473,395 Members | 1,975 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Running in Runtime

Hi,
I am distributing an access database to systems that all have office
installed on them. Is there any way to force this database to run in
runtime mode - other than the /runtime switch? Are there any security
advantages to doing this?
Thanks

P.S. How do I keep my email address from showing up for all the
junkmailers?

Nov 13 '05 #1
4 2851
Pachydermitis wrote:
Hi,
I am distributing an access database to systems that all have office
installed on them. Is there any way to force this database to run in
runtime mode - other than the /runtime switch? Are there any security
advantages to doing this?
Thanks

P.S. How do I keep my email address from showing up for all the
junkmailers?


You can use the following to check if it is running in the runtime and exit the
app with a message if it's not.

syscmd(acSysCmdRuntime)

That will return True when in runtime mode.

The runtime automatically prohibits access to the db window and disables all
built in command bars, but I don't think achieving that with the /Runtime switch
is an more secure than simply unchecking those options in Startup and disabling
Access Special Keys and the bypass key since the above suggestion to "force"
Runtime mode relies on the user not holding shift to start the app anyway.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com

Nov 13 '05 #2
> runtime mode - other than the /runtime switch? Are there any security
advantages to doing this?


Well, when you use the runtime switch, you do NOT see the ms-access menu bar
while you application loads, and THEN your custom menu bars etc show. So,
use of the runtime switch prevents users from every seeing the ms-access
tool/menu bars appear for a short time while your application loads. In
addition, with the runtime switch, users will NEVER see the ms-access ICON
appear in the application, (and again, then your icon appears AFTER the
startup stuff has completed). Further, use of the runtime switch also
disables the shift key by-pass.

So, there is a number of behaviors that are more desirable when you use the
runtime switch..
--
Albert D. Kallal (Access MVP)
Edmonton, Alberta Canada
pl*****************@msn.com
http://www.members.shaw.ca/AlbertKallal
Nov 14 '05 #3
On a related note if you're interested you could distribute an .mde
file which is the same as the .mdb file except that design mode is
removed from everything but tables, queries, and macros.

(Tools | Database Utilities | Make MDE File)

Best regards,
J. Paul Schmidt, Freelance Web and Database Developer
http://www.Bullschmidt.com
Access Database Sample, Web Database Sample, ASP Design Tips
I am distributing an access database to systems that all have office
installed on them.


Nov 14 '05 #4
Thank you all for the runtime tips. It sounds like it doesn't do
anything that I can't already do in other ways.

Nov 15 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: James-D-Bloom | last post by:
I have developed a fully open source & free application that can alter (or simulate the affect of altering) loaded Java classes at runtime. This means you can change a program at runtime without...
8
by: nickdu | last post by:
I'm trying to isolate "applications" into their own application domain within a single process. I've quoted applications because it's a logical representation of an application. Basically it...
3
by: Patrick Fisher | last post by:
What are the implications of running a MS-Access BE and an SQL-Server BE on the same Terminal Server? Assuming that the TS can handle the load are there any other issues? Thanks Patrick
4
by: Randy | last post by:
Hi, ok, I found a way to connect to a running instance of an (external) Internet Explorer and access - for example - the html source. That works fine! But now I have running application with...
3
by: | last post by:
I am working on a web/webservice application that has a service layer. Most service methods will perform an access-check before executing. This check uses the IPrincipal credentials available in...
9
by: Michael.Suarez | last post by:
Suppose I have a program that prompts you with a dialogbox to enter a password. If you get the password correct, it allows you into the program, else it kills the program. Suppose that when I...
3
by: KaNos | last post by:
Hello, I'm programming an C# application which uses Automation. The problem is when I quit the application a ghost of excel is always running (Can be seen in all processes with th task manager)....
4
by: David | last post by:
Is the Development Server part of the .net 2x runtime package or installed with one installs VS 2005? I wish to run a small web app on a machine, with the runtime installed, and need to know if I...
4
by: =?Utf-8?B?UGhpbGlwIEs=?= | last post by:
Simplifying the code a bit its like this: try { myRemotingObj.Myfunction(string, string,string,string,timeSpan) } catch(WebException) { commsUp = false; }
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.