473,396 Members | 1,891 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Adding security to Access applications AFTER the event?

I have made a fundamental error in design and ignored security until
the end of the project. This is largely because the whole process was
a steep learning curve (helped enormously by this group) and I didn't
know when I started (and still don't really understand), how to
implement security.

I have an application in two parts:
- the first part is used by a number of people on standalone laptops
who collect information about patients. Data is exported to Excel
files and emailed to me.
- the second part (which only I have access to) imports data from the
Excel files and produces a number of complex reports.

My problems are:
- Can I now secure the first part of the program so that the data
cannot be accessed except through the program?
- Is there a simple way of encrypting the Excel files for transmission?
It would be tedious but not be too difficult for anyone to write their
own report generating program thereby removing me from the equation.
Also the data is confidential.
- Is there anything available to produce an .exe file from the Access
application?

Nov 13 '05 #1
5 1577
"DavidGeorge" <da*********@hotmail.com> wrote in
news:11**********************@l41g2000cwc.googlegr oups.com:
I have made a fundamental error in design and ignored security until
the end of the project. This is largely because the whole process was
a steep learning curve (helped enormously by this group) and I didn't
know when I started (and still don't really understand), how to
implement security.

I have an application in two parts:
- the first part is used by a number of people on standalone laptops
who collect information about patients. Data is exported to Excel
files and emailed to me.
- the second part (which only I have access to) imports data from the
Excel files and produces a number of complex reports.

My problems are:
- Can I now secure the first part of the program so that the data
cannot be accessed except through the program?
- Is there a simple way of encrypting the Excel files for transmission?
It would be tedious but not be too difficult for anyone to write their
own report generating program thereby removing me from the equation.
Also the data is confidential.
- Is there anything available to produce an .exe file from the Access
application?


Hi David,

As for the .exe route you would not be able to make an executable file
from Access.

You could add some code to Access that would run after the data is
exported to Excel:

1) Open a hidden instance of the Excel workbook

2) Hide the sheet that contains the data via VBA

3) Password protect the workbook, also via VBA

4) Save all changes and close the instance of Excel.

The code for this would reside within the Access application. To protect
the code in Access you would generate an .mde file instead of the usual
..mdb file. This compiles your code and locks it down to prevent viewing
and design changes.

In order to do this I would expect that a 'Version 2' would need to be
sent out to the users.

These are just some suggestions --- as you know there are many different
ways to do the same thing.

Hope this helps you,

strvariant
Nov 13 '05 #2
Br
In news:11**********************@l41g2000cwc.googlegr oups.com,
DavidGeorge <da*********@hotmail.com> said:
I have made a fundamental error in design and ignored security until
the end of the project. This is largely because the whole process was
a steep learning curve (helped enormously by this group) and I didn't
know when I started (and still don't really understand), how to
implement security.

I have an application in two parts:
- the first part is used by a number of people on standalone laptops
who collect information about patients. Data is exported to Excel
files and emailed to me.
- the second part (which only I have access to) imports data from the
Excel files and produces a number of complex reports.

My problems are:
- Can I now secure the first part of the program so that the data
cannot be accessed except through the program?
Mostly you can only make it harder, not impossible.

I rename the backend data files from MDB to something else. I wrote a
system that uses MDB data files (renamed) in a way similar to how a Word
document would be loaded in Word as that is how the client wanted this
application to work.

The MDB also has workgroup or password security. You could write a
routine to ZIP the data and email it to you....
- Is there a simple way of encrypting the Excel files for
transmission?
They'd still have access to the Excel file wouldn't they before it is
encrypted/emailed?

Ypud have to encrypt the data before exporting it. Then it wouldn't
matter what format you exported it to.
It would be tedious but not be too difficult for anyone
to write their own report generating program thereby removing me from
the equation. Also the data is confidential.

- Is there anything available to produce an .exe file from the Access
application?


Nope. Closest you can get to a "compiled" version is an MDE which still
requires Access.

Br@dley

Nov 13 '05 #3
Thanks strvariant and Br@dley for your ideas ... they're a great help.

I guess I'm not trying to keep the CIA out of the data; just tinkerers.
So far, I've split the database and password protected the BE and made
the FE into an MDE file. I've also tried putting an innocously-named
file somewhere on the computer and if it doesn't exist the program
exits instantly. I will be supplying the software to employees on
notebook computers so I can make sure the file exists ... if they copy
the application it seems unlikely that they would also copy the INF
(innocuously named file).

strvariant, you mentioned password protecting the workbook via VBA.
Could you give me any pointers as to how I might do this?

