earl.
>So my question is, based on the foregoing, would there be any compelling
database security reason(s) to have the Security Officers 'logon' each
shift change, with a password., to GAL? This would require each outgoing
Officer to 'shut-down' and the incoming Officer to 'Logon' both to
Windows and then again to GAL (Access). Given the stated security
protocols in place, I personally feel that it would be unnecessary

So if I'm Guard B and I screw up, I can edit Guard A's database entry to
make it look like he did it instead. Since there's no separate Windows
login or Access database login, no one can track my strategic edit job.
Awesome! This is soooo much better than a log book, where people can tell
my handwriting looks different than Guard A's handwriting.

And if I'm late to work, I can edit the time the previous guard signed out
and the time I signed in, and no one can track those changes either! I'll
just press <CTRL><Gand enter the following two commands in the Immediate
Window:

CurrentDB().Exe cute "UPDATE tblShifts SET SignOut = #6/17/2007 8:00:16 AM#
WHERE Facility = 'Fort Knox' AND WeekNum = 25 AND Shift = 1;"

CurrentDB().Exe cute "UPDATE tblShifts SET SignIn = #6/17/2007 8:00:48 AM#
WHERE Facility = 'Fort Knox' AND WeekNum = 25 AND Shift = 2;"

Since the database application recorded the system time when we signed in
and out (as required), the previous guard must have been mistaken about
when I arrived, because we can all see that it's "8:00 A.M." in the
database for today's date, just like it should be.

I _love_ this database application! I can do no wrong! (At least no one
can prove it.)

HTH.
Gunny

See http://www.QBuilt.com for all your database needs.
See http://www.Access.QBuilt.com for Microsoft Access tips and tutorials.
Blogs: www.DataDevilDog.BlogSpot.com, www.DatabaseTips.BlogSpot.com
http://www.Access.QBuilt.com/html/ex...ributors2.html for contact
info.

Jun 17 '07 #3
Hi, Earl.
I didn't state that once the entry is written and THEN added to the log
(permanently as a record), it can not be edited.
How are you preventing users from editing the records without implementing
security? (I can think of several ways to detect a user's edits, but I want
to hear it from you as to the steps you've taken to prevent any hanky-panky
from knowledgeable database users, because even if those security guards
don't know anything about databases today, they can find someone who does
who can then advise them about what to do to get around the standard
precautions.)

From the example I gave, you can see that a user can update records in a
table and leave no trace by using the Immediate Window for the commands. An
MDE doesn't prevent the user from using the Immediate Window, nor from
creating and deleting queries, tables, and macros, so the inability to use
menus or edit or add any VBA code in the current database application isn't
that much of a hurdle when it comes to data manipulation. And without
User-Level Security, the built-in menus can easily be re-enabled, so the
missing "Edit" menu can be put back in and removed again without your
knowledge.

HTH.
Gunny

See http://www.QBuilt.com for all your database needs.
See http://www.Access.QBuilt.com for Microsoft Access tips and tutorials.
Blogs: www.DataDevilDog.BlogSpot.com, www.DatabaseTips.BlogSpot.com
http://www.Access.QBuilt.com/html/ex...ributors2.html for contact
info.
Jun 18 '07 #4
'69 Camaro wrote:
Hi, Earl.
I didn't state that once the entry is written and THEN added to the
log (permanently as a record), it can not be edited.

How are you preventing users from editing the records without
implementing security? (I can think of several ways to detect a
user's edits, but I want to hear it from you as to the steps you've
taken to prevent any hanky-panky from knowledgeable database users,
because even if those security guards don't know anything about
databases today, they can find someone who does who can then advise
them about what to do to get around the standard precautions.)
[snip]

And that last statement is why I would say impementing ULS is a waste of time.
If users can seek advice how to manipulate your data in an app without ULS they
can just as easily obtain advice on how to circumvent ULS.

If you need to protect data from users then it shoul not be stored in an
Access/Jet database.

--
Rick Brandt, Microsoft Access MVP
Email (as appropriate) to...
RBrandt at Hunter dot com
Jun 18 '07 #5
"Earl Anderson" <is*****@optonl ine.netwrote
I have 20 Security Guard posts scattered
over an entire state (US).
How do you plan to implement this? A split Access-Jet database is
unsuitable for use over a WAN. If you are planning an Access client
application to a server DB at a central site over the WAN, or access via
Windows Terminal Services, security considerations will be different.

Access User/Group Level Security is breakable, and you should not _count on_
the users' current inexperience preventing them from managing to break it.

If the users (guards) have to log on to Windows or the network with their
own unique ID, you can use that to identify the log entries (see
http://www.mvps.org/access/api/api0008.htm). If you are using a Server DB as
the data store, then the Server DB's security is likely to be stronger than
Access'.

