I'm trying to put a link on a database form, but access keeps throwing a warning message when I click it:
"A potential security concern has been identified,
this location may be unsafe."
The help mentions unchecking an option in the trust center, but the option isn't listed for me. The link points at a directory in a subfolder of the database's folder, which is listed as a trusted site along with its subdirectories.
Any suggestions?
Jan 29 '08
17 86553 mshmyob 904
Recognized Expert Contributor
Try this:
In Registry Editor, locate the following registry subkey: HKEY_CURRENT_US ER\Software\Mic rosoft\Office\1 2.0\Common
1. Click the registry subkey, point to New on the Edit menu, and then click Key.
2. Type Security, and then press ENTER to name the key.
3. On the Edit menu, point to New, and then click DWORD Value.
4. Type DisableHyperlin kWarning, and then press ENTER to name the entry.
5. In the right pane, right-click DisableHyperlin kWarning, and then click Modify.
6. In the Edit DWORD Value dialog box, click Decimal, and then type 1 under Value data.
Note A value of 0 enables the hyperlink warning message. A value of 1 disables the hyperlink warning message.
7. Click OK.
8. Exit Registry Editor.
I'm running XP, and the code is in there with no spaces.
I have Access installed separately (no other office apps), if that makes a difference.
Here's a screenshot from regedit: http://www.oyis.org/screenshotRegedit.png Thanks MSHMYOB, It works for me. OS. Windows XP (Portuguese/Japanese)
ACCESS RUNTIME 2007
Adding in windows registry:
Code: ( text )
REGEDIT4
[HKEY_CURRENT_US ER\Software\Mic rosoft\Office\1 2.0\Access\Secu rity]
"VBAWarnings"=d word:00000001 Thanks a lot.
Anderson mshmyob 904
Recognized Expert Contributor
You're welcome........ .. Thanks MSHMYOB, It works for me. OS. Windows XP (Portuguese/Japanese)
ACCESS RUNTIME 2007
Adding in windows registry:
Code: ( text )
REGEDIT4
[HKEY_CURRENT_US ER\Software\Mic rosoft\Office\1 2.0\Access\Secu rity]
"VBAWarnings"=d word:00000001 Thanks a lot.
Anderson
Works for me too, thanks!
I have win XP SP3. i created the registry file with the 3 lines of code and then double-clicked the file. I received a message saying that the registry was successfully updated. and now my applications running on Access 2007 runtime no longer display the Security Notice dialog box. Thanks for all your help!
mshmyob 904
Recognized Expert Contributor
You are welcome. It is always nice to see that older posts are still helpful to users.
cheers,
Thanks mshmyob. I have just signed on to say that. New security key method works for Office 10 Access (Office\12.0 in registry) also. Unfortunately, the user still has three clicks to wade through in IE as my html help files are so dangerous.
Cheers
mshmyob 904
Recognized Expert Contributor
LOL - glad it worked for you. Got to watch out for those nasty help files.
cheers,
Sign in to post your reply or Sign up for a free account.
Similar topics |
by: Pola |
last post by:
Please Help
I am using VC++.NET
In my appl I have to disable access to some disks in the network
How I can do it
thank you
Pol
|
by: Mike MacSween |
last post by:
Further to 'Security - more complex than I thought'
Has anybody ever seen any studies? Or anecdotal evidence? Done any studies
themselves? Done any lab testing - you know - 10 users asked to get past
Access (or other) security?
It'd be interesting to know. And no, I don't have any prejudices.
Yours, Mike MacSween
|
by: Will |
last post by:
I am looking at using a table with user names, passwords and user rights,
which I would administer. I have read a lot about the shortfalls of this
and the lack of security but the customer does not wish to use Access
security and what they are more focused on is a solution for when a user
performs a critical action the system can verify that it is actually that
user, e.g. Checks User Name and Password in a table in place of just
selecting...
|
by: mar10 |
last post by:
I'm working on a database for a local business that requires
different security for different individuals. There is one PC at the
front desk and several individuals will be working with the database
throughout the day. I haven't worked with the Access Security
wizard but have this question - will different individuals be able to
sign on and off of the database on this PC without logging on to the PC
itself? That is to say, will the...
|
by: Greg Strong |
last post by:
Hello All,
What are the best ways to implement security for Access databases (i.e.
..MDB files)?
I ask the question from a general perspective. Why? Well I had written
a prototype database which I split. So I thought that I'd implement
security on it. The security worked great for both groups (i.e. Admins
& Users), but after looking at the detail I took it a little further.
| |
by: Namratha Shah \(Nasha\) |
last post by:
Hey Guys,
Today we are going to look at Code Access Security.
Code access security is a feature of .NET that manages code depending on its
trust level. If the CLS trusts the code enough to allow it ro run then it
will execute, the code execution depends on the permission provided to the
assembly. If the code is not trusted wnough to run or it attempts to perform
an action which doe not have the required permissions then its execution...
|
by: John |
last post by:
Hi,
I know, this question was posted a year ago (link below).
I wonder whether Microsoft changed it's mind and
fixed check_stack pragma to disable buffer security
for a single function.
I would hate to disable the security for the whole project
(or module) because of a single function.
Thank you
|
by: Jeremy S. |
last post by:
..NET's code Access Security enables administrators to restrict the types of
things that a .NET application can do on a local computer. For example, a
..NET Windows Forms application can be prevented from writing to the Registry
or writing a file to the local disk.
My question: Is this feature unique to .NET? Or is it just as easy for
enterprise network administrators to prevent COM applications from writing
to the Registry and doing...
|
by: thebarefootnation |
last post by:
Hi,
I have created an access db that I would like to secure.
The database will exist on a shared drive and be used at a number of
different locations hence the reason to secure the database.
The users of the database also use other databases therefore I want to
secure this database without using the wizard so it does not effect
their other databases.
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
| |
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
| |
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |