473,394 Members | 1,759 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,394 software developers and data experts.

access front end

Hello,

Does anybody know if there are programs which do the following:
Act as 'front end' of a database (preferrably MS Access)
Encrypts or converts the contents of the database so that data is only
readable through the program?

Thanks,

Rolf
Utrecht, Netherlands
Nov 12 '05 #1
5 1534
Hoi Rolf

ja dat kan....

If you run Access Runtime or set it in such a way that access runtime rather
than access opens the database then you can not read the tables as such and
you will have to use the front-end to access it.

However, this is by no means security. My question is - why do you want to
know, for security or other reasons???

"RO|_F" <20************@spamgourmet.com> wrote in message
news:40*********************@reader2.nntp.hccnet.n l...
Hello,

Does anybody know if there are programs which do the following:
Act as 'front end' of a database (preferrably MS Access)
Encrypts or converts the contents of the database so that data is only
readable through the program?

Thanks,

Rolf
Utrecht, Netherlands

---
Please immediately let us know (by phone or return email) if (a) this email
contains a virus
(b) you are not the intended recipient
(c) you consider this email to be spam.
We have done our utmost to make sure that
none of the above are applicable. THANK YOU
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.688 / Virus Database: 449 - Release Date: 18/05/2004
Nov 12 '05 #2
Hi,

bedankt voor je berichtje...

It is for security, our salesreps (or competitors) may not be able to copy
or alter the database which will be stored on each persons laptop.

regards,

Rolf
Nov 12 '05 #3
This will not keep someone from using a disk read program to view the text
data. You can add encrypting code to encrypt before writing, and decrypt on
reading, but it will be your code. The encrypting Access does will prevent
someone poking around with a disk read program from seeing your text, but
anyone with Access (and necessary permissions, which your salesreps will
have to have if they are to use the database) can read an Access-encrypted
database).

I haven't seen a third-party product that automates this, but there are a
lot of third-party products around, and I don't even try to know about all
of them!

There is no way to keep someone from copying the whole database, as you will
be putting it in their hands. And, distributing with the runtime does not
keep someone with full retail Access from making a copy of the database to
use with Access. Even if you apply Access' security, it is relatively
easy/cheap to break.

For real _data security_, put the data on a server, and create a client
application to access it. While server databases aren't necessarily
foolproof (because, as they say, fools are so ingenious) they are much more
so than an Access/Jet database that you hand to someone. But that doesn't
work for beans if you need your users to carry the DB about with them on
notebook/laptop computers.

Alternative: do a good background check on those users to raise your
confidence that you can trust them.

Larry Linson
Microsoft Access MVP

"RO|_F" <10************@spamgourmet.com> wrote in message
news:40*********************@reader2.nntp.hccnet.n l...
Hi,

bedankt voor je berichtje...

It is for security, our salesreps (or competitors) may not be able to copy
or alter the database which will be stored on each persons laptop.

regards,

Rolf

Nov 13 '05 #4
To make things a little more difficult... do the following to your
back-end:
- rename it from .mdb to something else (and modify your relink code)
- add an Autoexec or startup form that will either shut the application
immediately or display a message first (if they try to open it directly
in Access)
- I think you can add a database password (but can't remember how this
effects linking?)

I reckon if MS recommends setting up a networked database as front/back
end then they should perhaps offer a .MDE-ish type "data only" file to
use for the backend.. one that only allows linking to by authorised
users and no direct access (if you choose)...... for all those with out
the resources to go to MSSQL/etc.
--
regards,

Bradley
Larry Linson wrote:
This will not keep someone from using a disk read program to view the
text data. You can add encrypting code to encrypt before writing, and
decrypt on reading, but it will be your code. The encrypting Access
does will prevent someone poking around with a disk read program from
seeing your text, but anyone with Access (and necessary permissions,
which your salesreps will have to have if they are to use the
database) can read an Access-encrypted database).

I haven't seen a third-party product that automates this, but there
are a lot of third-party products around, and I don't even try to
know about all of them!

There is no way to keep someone from copying the whole database, as
you will be putting it in their hands. And, distributing with the
runtime does not keep someone with full retail Access from making a
copy of the database to use with Access. Even if you apply Access'
security, it is relatively easy/cheap to break.

For real _data security_, put the data on a server, and create a
client application to access it. While server databases aren't
necessarily foolproof (because, as they say, fools are so ingenious)
they are much more so than an Access/Jet database that you hand to
someone. But that doesn't work for beans if you need your users to
carry the DB about with them on notebook/laptop computers.

Alternative: do a good background check on those users to raise your
confidence that you can trust them.

Larry Linson
Microsoft Access MVP

"RO|_F" <10************@spamgourmet.com> wrote in message
news:40*********************@reader2.nntp.hccnet.n l...
Hi,

bedankt voor je berichtje...

It is for security, our salesreps (or competitors) may not be able
to copy or alter the database which will be stored on each persons
laptop.

regards,

Rolf


--
regards,

Bradley
Nov 13 '05 #5
Alternative: do a good background check on those users to raise your
confidence that you can trust them.

Larry Linson
Microsoft Access MVP

Thanks for your answer. It seems to be not that easy as I thought or
expected.
Storing the database on a server is no option since people are on the
'field' . Then they would need a (expensive) dial in solution to consult the
database every time they visit a customer.

Regards,

Rolf
Nov 13 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

38
by: Remco Groot Beumer | last post by:
Hello, I'm trying to decide if the following situation would be workable: Generate an MS Access Front End (which will run localy on client computers), which will link to a DBMS (SQL server or...
2
by: Murphy | last post by:
I am new to Linux and am migrating a SQL Server DB with an Access front end to MySQL and ? What options are available under Linux for development of a client front end without copious amounts of...
14
by: D | last post by:
Hey guys- not sure where this post fits in, so I cc'd a few other groups as well- hope you dont mind... I have someone creating a database for me in Access 2000 (or is it called XP?). When it's...
16
by: sm_hall | last post by:
Hi, I manage and develop an Access 2003/SQL 2000 based system for a real estate company. It's quite extensive and has a level of Windows/Office integration. My question is this: what are the...
7
by: ddsvi78 | last post by:
I am a complete idiot when it comes to access. Now that said, I work for a computer security company and one of our customers came to us with an access problem. They had been running fine for a...
35
by: robert d via AccessMonster.com | last post by:
I was asked to provide a proposal. I provided a proposal on my application and the prospective client likes what I have but is wary of it having been developed in Access. I don't understand this...
5
by: B1ackwater | last post by:
We've fooled around with Access a bit, but only using the single-user store-bought version. It seems to be a good database - versatile and infinitely programmable - and can apparently be used as a...
5
by: Kip | last post by:
I have an office with approx 8 people. I have used Access with a Form on my personal PC for client records. I was wondering if I could put the Access table on a server and put shortcuts on each...
13
by: Owen Jenkins | last post by:
Following on from an earlier post... I can reliably corrupt a record by doing the following ... Open two separate but identical front ends on one PC each linking to the same back end. Edit a...
10
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Thank you for that. It was very...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.