Hi...would please help me, how to protect my database, i donot want
anyboy else changing such as queries, forms, reports i made. I have
already set the security level but i am still doubt.
Thanks much yr help. 3 1935
On Feb 18, 11:30*pm, Idang <chae...@operam ail.comwrote:
Hi...would please help me, how to protect my database, i donot want
anyboy else changing such as queries, forms, reports i made. *I have
already set the security level but i am still doubt.
Thanks much yr help.
Convert your database in an MDE file. (Tools-Database Utilties
make .MDE file.)
On Feb 19, 9:42*am, Joost <joostsl...@gma il.comwrote:
On Feb 18, 11:30*pm, Idang <chae...@operam ail.comwrote:
Hi...would please help me, how to protect my database, i donot want
anyboy else changing such as queries, forms, reports i made. *I have
already set the security level but i am still doubt.
Thanks much yr help.
*Convert your database in an MDE file. (Tools-Database Utilties
make *.MDE file.)
but makes sure you have a copy of your original MDB first
"Joost" <jo********@gma il.comwrote
Hi...would please help me, how to protect my
database, i donot want anyboy else changing such
as queries, forms, reports i made. I have
already set the security level but i am still doubt.
Thanks much yr help.
Convert your database in an MDE file. (Tools-Database
Utilties make .MDE file.)
MDE does nothing to protect tables NOR queries.
Further, we have had reliable reports that there is third-party software
available that will re-generate a usable .MDB from an .MDE -- something long
thought to be impossible.
Still, the combination of Access' security and compiling to .MDE is as good
security as you can get for Access and the Jet DB engine. Be sure to
download the Access Security FAQ from Microsoft site, and study it
carefully -- miss one step and you can end up with a "secured" database that
is so insecure that anyone can log in, or "so secure" that even you cannot
log in.
Larry Linson
Microsoft Office Access MVP This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: YK |
last post by:
All,
What is the best way to protect IL code?
---------------------------------------------------
Typical scenario:
Visual Studio .NET 2003 includes Dotfuscator Community Edition, which intends to protect IL code. However, many .NET applications use data binding in UI forms. For example:
Employee e = new Employee();
|
by: siliconmike |
last post by:
Is there a way to protect data files from access by root ?
I have a data-centered website and would like to protect data piracy
from any foot-loose hosting company employee.
Any ideas?
Thanks
Mike
|
by: Parham |
last post by:
Hello,
How to protect structures(Tables,SP,Views and Functions) of a SQL
Server Database?(Password protect a database file)
I have a SQL database that will distribute with my application, I want
to protects it's structure from my appliction users. Only my
application can access the database.
Thanks
|
by: Frank Millman |
last post by:
Hi all
I am writing a multi-user accounting/business system. Data is stored in
a database (PostgreSQL on Linux, SQL Server on Windows). I have written
a Python program to run on the client, which uses wxPython as a gui,
and connects to the database via TCP/IP.
The client program contains all the authentication and business logic.
It has dawned on me that anyone can bypass this by modifying the
program. As it is written in Python, with...
|
by: Giganews |
last post by:
I have an Access 97 database in which I am running an Excel macro through
automation. The macro in Excel is as follows:
Worksheets("Sheet1").Protect Password:="****", DrawingObjects:=True,
Contents:=True, Scenarios:=True
When I call this macro from the database all works fine except when I
recorded the macro I deselected the "Select locked cells" option under the
"Allow all users of this worksheet to:" section but yet when I access the...
| |
by: teejayem |
last post by:
Hi,
I am new to programming with databases and was wanting some help.
Is there any way to password protect an access database and access
sent sql commands to it via vb.net code?
Any help would be much appreciated.
Thanks in advanced.
|
by: cefrancke |
last post by:
I have a few tables with sensitive user information (passwords, etc.)
and I would like to prevent someone from opening a blank database and
importing those tables.
Is there a way to "hide" or protect these tables from being linked or
imported?
TIA
|
by: jimrand |
last post by:
Hi
I want to protect an MS Access 2007 database I have created so that users cannot use anything other than the forms I have put in place. I have been able to create a login page which requires they use a password to get to the sub forms, so from that point of view I am happy.
What I have noticed however, is that I can use the built in options to hide the navigation pane and menus, but actually they're quite easy to find again if you...
|
by: mulamootil |
last post by:
Hi - I have created multiple tables and forms for a database. We are entering data into the tables using forms which in turn are linked to items on a switchboard. I would like multiple users in different departments to have access and enter data using the forms. The items on the switchboards are created for different departments and I would like to password protect each of these items so that it is accessible by respective depts. I am not...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
| |
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
| |
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |