473,472 Members | 2,184 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

Database encyrption?

I've got a database I want to sell. The potential buyers want a copy of the
database, for a trial. I'm afraid they'll copy all the modules, rename and
reformat a few forms, and call it theirs.

How can I hide all the background information while still giving them use of
the database?

Any way to disable the Shift key when opening the database?

Thanks,

Scott
Nov 12 '05 #1
6 1064
> I've got a database I want to sell. The potential buyers want a copy of the
database, for a trial. I'm afraid they'll copy all the modules, rename and
reformat a few forms, and call it theirs.


If you convert the MDB to an MDE file, there will be no access to the code or
the design of any object that can contain code.

--
Bruce M. Thompson, Microsoft Access MVP
bt******@mvps.org (See the Access FAQ at http://www.mvps.org/access)
NO Email Please. Keep all communications

within the newsgroups so that all might benefit.<<
Nov 12 '05 #2
Hi Bruce;

I tried it, I can lock out reports, forms and modules, but not tables,
queries, or relationships. I'm especially concerned about relationships.
Any ideas?

Thanks for the help!

Scott
If you convert the MDB to an MDE file, there will be no access to the code or the design of any object that can contain code.

--
Bruce M. Thompson, Microsoft Access MVP
bt******@mvps.org (See the Access FAQ at http://www.mvps.org/access)
NO Email Please. Keep all communications

within the newsgroups so that all might benefit.

Nov 12 '05 #3
I don't see how relationships are that important to protect. Anybody with a
good working knowledge of tables and normalization could re-create them (or
at least create their own that work in a similar manner). The processing and
interface, I feel, are more important to protect than the joins and storage
as these are the things that require most of your time in development.

Mike Storr
www.veraccess.com
"Scott Loupin" <Sc************************@verizon.net> wrote in message
news:HT****************@nwrddc01.gnilink.net...
Hi Bruce;

I tried it, I can lock out reports, forms and modules, but not tables,
queries, or relationships. I'm especially concerned about relationships.
Any ideas?

Thanks for the help!

Scott
If you convert the MDB to an MDE file, there will be no access to the
code or
the design of any object that can contain code.

--
Bruce M. Thompson, Microsoft Access MVP
bt******@mvps.org (See the Access FAQ at http://www.mvps.org/access)
> NO Email Please. Keep all communications

within the newsgroups so that all might benefit.


Nov 12 '05 #4

Mike,

On Fri, 30 Jan 2004 14:35:35 -0500, "Mike Storr"
<no****@somewhere.con> wrote in comp.databases.ms-access:
I don't see how relationships are that important to protect...


In general, of course, you're right.

But I suspect that as part of an effort to protect the db, the OP has
used generic field and table names. For example, tblInvoice,
tblInvoiceDetail and tblSalesperson are instead named tblA, tblB, tblC
etc. and have fields (a,b,c,d,e,f), (a,b,c,d) and (a,b,c).
Relationships show that tblA.e ties to tblC.c and tblA.c ties to
tblB.b. Obfuscation is pretty limited in effectiveness, especially if
relationships are visible. By preventing relationships from being
seen, it's not clear with the range of values in tblA.c being from
1..25 which other table it may relate to.

I'm not advocating such a setup. In fact, i think it violates all
sorts of good design principles. But its effectiveness is most
seriously hampered by relationships being visible (well, among other
things), so perhaps that's why the OP wants to protect relationships.

I just thought I'd throw it out there as a possible implementation
where something that normally has little value in terms of a security
mechanism might actually take on more prominence under a specialized
case.

Peter Miller
__________________________________________________ __________
PK Solutions -- Data Recovery for Microsoft Access/Jet/SQL
Free quotes, Guaranteed lowest prices and best results
www.pksolutions.com 1.866.FILE.FIX 1.760.476.9051
Nov 12 '05 #5
> I tried it, I can lock out reports, forms and modules, but not tables,
queries, or relationships. I'm especially concerned about relationships.
Any ideas?


Well, if you must, you can set the "AllowBypassKey" property to False with code
available in Access Help or using a utility available at Albert Kallal's web
site:

http://www.attcanada.net/~kallal.msn.../msaccess.html

Scroll down to the section titled "By Pass Shift Key Code" to find the links.

