473,487 Members | 2,483 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

Viewing Data Access Pages (DAP) - Internet Explorer Protecting Your Security

I am developing some Data Access Pages (DAP) using Microsoft Access
2003 on Microsoft Windows XP.

When I try to open these pages (located on my C: drive), the display of
the data access page is blocked and I receive the following error
message in the Information Bar in Microsoft Internet Explorer:

"To help protect your security, Internet Explorer has restricted this
site from showing certain content. Click here for options."

I can then click on the Information Bar to Allow Blocked Content, and
everything works just fine - but it gets a little annoying after a
while. Any idea how to stop this happening when I try and deploy these
data access pages for my users?

Nov 13 '05 #1
10 3133
Edlueze wrote:
I am developing some Data Access Pages (DAP) using Microsoft Access
2003 on Microsoft Windows XP.

When I try to open these pages (located on my C: drive), the display of
the data access page is blocked and I receive the following error
message in the Information Bar in Microsoft Internet Explorer:

"To help protect your security, Internet Explorer has restricted this
site from showing certain content. Click here for options."

I can then click on the Information Bar to Allow Blocked Content, and
everything works just fine - but it gets a little annoying after a
while. Any idea how to stop this happening when I try and deploy these
data access pages for my users?


Not really, it's a security feature. When you can leave your car in the
street with the keys in the ignition and not have it taken, then MS will
remove that block :-)

The only way to completely avoid it is to write a real web application.
Nov 13 '05 #2
I've never had this problem. If I did I would explore "calling" the
DAPS from an HTA.

MSDN says this about HTAs.

"Your application is fully trusted and free from the restrictions
placed on Web pages for security reasons. Unlike Web pages, which run
when visited, users will need to trust your HTA; however, once
installed and run, your HTA can potentially do anything any program
can"

I have been successful in opening HTM files (DAPs are HTM files) from
within an HTA.

HTAs are introduced at
http://msdn.microsoft.com/library/de...tml/ie5hta.asp

Nov 13 '05 #3
Thanks for the tips! HTA's were new to me and quite interesting to read
about.

Nov 13 '05 #4
Have you tried this:

"Allow active content to run in files on My Computer - Windows XP
Service Pack 2"

http://www.winxptutor.com/lmzunlock.htm
Edlueze wrote:
I am developing some Data Access Pages (DAP) using Microsoft Access
2003 on Microsoft Windows XP.

When I try to open these pages (located on my C: drive), the display of
the data access page is blocked and I receive the following error
message in the Information Bar in Microsoft Internet Explorer:

"To help protect your security, Internet Explorer has restricted this
site from showing certain content. Click here for options."

I can then click on the Information Bar to Allow Blocked Content, and
everything works just fine - but it gets a little annoying after a
while. Any idea how to stop this happening when I try and deploy these
data access pages for my users?

Nov 13 '05 #5
"Edlueze" <ed*****@onegen.com> wrote in
news:11*********************@o13g2000cwo.googlegro ups.com:
Thanks for the tips! HTA's were new to me and quite interesting to
read about.


As a standard practice, I disable the HTA file assocation on every
workstation I sit down at, because it's an excellent way for hackers
to do nasty things to your computer. I also disable the default VBS
associations (though leaving WSH available for calling explicitly).
There have been viruses/worms distributed as HTAs, just as there
have been VBS viruses/worms, and that's why I disable it.

It's a Microsoft-only technology and works only in IE, which is
naither reason not to use it, since it hardwires your app to the
most insecure and poorly designed web browser available anywhere.

--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
Nov 13 '05 #6
"David W. Fenton" <dX********@bway.net.invalid> wrote in
news:Xn*********************************@216.196.9 7.142:
"Edlueze" <ed*****@onegen.com> wrote in
news:11*********************@o13g2000cwo.googlegro ups.com:
Thanks for the tips! HTA's were new to me and quite interesting to
read about.


As a standard practice, I disable the HTA file assocation on every
workstation I sit down at, because it's an excellent way for hackers
to do nasty things to your computer. I also disable the default VBS
associations (though leaving WSH available for calling explicitly).
There have been viruses/worms distributed as HTAs, just as there
have been VBS viruses/worms, and that's why I disable it.

It's a Microsoft-only technology and works only in IE, which is
naither reason not to use it, since it hardwires your app to the
most insecure and poorly designed web browser available anywhere.


If you want expert advice about something from someone who knows nothing
about it and who has never used it and therefore MUST denigrate it, then
David is your expert of choice.

Nov 13 '05 #7
If you want to know everything about a technology from someone who
knows nothing about it then David is certainly your expert of choice.

Nov 13 '05 #8
Lyle Fairfield wrote:
It's a Microsoft-only technology and works only in IE, which is
naither reason not to use it, since it hardwires your app to the
most insecure and poorly designed web browser available anywhere.

If you want expert advice about something from someone who knows nothing
about it and who has never used it and therefore MUST denigrate it, then
David is your expert of choice.


I don't know much about HTAs and DAPs but David is not wrong about IE
being insecure.
Nov 13 '05 #9
Trevor Best wrote:
I don't know much about HTAs and DAPs ....
It seems so. Perhaps you could read:
http://msdn.microsoft.com/workshop/a...w.asp#Security
but David is not wrong about IE being insecure.


I agree. IE can be an insecure program with which to browse or interact
with the Internet. But when IE hosts an HTA it's not browsing or
interacting with the Internet. An executable which requires components
of IE is running; this executable (HTA) is no more and no less dangerous
than any other executable.

HTAs can be deployed as packages, over the web or in combination of the
two. Packages are my preferred deployment method. If you read this you
will note that IE does not have to connect to the Internet at all to run
a local HTA.

"The Package Model

In the package deployment model, the installation process for the HTA is
the same as for traditional applications. Files are copied from disk or
over a network, using any installer or self-extracting executable. The
installer places the application in the Program Files directory or in
the directory selected by the user. A link to the HTA is included in the
Start menu. And the application's dependency on Internet Explorer 5 or
greater is registered. This way the user is warned that uninstalling
Internet Explorer will disable that application. Look to tools vendors
for vehicles for packaging and delivering HTAs to your specifications.

Like the Web model, the package model has points in its favor. The user
is prompted only during the initial installation about trusting the
application; thereafter, the application runs as trusted code just as an
..exe does. Also, the installed HTA is always available to users, whether
they are connected to the server or not."

When a web manifestation of an HTA is run, all IE is connecting for is
to download the latest file update.

Nov 13 '05 #10
Lyle Fairfield <ly******@aol.com> wrote in
news:Xn****************************@216.221.81.119 :
"David W. Fenton" <dX********@bway.net.invalid> wrote in
news:Xn*********************************@216.196.9 7.142:
"Edlueze" <ed*****@onegen.com> wrote in
news:11*********************@o13g2000cwo.googlegro ups.com:
Thanks for the tips! HTA's were new to me and quite interesting
to read about.
As a standard practice, I disable the HTA file assocation on
every workstation I sit down at, because it's an excellent way
for hackers to do nasty things to your computer. I also disable
the default VBS associations (though leaving WSH available for
calling explicitly). There have been viruses/worms distributed as HTAs, just as there have been VBS viruses/worms, and that's why I disable it.

It's a Microsoft-only technology and works only in IE, which is
naither reason not to use it, since it hardwires your app to the
most insecure and poorly designed web browser available

anywhere.
If you want expert advice about something from someone who knows
nothing about it and who has never used it and therefore MUST
denigrate it, then David is your expert of choice.


Well, since you know all things, why don't you point out exactly
which parts of what I said are incorrect.

Please provide documentation.

Peronslly, I don't use the same technologies that hackers use to
compromise people's systems. My reason for that is that I don't
want
people mistaking my work for a virus or worm.

You obviously don't care about that.

But you haven't demonstrated that anything I"ve said about HTSs is
wrong.

--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
Nov 13 '05 #11

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
1649
by: rcmail14872 | last post by:
I created a simple Data Access Page and it views fine in Internet Explorer 5.5 on my PC. But when I try to view it on my Pocket PC running Pocket PC 2002 operating system, I get the error message...
1
1843
by: Bob Alston | last post by:
Anyone able to do this with Access created Data Access Pages, using UseRemoteProvider parm on DAP and getting RDS configured properly on the server so the DAP's activeX can access the database on...
2
5817
by: carrionk | last post by:
Hi, Which are the options for publishing access information over an Intranet? Besides ADPs, are there any programs I can use for letting people use Forms of an Access DB inside IE? I've been...
3
3479
by: Lyle Fairfield | last post by:
In a recent thread there has been discussion about Data Access Pages. It has been suggested that they are not permitted on many or most secure sites. Perhaps, that it is so, although I know of no...
2
1764
by: Bob Alston | last post by:
Anyone out there successfully deployed Data Access Pages, on a server they do not control, using RDS in a 3-tier environment? If so I would like to hear about your success. From my reading, RDS...
2
416
by: NoEd | last post by:
Hello, I am looking for some advice on whether to use Data Access Pages. Basically they will be used on a organization's intranet. The pages will be a simple survey, about 20-40 questions,...
5
1428
by: axsprog | last post by:
I am quite skilled with Access, VBQ, ADo, etc. but to I can no longer ignore the demands from clients to provide WEB enabled forms for their data - so hence I have begun to develop DAP's for some....
1
383
by: brino | last post by:
hi all ! i have a database working on my website. i have designed forms to input data & do searchs with MS Frontpage & they work great. however i need to be able to edit some data so i designed...
3
1691
by: tom.youdan | last post by:
Hi, I have created a database that is used to store contact information for NGO's accross India. It is simple in structure and I want a portion of the data to be viewable on the Internet. I...
0
6967
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
7142
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
7181
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
1
6847
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
1
4875
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
3078
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
0
3071
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
0
1383
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated ...
0
272
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.