473,395 Members | 1,863 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Database Held Hostage!

My situation is as follows:

A terminated employee is preventing my client from getting their data.

An MS Access 2000 database, split into FE & BE.

The FE is a compiled (MDE) file with no source code available.

The BE is an un-compiled (MDB) file that is encrypted and password
protected; the password is not known.

The client is only interested in the actual data, so the FR is
irrelevant at this point.

Is there any way to break the encryption/password protection on the BE
so the data can be extracted?
Nov 13 '05 #1
3 1153
Do a Google search for

Access +password

You should find several utilities that will do this for you.

--
Wayne Morgan
Microsoft Access MVP
"Todd D. Levy" <us**************@spamex.com> wrote in message
news:MP************************@nyc.news.speakeasy .net...
My situation is as follows:

A terminated employee is preventing my client from getting their data.

An MS Access 2000 database, split into FE & BE.

The FE is a compiled (MDE) file with no source code available.

The BE is an un-compiled (MDB) file that is encrypted and password
protected; the password is not known.

The client is only interested in the actual data, so the FR is
irrelevant at this point.

Is there any way to break the encryption/password protection on the BE
so the data can be extracted?

Nov 13 '05 #2
Todd D. Levy wrote:
My situation is as follows:

A terminated employee is preventing my client from getting their data.

An MS Access 2000 database, split into FE & BE.

The FE is a compiled (MDE) file with no source code available.

The BE is an un-compiled (MDB) file that is encrypted and password
protected; the password is not known.

The client is only interested in the actual data, so the FR is
irrelevant at this point.

Is there any way to break the encryption/password protection on the BE
so the data can be extracted?


I have several "tools" that will allow access. Will some searching you
can find them on the net.
--
regards,

Bradley
Nov 13 '05 #3
And, although it is not now an issue, much of the information about the
forms and reports can be retrieved programmatically from the MDE, all the
property values, including the RecordSource, and the property values for the
Fields they contain, as well -- I do not know of any software, however, that
can regenerate source from the "compiled" tokenized code because much of the
information no longer exists in the tokenized code.

But, an experienced Access developer can probably re-create the forms (and
the entire front end) rather quickly, once you have the data available.

BTW, unless the terminated employee has "rights in data" to the database,
legal action can be taken against him/her. If he/she does own the database,
then he/she can take legal action against whoever breaks security. It would
be best for you / your client to get sound legal advice before proceeding,
in any case.

Larry Linson
Microsoft Access MVP

"Todd D. Levy" <us**************@spamex.com> wrote in message
news:MP************************@nyc.news.speakeasy .net...
My situation is as follows:

A terminated employee is preventing my client from getting their data.

An MS Access 2000 database, split into FE & BE.

The FE is a compiled (MDE) file with no source code available.

The BE is an un-compiled (MDB) file that is encrypted and password
protected; the password is not known.

The client is only interested in the actual data, so the FR is
irrelevant at this point.

Is there any way to break the encryption/password protection on the BE
so the data can be extracted?

Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

10
by: florian | last post by:
Hi, we have a contention problem because of an application which tries to insert a duplicate row in a table with primary key. This insert fails of course but the locks are not released within...
4
by: paula.livingstone | last post by:
Hi folks, Hoping somebody can help me here with what is probably a fairly easy question. I have decided to create a database for a load of stock which I have to manage in my office as opposed to...
3
by: Daniel M | last post by:
I'm building a medium-scale data-entry web application, which involves creating data entry forms, record listings and detail screens for lots of database tables. Rather than designing a series...
1
by: Top Poster | last post by:
Hi all, I am trying to work out how I can use impersonation to connect to an Oracle 9i database such that I can avoid sending a clear text username and password to the Oracle server. We are...
1
by: BStrick | last post by:
I would like to know what may be the "Best" way to approach with problem. I have an application that I created to transfers data dynamically from an unknown source (ie maybe Excel, Access, XML,...
1
by: shenanwei | last post by:
I have db2 v8.2.5 on AIX V5.3 with all the switches on Buffer pool (DFT_MON_BUFPOOL) = ON Lock (DFT_MON_LOCK) = ON Sort ...
15
by: chaseexchange | last post by:
First, a brief explanation of why this has happened. I purchased, what I thought, was a fully functional program written in Access last year from a local programmer. This program was to be used as...
1
by: davidwelli | last post by:
Hello, I have a Access 200 format database that contains contact details and a picture for each record. The contact details are held in one table and the images are held in another as OLE...
0
by: =?Utf-8?B?S2V2aW4=?= | last post by:
Hi, I'm looking for the best way of syncronising the data from a hand held barcode scanner to a database on one of our servers. The data on the hand held is held in a CE database .SDF format....
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.