--
Bruce M. Thompson, Microsoft Access MVP
bt******@mvps.org (See the Access FAQ at http://www.mvps.org/access)
NO Email Please. Keep all communications

within the newsgroups so that all might benefit.<<
Nov 12 '05 #6
If encryption were implemented, and the obscurity of the meaning of the data
and it's relations were important, I would agree with you (eg personal info
security). But this brings in complications with maintence that I don't
think most people care to get into. Person A designs a system in order to
prevent Person B from interpreting it. Person A gets fired, or is no longer
around, and nobody understands it anymore. The documentation of the project
would need to be flawless in order for a newcomer to take over (I'm sure
that is really common too). Sometimes I think that if security is that
important, Access is not the tool to build with.
"Peter Miller" <pm*****@pksolutions.com> wrote in message
news:ba********************************@4ax.com...

Mike,

On Fri, 30 Jan 2004 14:35:35 -0500, "Mike Storr"
<no****@somewhere.con> wrote in comp.databases.ms-access:
I don't see how relationships are that important to protect...


In general, of course, you're right.

But I suspect that as part of an effort to protect the db, the OP has
used generic field and table names. For example, tblInvoice,
tblInvoiceDetail and tblSalesperson are instead named tblA, tblB, tblC
etc. and have fields (a,b,c,d,e,f), (a,b,c,d) and (a,b,c).
Relationships show that tblA.e ties to tblC.c and tblA.c ties to
tblB.b. Obfuscation is pretty limited in effectiveness, especially if
relationships are visible. By preventing relationships from being
seen, it's not clear with the range of values in tblA.c being from
1..25 which other table it may relate to.

I'm not advocating such a setup. In fact, i think it violates all
sorts of good design principles. But its effectiveness is most
seriously hampered by relationships being visible (well, among other
things), so perhaps that's why the OP wants to protect relationships.

I just thought I'd throw it out there as a possible implementation
where something that normally has little value in terms of a security
mechanism might actually take on more prominence under a specialized
case.

Peter Miller
__________________________________________________ __________
PK Solutions -- Data Recovery for Microsoft Access/Jet/SQL
Free quotes, Guaranteed lowest prices and best results
www.pksolutions.com 1.866.FILE.FIX 1.760.476.9051

Nov 12 '05 #7

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Cherrish Vaidiyan | last post by:
sir, The following are the steps that i followed in setting up standby database on Red hat Linux 9. i am using Oracle 9i. i have followed the steps in this site : ...
6
by: Marvin Libson | last post by:
Hi All: I am running DB2 UDB V7.2 with FP11. Platform is Windows 2000. I have created a java UDF and trigger. When I update my database I get the following error: SQL1224N A database...
8
by: Kamlesh | last post by:
Hi, How do I know the physical database path of a database. When I goto the DB2INSTANCE users's directory (/home/db2inst1), I see following folders: /db2inst1/NODE0000/SQL00001...
1
by: pintur | last post by:
The message is: SQL1036C Errore di I/O durante l' accesso al database. SQLSTATE=58030 what is the proble? what for restore tables? thanks
3
by: josh.kuo | last post by:
Sorry about the subject, I can't think of a better one. I recently wrote some PHP classes that I think might be of interest to this group. Since I have been reaping the benefits of reading news...
8
by: morleyc | last post by:
Hi, until recently i was quite happy to add data sources from mssql database in visual studio and drag the datasets directly onto the form this creating a directly editable form which worked well....
0
by: Jack | last post by:
Training Classes for Oracle10g, 9i, 8i Certification training in Oracle10g and 9i: DBA, Developer, Discoverer. training conducted at your location worldwide. Courseware licensing also available....
0
by: Winder | last post by:
Training Classes for Oracle10g, 9i, 8i Certification training in Oracle10g and 9i: DBA, Developer, Discoverer. training conducted at your location worldwide. Courseware licensing also available....
0
by: Laurynn | last post by:
# (ebook - pdf) - programming - mysql - php database applicati # (Ebook - Pdf)Learnkey How To Design A Database - Sql And Crystal Report # (ebook-pdf) E F Codd - Extending the Database Relational...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
1
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
1
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
0
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
0
muto222
php
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.