473,399 Members | 2,858 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,399 software developers and data experts.

Securing a Backend

G'day, The derivation of a (commercially valuable) relational schema has
taken me a considerable amount of time. Now I want to secure the design in
a client server environment. Hence to my question: How have developers
successfully prevented access to their data tables and protected their
database design?

Looking forward to some suggestions.
Tony
Nov 13 '05 #1
4 1379
On Wed, 25 Aug 2004 01:02:23 GMT, "Tony" <ri*********@hotmail.com>
wrote:

Access (better: Jet) is not a client/server database.
To secure a Jet database you have to understand there are cheap
password crackers available. If you are not too concerned with them,
then download, study, and fully understand the Access Security FAQ
from microsoft.com. You'll learn that it is indeed possible to
disallow anyone but your application access to the back-end tables.

Personally I would not put too much value on a database design. The
commercial value is likely not in the db design, but in the
application using it. Keep the db open for your clients to access it
as well, to create ad-hoc reports etc.

-Tom.

G'day, The derivation of a (commercially valuable) relational schema has
taken me a considerable amount of time. Now I want to secure the design in
a client server environment. Hence to my question: How have developers
successfully prevented access to their data tables and protected their
database design?

Looking forward to some suggestions.
Tony


Nov 13 '05 #2
"Tony" <ri*********@hotmail.com> wrote:
How have developers
successfully prevented access to their data tables and protected their
database design?


*First* read and understand this:

<http://support.microsoft.com/default...access%2fconte
nt%2fsecfaq.asp>

You can then deny user access to your tables if you base all of your forms
& reports on queries with 'owner' access. Of course you can also hide the
db windoow and close the 'back door' methods of unhiding it.

You can also check out my step-by-step example on securing an Access app on
my web site (there's all sorts of junk on there, use the LH nav panel to
navigate to the Access area).

Regards,
Keith.
www.keithwilby.org.uk
Nov 13 '05 #3

"Keith Wilby" <ke*********@AwayWithYerCrap.com> wrote in message
news:Xn************************@10.15.188.42...
Regards,
Keith.
www.keithwilby.org.uk

Keith--

Is that a naked picture of you on your Web site, or do I need to adjust my
color?

--JW
Nov 13 '05 #4
"John Wilde" <wi******@hotmail.com> wrote:
Keith--

Is that a naked picture of you on your Web site, or do I need to adjust
my color?


Erm, adjust your colour, the picture may be naked but I'm not ;-) I've been
meaning to change that photo for a while. It was taken on holiday in
Florida and I can assure you I have shorts on!
Nov 13 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

17
by: David McNab | last post by:
Hi, I'm writing a web app framework which stores pickles in client cookies. The obvious security risk is that some 5cr1p7 X1ddi35 will inevitably try tampering with the cookie and malforming...
2
by: James | last post by:
What's the best way of securing online databases and web services? At present I am using a database password, which of course is not hard-coded into the web service, but this means re-submitting it...
7
by: Andy | last post by:
Hi ! I split a simple Access2K database ( shared on network )and placed the files thusly : x:\app\frontend.mdb x:\app\back\backend.mdb Problem : I once read an article that laid out a...
11
by: Wm. Scott Miller | last post by:
Hello all! We are building applications here and have hashing algorithms to secure secrets (e.g passwords) by producing one way hashes. Now, I've read alot and I've followed most of the advice...
1
by: Mark Goosen | last post by:
Hi ive installed wse 2.0 SP3 and was running throught the demo downlaoded on the Securing the Username Token with WSE 2.0 page the Securing the Username Token with WSE 2.0. Im spose to change...
4
by: Brad P | last post by:
I have a 2K database with a front end linked to a back end. I need to lock down or secure both ends so a user can not access the raw data in tables etc. I also need usernames and passwords for 50+...
1
by: gwise | last post by:
Hi, I'm somewhat new to Access but have created a database that multiple people are using and I am now looking for a way to secure it. I'm using Access 2007 and have a frontend and backend setup....
2
by: Drew | last post by:
I have been working on internal, intranet apps in the past few years, so I haven't needed to secure apps with a login/password and sessions like I did 8 or so years ago (I use Windows Auth now,...
10
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Thank you for that. It was very...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.