We've heard reports, but I cannot vouch for their accuracy, that someone has
created a successful dis-compiler for MDE "compiled" databases... which
only, by the way, prevents opening code modules, and associated objects, in
design view.

If you can provide more detailed information and you'll likely get more
detailed answers or comments.

Larry Linson
Microsoft Access MVP
Jun 18 '07 #6
Gunny,

This is very helpful...exact ly what I was looking for. In short, you're
saying if I don't employ user-level security, someone who knew what they
were doing could get into the GAL and change data. I believe with the file
as an mde file would prevent access to the forms, reports and modules, it
still permits access to the queries and tables. However, if user-level
security is in place with the guards needing and having 'Read' and 'Write'
permissions, and without 'Read Design', 'Modify Design', 'Update', 'Delete'
and 'Insert Data' permissions, they would still have access to the Database
Window (F-11 is one way) and, as you point out, the Immediate Window
(Ctrl-G), as well. Now, with user-level security invoked, even if they
could get to the Immediate Window, I don't believe they would be able to
Save any changes in an mde file. But on the 'flipside', with the 'Write'
permissions they have with user-level security, by getting into the database
window, they could 'write' data to a table with their user-level 'write'
permission. So, I guess I'm saying/asking is that if they can get to the
tables to 'write' data no matter if its an mde file or if there is
user-level security employed, what is the solution to prevent any
modification of data?

Also, I did not mention previously, that a guard cannot enter and save data
to the log without being signed-in on shift first.

Thx...
Earl
"'69 Camaro" <Fo************ **************@ Spameater.orgZE RO_SPAMwrote in
message news:13******** *****@corp.supe rnews.com...
Hi, Earl.
>I didn't state that once the entry is written and THEN added to the log
(permanently as a record), it can not be edited.

How are you preventing users from editing the records without implementing
security? (I can think of several ways to detect a user's edits, but I
want to hear it from you as to the steps you've taken to prevent any
hanky-panky from knowledgeable database users, because even if those
security guards don't know anything about databases today, they can find
someone who does who can then advise them about what to do to get around
the standard precautions.)

From the example I gave, you can see that a user can update records in a
table and leave no trace by using the Immediate Window for the commands.
An MDE doesn't prevent the user from using the Immediate Window, nor from
creating and deleting queries, tables, and macros, so the inability to use
menus or edit or add any VBA code in the current database application
isn't that much of a hurdle when it comes to data manipulation. And
without User-Level Security, the built-in menus can easily be re-enabled,
so the missing "Edit" menu can be put back in and removed again without
your knowledge.

HTH.
Gunny

See http://www.QBuilt.com for all your database needs.
See http://www.Access.QBuilt.com for Microsoft Access tips and tutorials.
Blogs: www.DataDevilDog.BlogSpot.com, www.DatabaseTips.BlogSpot.com
http://www.Access.QBuilt.com/html/ex...ributors2.html for contact
info.

Jun 18 '07 #7
With user-level security, you would give the user no permissions to write to
the table, but you would only give the owner of the append query permission
to write to the table. Thus, the user, whoever's logged in, could only use
the append query to write to the table; but they would not be able to go
into the tables themselves and edit data.

Another approach would be to use SQL Server as a back end, and call a stored
procedure to append the data to the back end. That way, the tables aren't
linked to the front end at all. Of course, if the user determined the
location of the SQL database they could work around it. But you could
restrict edits to the SQL Server database to a specific account, and then,
in your code that calls the stored procedure, you would provide that account
name and password. Your code to call the stored procedure would reside in a
code module, not in a query, so it would be compiled into the MDE and would
be unobtainable. If the user were able to decompile the MDE, they might be
able to get the password to write to the SQL database; but that would be a
stretch, IMO.

Bottom line: it depends on how "secure" it needs to be. Are you trying to
prevent casual tampering? Then you're probably fine. Are you trying to
prevent someone who has more experience in tampering (or has a friend who
does) from being able to tamper with it? Then you probably need to do more?
Are you trying to make it bullet-proof, no possible way in the world it can
be tampered with? Probably not possible.

Neil
"Earl Anderson" <is*****@optonl ine.netwrote in message
news:1g******** *******@newsfe1 2.lga...
Gunny,

This is very helpful...exact ly what I was looking for. In short, you're
saying if I don't employ user-level security, someone who knew what they
were doing could get into the GAL and change data. I believe with the
file as an mde file would prevent access to the forms, reports and
modules, it still permits access to the queries and tables. However, if
user-level security is in place with the guards needing and having 'Read'
and 'Write' permissions, and without 'Read Design', 'Modify Design',
'Update', 'Delete' and 'Insert Data' permissions, they would still have
access to the Database Window (F-11 is one way) and, as you point out, the
Immediate Window (Ctrl-G), as well. Now, with user-level security
invoked, even if they could get to the Immediate Window, I don't believe
they would be able to Save any changes in an mde file. But on the
'flipside', with the 'Write' permissions they have with user-level
security, by getting into the database window, they could 'write' data to
a table with their user-level 'write' permission. So, I guess I'm
saying/asking is that if they can get to the tables to 'write' data no
matter if its an mde file or if there is user-level security employed,
what is the solution to prevent any modification of data?

