473,414 Members | 1,729 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,414 software developers and data experts.

Booting users out of Access?

db1
I want to modify the design of some forms and do some other things
that I need to have the db opened exclusively in order to
accomplish.

Someone has Access open, but have locked their machine and left for
the day.

I assume it is this person because I right click on the .ldb file and
see there name in the security tab under users and groups.

Is there a way to boot people out and take over the DB exclusively
without damaging the data?

Thanks.

Also, does this forum have a search option?

Nov 13 '05 #1
4 1782
db1 wrote:
I want to modify the design of some forms and do some other things
that I need to have the db opened exclusively in order to
accomplish.

Someone has Access open, but have locked their machine and left for
the day.

I assume it is this person because I right click on the .ldb file and
see there name in the security tab under users and groups.

Is there a way to boot people out and take over the DB exclusively
without damaging the data?
Here's a popular solution:

http://www.datastrat.com/Download2.html - KickEmOff2K
Also, does this forum have a search option?


Yes, Google Groups.

--
'---------------
'John Mishefske
'---------------
Nov 13 '05 #2
"db1" <fa********@yahoo-dot-com.no-spam.invalid> wrote in message
news:lK********************@giganews.com...
I want to modify the design of some forms and do some other things
that I need to have the db opened exclusively in order to
accomplish.

Someone has Access open, but have locked their machine and left for
the day.

I assume it is this person because I right click on the .ldb file and
see there name in the security tab under users and groups.

Is there a way to boot people out and take over the DB exclusively
without damaging the data?

Yes there is but you have to design the feature into your app which usually
involves quite a bit of VBA code.

Also the idea of having one Access file for all objects in a multi-user
environment is a huge no-no because of the possibility of corruption. You
should have your app split into front and back ends and each user should
have their own copy of the front end. Search the help for "split database".

Regards,
Keith.
www.keithwilby.com
Nov 13 '05 #3
you're crazy.

screw MDB. use Access Data Projects. you can do things like this
easily. but you dont ever have to.

MDB is jsut too unreliable for realworld use.

Nov 13 '05 #4
Bri

aa*********@gmail.com wrote:
you're crazy.

screw MDB. use Access Data Projects. you can do things like this
easily. but you dont ever have to.

MDB is jsut too unreliable for realworld use.


Give it a rest. MDB works just fine with SQL. There are pluses and
minuses to both methods. Talking like you are here just makes you the
radical and makes you more likely to be ignored than listened to. If you
think that the specific problem can be solved with an ADP, then show us
how, don't just rant without backing up your statements.

--
Bri

Nov 13 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: aa | last post by:
Is it possible to enforce changed in php.ini without re-booting (w2k)?
2
by: Mark Reed | last post by:
Hi all, Is there any way that I can boot people out of a front end so that I can do work on the backend which I need to have exclusive access to. Due to an application I have used to keep the...
3
by: yogesh | last post by:
I have compiled kernel 2.4.18 . I have followed the following sequence ... as make mrproper make xconfig make dep make make modules make modules_install then copied system.map and bzimage to...
5
by: shahoo | last post by:
Hi there everyone .I have a problem: I want to run my C/C++ program on a PC with no operating system.I mean a boot programm written in C/C++.How should I do that ?
1
by: Muralish | last post by:
Anyone please explain the booting procedure of windows and linux and also in general about operating system..
6
by: purpledawg | last post by:
i have a celeron d 330 processor, and i was troubleshooting another pc. I took out the ram and put it in the other pc, then put the ram back into the first pc. Now it wont boot, its like the cpu isnt...
1
by: mamoon | last post by:
I am using RHEL4. Last time while booting it shows "repair filesystem". i have used in this way sda1,sda2 and others are ok. BUT when i run this command on sda7 (which is mounted on root) it...
5
by: sakthikumarb | last post by:
Hi, How can i get event for remote host is booting up,there is any wmi mechanism for the same.if not,what is the other procedure to get a event for remote host bootup/startup time . Thanks...
1
by: siddhartha92k | last post by:
sir, please tell me how can we write your name in the place of point which is shown at booting time, just i want to tell you that i saw a pc which starts with windows xp and normally 3 smalls points...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.