Br@dley, you mentioned a routine to ZIP the Excel file. If this could
be done from within VBA, immediately after the files were created then
I could delete the Excel files immediately after creation in one
seamless operation; but how? Any ideas?

In another thread someone mentioned disabling the shift key so that the
startup routine couldn't be bypassed. Does anyone know how this might
be done?

Many thanks to everyone for your help to date. It's been excellent.
I first dabbled with Access about 10 years ago but in those days,
unless you knew a friendly guru to mentor you through the process you
were stuck. It's amazing the level of help that's available nowadays
for (almost) every problem!

Regards DavidGeorge

Nov 13 '05 #4
To disable the shift key, you need to create a boolean database property
named AllowBypassKey and set its value to False. Take a look at
http://www.mvps.org/access/general/gen0040.htm at "The Access Web" for the
correct way to create this property (the example in the help file is
incomplete)

--
Doug Steele, Microsoft Access MVP
http://I.Am/DougSteele
(no e-mails, please!)

"DavidGeorge" <da*********@hotmail.com> wrote in message
news:11*********************@f14g2000cwb.googlegro ups.com...
In another thread someone mentioned disabling the shift key so that the
startup routine couldn't be bypassed. Does anyone know how this might
be done?

Nov 13 '05 #5
Br
In news:11*********************@f14g2000cwb.googlegro ups.com,
DavidGeorge <da*********@hotmail.com> said:
Thanks strvariant and Br@dley for your ideas ... they're a great help.

I guess I'm not trying to keep the CIA out of the data; just
tinkerers. So far, I've split the database and password protected the
BE and made the FE into an MDE file. I've also tried putting an
innocously-named file somewhere on the computer and if it doesn't
exist the program exits instantly. I will be supplying the software
to employees on notebook computers so I can make sure the file exists
... if they copy the application it seems unlikely that they would
also copy the INF (innocuously named file).
You can do things like renaming your files from MDB to something
else....
strvariant, you mentioned password protecting the workbook via VBA.
Could you give me any pointers as to how I might do this?
In the Tools menu of the VBA module screen... and then <your db name>
Properties.
Br@dley, you mentioned a routine to ZIP the Excel file. If this
could be done from within VBA, immediately after the files were
created then I could delete the Excel files immediately after
creation in one seamless operation; but how? Any ideas?
You'd need the ZIP DLLS and examples of how to call them. (Try a search
on Google)
In another thread someone mentioned disabling the shift key so that
the startup routine couldn't be bypassed. Does anyone know how this
might be done?


Check the database startup properties (Tools menu).

Br@dley
Nov 13 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Before we start with our sample app we need to view the security configuration files on the machine. You will find them under <drive>\WInNT\Microsoft.NET\FrameWork\<version>\Config ...
116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
20
by: Olav.NET | last post by:
I am a .NET/C++ developer who is supposed to do some work with Access. I do not know much about it except for the DB part. Questions: *1* I am looking for INTENSIVE books to get quickly up to...
3
by: ET | last post by:
I don't know whats the problem, but after I added functions to first verify, then relink linked tables if not found, now I can't convert that database to MDE format. I can split the database, but...
3
by: Jim Heavey | last post by:
Trying to figure out the technique which should be used to add rows to a datagrid. I am thinking that I would want an "Add" button on the footer, but I am not quite sure how to do that. Is that...
2
by: Ken Varn | last post by:
I need to pragmatically add events to the Win2K Event Viewer from my ASP.NET web application. What user rights are required for this? I have tried to assign "act as part of the operating system",...
4
by: Dinsdale | last post by:
I'm looking at adding scheduling features to an application and I wanted to ask the community about any experience with scheduling components, either open source like from code project or from a...
2
by: ChrisCicc | last post by:
Hi All, I got a real doozy here. I have read hundreds upon hundreds of forum posts and found numerous others who have replicated this problem, but have yet to find a solution. Through testing I have...
2
by: Ken Fine | last post by:
I want to add the security question and answer security feature to the ChangePassword control. I am aware that this functionality is built into the PasswordRecovery tool. I have implemented the...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.