473,809 Members | 2,724 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Protect my database

Hi...would please help me, how to protect my database, i donot want
anyboy else changing such as queries, forms, reports i made. I have
already set the security level but i am still doubt.
Thanks much yr help.
Feb 19 '08 #1
3 1935
On Feb 18, 11:30*pm, Idang <chae...@operam ail.comwrote:
Hi...would please help me, how to protect my database, i donot want
anyboy else changing such as queries, forms, reports i made. *I have
already set the security level but i am still doubt.
Thanks much yr help.
Convert your database in an MDE file. (Tools-Database Utilties
make .MDE file.)
Feb 19 '08 #2
On Feb 19, 9:42*am, Joost <joostsl...@gma il.comwrote:
On Feb 18, 11:30*pm, Idang <chae...@operam ail.comwrote:
Hi...would please help me, how to protect my database, i donot want
anyboy else changing such as queries, forms, reports i made. *I have
already set the security level but i am still doubt.
Thanks much yr help.

*Convert your database in an MDE file. (Tools-Database Utilties
make *.MDE file.)
but makes sure you have a copy of your original MDB first
Feb 19 '08 #3
"Joost" <jo********@gma il.comwrote
Hi...would please help me, how to protect my
database, i donot want anyboy else changing such
as queries, forms, reports i made. I have
already set the security level but i am still doubt.
Thanks much yr help.
Convert your database in an MDE file. (Tools-Database
Utilties make .MDE file.)
MDE does nothing to protect tables NOR queries.

Further, we have had reliable reports that there is third-party software
available that will re-generate a usable .MDB from an .MDE -- something long
thought to be impossible.

Still, the combination of Access' security and compiling to .MDE is as good
security as you can get for Access and the Jet DB engine. Be sure to
download the Access Security FAQ from Microsoft site, and study it
carefully -- miss one step and you can end up with a "secured" database that
is so insecure that anyone can log in, or "so secure" that even you cannot
log in.

Larry Linson
Microsoft Office Access MVP

Feb 19 '08 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
384
by: YK | last post by:
All, What is the best way to protect IL code? --------------------------------------------------- Typical scenario: Visual Studio .NET 2003 includes Dotfuscator Community Edition, which intends to protect IL code. However, many .NET applications use data binding in UI forms. For example: Employee e = new Employee();
11
3372
by: siliconmike | last post by:
Is there a way to protect data files from access by root ? I have a data-centered website and would like to protect data piracy from any foot-loose hosting company employee. Any ideas? Thanks Mike
3
14001
by: Parham | last post by:
Hello, How to protect structures(Tables,SP,Views and Functions) of a SQL Server Database?(Password protect a database file) I have a SQL database that will distribute with my application, I want to protects it's structure from my appliction users. Only my application can access the database. Thanks
29
2787
by: Frank Millman | last post by:
Hi all I am writing a multi-user accounting/business system. Data is stored in a database (PostgreSQL on Linux, SQL Server on Windows). I have written a Python program to run on the client, which uses wxPython as a gui, and connects to the database via TCP/IP. The client program contains all the authentication and business logic. It has dawned on me that anyone can bypass this by modifying the program. As it is written in Python, with...
1
4566
by: Giganews | last post by:
I have an Access 97 database in which I am running an Excel macro through automation. The macro in Excel is as follows: Worksheets("Sheet1").Protect Password:="****", DrawingObjects:=True, Contents:=True, Scenarios:=True When I call this macro from the database all works fine except when I recorded the macro I deselected the "Select locked cells" option under the "Allow all users of this worksheet to:" section but yet when I access the...
22
5835
by: teejayem | last post by:
Hi, I am new to programming with databases and was wanting some help. Is there any way to password protect an access database and access sent sql commands to it via vb.net code? Any help would be much appreciated. Thanks in advanced.
7
5102
by: cefrancke | last post by:
I have a few tables with sensitive user information (passwords, etc.) and I would like to prevent someone from opening a blank database and importing those tables. Is there a way to "hide" or protect these tables from being linked or imported? TIA
3
2985
by: jimrand | last post by:
Hi I want to protect an MS Access 2007 database I have created so that users cannot use anything other than the forms I have put in place. I have been able to create a login page which requires they use a password to get to the sub forms, so from that point of view I am happy. What I have noticed however, is that I can use the built in options to hide the navigation pane and menus, but actually they're quite easy to find again if you...
10
13443
by: mulamootil | last post by:
Hi - I have created multiple tables and forms for a database. We are entering data into the tables using forms which in turn are linked to items on a switchboard. I would like multiple users in different departments to have access and enter data using the forms. The items on the switchboards are created for different departments and I would like to password protect each of these items so that it is accessible by respective depts. I am not...
0
10633
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10376
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
10114
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9198
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7651
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6880
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5548
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4331
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3860
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.