Also, I did not mention previously, that a guard cannot enter and save
data to the log without being signed-in on shift first.

Thx...
Earl
"'69 Camaro" <Fo************ **************@ Spameater.orgZE RO_SPAMwrote
in message news:13******** *****@corp.supe rnews.com...
>Hi, Earl.
>>I didn't state that once the entry is written and THEN added to the log
(permanentl y as a record), it can not be edited.

How are you preventing users from editing the records without
implementing security? (I can think of several ways to detect a user's
edits, but I want to hear it from you as to the steps you've taken to
prevent any hanky-panky from knowledgeable database users, because even
if those security guards don't know anything about databases today, they
can find someone who does who can then advise them about what to do to
get around the standard precautions.)

From the example I gave, you can see that a user can update records in a
table and leave no trace by using the Immediate Window for the commands.
An MDE doesn't prevent the user from using the Immediate Window, nor from
creating and deleting queries, tables, and macros, so the inability to
use menus or edit or add any VBA code in the current database application
isn't that much of a hurdle when it comes to data manipulation. And
without User-Level Security, the built-in menus can easily be re-enabled,
so the missing "Edit" menu can be put back in and removed again without
your knowledge.

HTH.
Gunny

See http://www.QBuilt.com for all your database needs.
See http://www.Access.QBuilt.com for Microsoft Access tips and tutorials.
Blogs: www.DataDevilDog.BlogSpot.com, www.DatabaseTips.BlogSpot.com
http://www.Access.QBuilt.com/html/ex...ributors2.html for contact
info.


Jun 18 '07 #8

"Larry Linson" <bo*****@localh ost.notwrote in message
news:eHldi.6550 $Fk7.6291@trndd c01...
A split Access-Jet database is unsuitable for use over a WAN. If you
are planning an Access client application to a server DB at a central site
over the WAN, or access via Windows Terminal Services, security
considerations will be different.
Larry, not to be a pain-in-the ass, but I am/was planning to employ this
over a WAN. Is there either a reference you can point me to or else tell me
WHY Access is "unsuitable for use over a WAN"?

As far as more details, the path that points to the backend is a secure
network path that only I can authorize IT-Security to permit an individual
access to it. Although I'm not concerned about the guards getting to other
elements of the program (they only have the GAL data immediately available
to them), it appears that with some Access know-how, it would be possible to
change data of the activitiy log.

From what I'm gathering from you, Gunny and Rick, Access Security Sucks. It
appears that the most I can do if I want to use this form of documenting log
entries is to employ network security as well as ULS for this endeavor and
still, that's no guarantee that data can not be manipulated once entered.

I think the larger question/issue is if it (data manipulation) can be done
here in my Access app, can it not be done in any Access app?

Thx...
Earl

Jun 18 '07 #9
"Earl Anderson" <is*****@optonl ine.netwrote
> A split Access-Jet database is unsuitable for
use over a WAN. If you are planning an Access
client application to a server DB at a central site
over the WAN, or access via Windows Terminal
Services, security considerations will be different.

Larry, not to be a pain-in-the ass, but I am/was
planning to employ this over a WAN.
That much was clear. My question was "what configuration do you hope to
employ over the WAN?
Is there either a reference you can point me to
or else tell me WHY Access is "unsuitable for
use over a WAN"?
That's not what I said... I said, and quote from the paragraph above "A
split Access-Jet database is unsuitable for use over a WAN." A bit of
Googling in this newsgroup, or in microsoft.publi c.access.multiu ser, would
explain, or a visit to MVP Tony Toews' site,
http://www.granite.ab.ca/accsmstr.htm.

But, just to summarize... the Jet database engine is not a _server
database_, but a _file-server database_. All the actual data retrieval,
storage, and manipulation is done on the user's machine. The back-end
datastore on the server or remote shared drive is used just as it would be
if on the local drive... it's not "the whole database has to be brought
across the network" but all the data that would be retrieved from the local
hard drive has to be brought across. For example, if you have a table that
is indexed on MemberID, and your query selects a particular MemberID, the
MemberID index will be brought across (or at least enough of it to locate
the particular Member ID) and then the specific Record will be brought
across. If your table is not indexed and you Query on a specific value in a
specific field, it is possible that the entire table will be brought across
the network. WAN speed is just not sufficiently fast for that to be
practical.

However, if your Access front-end is a _client_ application to a true server
DB such as Microsoft SQL Server, where the request is sent over the network,
but the processing of the index, and extraction of the data is done remotely
by the server DB, a WAN will generally be OK. Or, if you have the necessary
license for accessing the server via Windows Terminal Services, and you have
sufficient computer power on the server, each user's database work will
actually be run on the server itself.

We are pointing out what _can_ happen, not what necessarily _will_ happen.
But, yes, you are correct -- I have long said, "If your data is worth $150
to anyone, better not rely on Access/Jet security to protect it." That's
what some "password recovery software" sells for (you or I might call it
"security crack software").

On the other hand, the server DBs have better security. MS SQL Server is,
IMNSHO, about the easiest to learn and administer, but has an initial cost
plus a license is required for each user. There are open-source databases,
e.g., MySQL and PostgreSQL, which do not have the initial or per-user
charge, but for which you may need to contract "services" for helping you
solve problems, etc., and they are not as easy to learn and administer.

It's not, necessarily, that you implemented something erroneously and left
security holes. It is that Access' and Jet's security leaves a great deal to
be desired if you really want close control over your data. "Sucks" is
pretty strong, because it is adequate to keep user's from stumbling over
their own feet and ending up somewhere in the database that is none of their
business.

But, if you use Access to front-end a server DB as the datastore, you have a
lot more security. But no one's security model is _perfect_.

Larry Linson
Microsoft Access MVP
As far as more details, the path that points to the backend is a secure
network path that only I can authorize IT-Security to permit an individual
access to it. Although I'm not concerned about the guards getting to
other elements of the program (they only have the GAL data immediately
available to them), it appears that with some Access know-how, it would be
possible to change data of the activitiy log.

From what I'm gathering from you, Gunny and Rick, Access Security Sucks.
It appears that the most I can do if I want to use this form of
documenting log entries is to employ network security as well as ULS for
this endeavor and still, that's no guarantee that data can not be
manipulated once entered.

I think the larger question/issue is if it (data manipulation) can be done
here in my Access app, can it not be done in any Access app?

Thx...
Earl



Jun 18 '07 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

12
2595
by: A.M. | last post by:
Hi at all, how can I do to insert into a HTML page a file .txt stored in the same directory of the server where is the html file that must display the text file.txt? Thank you very much P.Pietro
116
7550
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data and some who couldn't but that it wasn't important right now. And I said, 'sure, we can do that later'. So now I've developed an app without any thought to security and am trying to apply it afterwards. Doh!, doh! and triple doh!
1
1733
by: EL1979 | last post by:
HELP!!!!! I am very frustrated and extremely confused. When creating the DB, it was split and userlevel security was enacted. Now, I need to make changes so that the VB code will look in the right location for a file. Essentially, I need to knock one level off of the directory, ie go from ...e\eg\source_file to ...eg\source_file and though I am the admin, am locked from making changes. Any thoughts on how to make this change will be...
5
2186
by: Greg Strong | last post by:
Hello All, What are the best ways to implement security for Access databases (i.e. ..MDB files)? I ask the question from a general perspective. Why? Well I had written a prototype database which I split. So I thought that I'd implement security on it. The security worked great for both groups (i.e. Admins & Users), but after looking at the detail I took it a little further.
0
1254
by: Newbie | last post by:
hi all, i am doing a project which requires me to provide a security login feature. i understand that access has a user level security feature but i could not use it coz i'm tested on my ability to use existing controls. i did the login form, then it occured to me that it would be much more convenient for users to change passwords themselves without needing the administrator to change for them.
6
1968
by: google | last post by:
I have a few general questions. I am working on a new database to be used within my company. I would like to give a couple of people, particularly HR, the ability to add and delete Access users, and add/remove them to groups, so as people join and leave the company, they can be added/removed as database users at that time. However, I don't want them to have to do it through the standard Access users/groups interface, and I don't want...
27
2595
by: Scott | last post by:
I've been trying to come up with a way to ensure user input is coming from the form on my site, and not auto-submitted from elsewhere, and I don't want to use the "enter the code shown in the image" method. I know the $_SERVER contents can be spoofed, so I thought of doing something similar to this: <?php session_start(); $code = mt_rand(0,1000000); $_SESSION = $code;
15
10513
by: himilecyclist | last post by:
My State government organization has written a PHP/MySQL application which has been in production for about 6 months and has been highly successful. We are now embarking on a similar database application, but one with much higher security concerns (birth data). Prior to beginning the project, we met with an oversight committee who strongly advised against PHP and suggested Java. Their concern was that PHP could not be trusted to...
0
9579
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9422
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10035
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
9984
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9851
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8863
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
5293
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
3949
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
3
2811
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.