473,411 Members | 1,895 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,411 software developers and data experts.

How to secure an Access app

Hi everyone,

I'm looking for info on how to "secure" an MS Access application that I
might consider deploying in the future.

By secure, I'm really interested in anti-piracy protection that I could
build into the app to prevent the app being copied/run without my knowledge
and perhaps falling into the hands of my competitors.

For example:
1) Preventing the app from being copied from one PC to another.
2) Setting a "self destruct date" on the app, disabling features after a
certain specified date.
3) Perhaps being able to run the app from a "Live CD/USB Drive" saving data
files to the HD that are secure.

And any other suggestions you might have.

In particular, I'm looking for articles suggesting methods of doing the
above, examples of use, peoples experiences, pros and cons.

Many thanks in advance,
Scott

--
Scott

Xbox Live Gamertag: scottmorrison
Xbox Live Games: Top Spin, PGR2, RS3, RTCW, CounterStrike, Tetris
Nov 12 '05 #1
4 1604
On Tue, 2 Mar 2004 11:02:02 -0000, "Scott" <no****@nospam.com> wrote:

Near perfect protection can be achieved with a hardware dongle. I've
used this one in the past: http://www.ealaddin.com/hasp/

Depending on how much you want to annoy your users, you can also make
the software expire after a while, upon which users have to contact
you again (and send another check?) to get a new activation key.

-Tom.

Hi everyone,

I'm looking for info on how to "secure" an MS Access application that I
might consider deploying in the future.

By secure, I'm really interested in anti-piracy protection that I could
build into the app to prevent the app being copied/run without my knowledge
and perhaps falling into the hands of my competitors.

For example:
1) Preventing the app from being copied from one PC to another.
2) Setting a "self destruct date" on the app, disabling features after a
certain specified date.
3) Perhaps being able to run the app from a "Live CD/USB Drive" saving data
files to the HD that are secure.

And any other suggestions you might have.

In particular, I'm looking for articles suggesting methods of doing the
above, examples of use, peoples experiences, pros and cons.

Many thanks in advance,
Scott


Nov 12 '05 #2
Tom van Stiphout wrote:
Near perfect protection can be achieved with a hardware dongle. I've
used this one in the past: http://www.ealaddin.com/hasp/
That's really intersting. An approach I had never even considered. I'll look
into it a bit more.
I assume you have had experience of using these dongles with MS Access based
apps in particular?
Depending on how much you want to annoy your users, you can also make
the software expire after a while, upon which users have to contact
you again (and send another check?) to get a new activation key.


I was thinking about this approach. One thing I couldn't fathom was: can
people not get round "self destruct dates" by adjusting their system clock?

Many thanks

--
Scott

Xbox Live Gamertag: scottmorrison
Xbox Live Games: Top Spin, PGR2, RS3, RTCW, CounterStrike, Tetris
Nov 12 '05 #3
Tom van Stiphout wrote:
Near perfect protection can be achieved with a hardware dongle. I've
used this one in the past: http://www.ealaddin.com/hasp/


BTW, do you have any information on pricing?

TIA

--
Scott

Xbox Live Gamertag: scottmorrison
Xbox Live Games: Top Spin, PGR2, RS3, RTCW, CounterStrike, Tetris

Nov 12 '05 #4
On Tue, 2 Mar 2004 16:04:04 -0000, "Scott" <no****@nospam.com> wrote:

This was indeed for an Access 2.0 application several years back.
Contact the company for current pricing.
-Tom.

Tom van Stiphout wrote:
Near perfect protection can be achieved with a hardware dongle. I've
used this one in the past: http://www.ealaddin.com/hasp/


BTW, do you have any information on pricing?

TIA


Nov 12 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

7
by: ojorus | last post by:
Hello! I want to make a login system as secure as possible on a website I develop. * The user shall log on using a Username and a password (which is stored in a mySQL database) *The server...
6
by: Sarah Tanembaum | last post by:
I was wondering if it is possible to create a secure database system using RDBMS(MySQL, Oracle, SQL*Server, PostgreSQL etc) and web scripting/programming language(Perl, PHP, Ruby, Java, ASP, etc)...
6
by: Billy Jacobs | last post by:
I have a website which has both secure and non-secure pages. I want to uses forms authentication. How do I accomplish this? Originally I had my web.config file in the root with Forms...
1
by: jaYPee | last post by:
anyone know how can i secure / compile or make it secure just like mdb file to use a user level security? thanks in advance...
7
by: Norm | last post by:
Hi All, I have an MDB file which I want to remain secure. It checks for certain parameters upon startup, and will automatically exit if the program is opened/executed by an unauthorized user. ...
2
by: Jason Smith | last post by:
I have recently designed an application in Ms Access with the folllowing security: 1) Database is split into a front-end / backend with linked tables 2) All modules are password protected 3)...
7
by: Seth | last post by:
I have noticed that the id of my session object changes when I switch from a non-secure to a secure connection. What I'm trying to do: I have a cookie that is built on the non-secure side of...
6
by: VB Programmer | last post by:
I am creating a new ASPX web app. I would like to use MS Access, but am concerned about security. There will be alot of secure info in this db (credit cards, passwords, client info, etc...) Is...
14
by: knal | last post by:
Hi there, I'm looking for a secure login script for a sort-of-community site... (PHP, MySQL, sessions, or maybe something else ... ) I know there are a lot of scripts out there, but none of them...
3
by: zr | last post by:
Hi, Does usage of checked iterators and checked containers make code more secure? If so, can that code considered to be reasonably secure?
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.