|
by: Corey Burnett |
last post by:
I have a client that has a split database (front-end/back-end). They
are also using Access security - MDW file. The front end MDE file,
the back end MDB file, and the MDW file are all located on a shared
folder on the file server. They have two populations of users - local
and remote. *ALL* users currently get to the system via a Citrix
login. They log in to Citrix and get a Citrix desktop. Then they
start the application via a...
|
by: Freeserve |
last post by:
Not sure whether this is the right group, but I can't find anything in the
..NET groups and my apologies if this has already been covered or is
considered "off subject".
I am looking at using an Access database to hold data which will be handled
via VB.NET and I am not sure about some of the security aspects. I am going
the .NET route as part of the application involves using a Pocket PC and I
don't want part to involve deploying...
|
by: RO|_F |
last post by:
Hello,
Does anybody know if there are programs which do the following:
Act as 'front end' of a database (preferrably MS Access)
Encrypts or converts the contents of the database so that data is only
readable through the program?
Thanks,
Rolf
|
by: Jay Mack |
last post by:
Hello,
I converted an Access application that used to have a MDE front-end
(distributed to each user) with a MDB back-end on a share. It now has a
MDE front-end with linked ODBC SQL Server 2000 tables as the back-end.
Is it a bad practice to place the MDE front-end on a network share
instead of sending a copy to each user? I want to do this as a form of
cheap security, since the network share has access control on it.
Previously, the...
|
by: Brad P |
last post by:
I have a 2K database with a front end linked to a back end. I need to lock
down or secure both ends so a user can not access the raw data in tables
etc. I also need usernames and passwords for 50+ users. I've experimented
with securing the database but can't get it the way I want it. I can still
use the shift key to obtain access. Anyone have a link to a site or
something to give me a guideline as to what I can do?
Thanks
|
|
by: rdemyan via AccessMonster.com |
last post by:
I'm thinking about providing a relatively easy method for users to restore
the front end from a backup. The purpose is to allow for restoring if the
front end becomes corrupt.
Here are some particulars about my app
1) The front end is distributed as a .mde file.
2) Front end uses workgroup security
3) A separate logon form is used to actually launch the front end.
4) My app includes a backup front end form, that backups the front end...
|
by: Stephen Poley |
last post by:
Whenever anyone has a question about securing an Access database he/she
is usually referred (unsurprisingly) to the Security FAQ. This is
however incomplete/unclear with respect to databases with a separate
front-end and back-end, which is rather surprising considering that all
Access databases should be split into a separate front-end and back-end.
Noticing that there are quite a lot of questions on this subject in the
Access newsgroups...
|
by: abprules |
last post by:
Help!!! This is driving me nuts!
We have created a DB for a company. We split the DB. Everything seems
to work well except for this one thing.
Every time we refresh the front end of a user, the security file
looses all security that was set. Each user has a desktop shortcut
that they access their front end from. The front end points to the
back end that resides on a computer. The security file is there as
well.
|
by: adjo |
last post by:
I have used Access frontend with SqlServer backend combination for a
number of years. In the easy 'oldfashioned' way using DAO and odbc
linked tables. Works fine within limits.
Now I'm facing the situation where there will be a 3 base tables that
will be used constantly:
- one of the tables will grow rapidly and can become hugh (think of
'hundredthousands').
- one of the tables is a sort of 'rights table' in wich a username
determines...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|