473,527 Members | 2,715 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Can a MDW file which relates to a specific app be deleted?

Hi
I am a security newbie. My question is: can a MDW file which relates
to a specific MDB app be deleted by a user and thereby remove the
security from that app?
Regards
Carriolan
Dec 11 '05 #1
3 1446
Security can be removed, but deleting the MDW file alone isn't sufficient.

See section 34 of the Access Security FAQ at
http://support.microsoft.com/support...ent/secfaq.asp

--
Doug Steele, Microsoft Access MVP
http://I.Am/DougSteele
(no e-mails, please!)

<carriolan@> wrote in message
news:vl********************************@4ax.com...
Hi
I am a security newbie. My question is: can a MDW file which relates
to a specific MDB app be deleted by a user and thereby remove the
security from that app?
Regards
Carriolan

Dec 11 '05 #2
carriolan@ wrote:
Hi
I am a security newbie. My question is: can a MDW file which relates
to a specific MDB app be deleted by a user and thereby remove the
security from that app?
Regards
Carriolan


If security was done properly (often not the case), then the file will only be
accessible when using an appropriate MDW file. If there is only one appropriate
MDW file (usually the case), then deleting that MDW file would make the MDB file
totally inaccessible (except to those with security hacking tools).

--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Dec 11 '05 #3
Thanks
Carriolan

On Sun, 11 Dec 2005 12:46:38 GMT, "Rick Brandt"
<ri*********@hotmail.com> wrote:
carriolan@ wrote:
Hi
I am a security newbie. My question is: can a MDW file which relates
to a specific MDB app be deleted by a user and thereby remove the
security from that app?
Regards
Carriolan


If security was done properly (often not the case), then the file will only be
accessible when using an appropriate MDW file. If there is only one appropriate
MDW file (usually the case), then deleting that MDW file would make the MDB file
totally inaccessible (except to those with security hacking tools).

Dec 12 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
4289
by: Richard | last post by:
I have a simple C# console app that needs to read the appname.exe.config file to get db connect strings etc. from the <appSettings>. When the app starts, it deletes the file! I can't figure it out. When I set a break point on the first line in MAIN and check for the file, it is gone! This is a 4 hour app, but I have spent all day trying to...
6
5274
by: Kiran | last post by:
Hi, I have program, which opens file at the startup and logs error messages to the file, file handle is closed at the end of the program. However if file is deleted in-between, program do not report any error while writing to the open file handle. On Windows, file shows-up again in explorer and automatically deleted finally when program...
3
1985
by: facicad | last post by:
I would like to know if as event before delete file exist. My probleme is with FileSystemWatch, it is only Deleted event, and went I want copy for bakup my file, the file do not exist :(
1
3188
by: joshtichauer | last post by:
So i have an xml file, i'm grabbing it via dataset, then placing the data into a datagrid. everythings all good, but i'd like to edit the data. the coding grabs whats in the edit textboxes, and should throw it back to the xml file, but i get an error "System.UnauthorizedAccessException: Access to the path...
12
1961
by: ABN | last post by:
I have a C# (.NET 1.1) application in which I loop over a number of files on the hard drive and delete them. A few times, I've experienced an exception that says the file is in use by another process. So, my question is... Is there anyway to loop over the files and determine if the files are able to be deleted before trying to delete (so...
3
3135
by: noridotjabi | last post by:
Say I'm writting a program. In this program for some reason I need to store data somewere were I will be able to access it again. I don't want to store it in a file because then it could be deleted by another program or user. So, is there anyway to save data onto a computer so that it will not apear as a file (actually idealy not apear as...
6
2037
by: shyam | last post by:
Hi All I had raised a simillar query in an earlier post http://groups.google.com/group/comp.lang.c++/browse_thread/thread/f371af248d90ead6/1d054627402539e1?lnk=gst&q=ofstream+write+failure&rnum=1#1d054627402539e1 Basically I have a file which is opened through ofstream for writing. Now I want to check if the file has been deleted or...
5
7818
by: mmcd79 | last post by:
I built a VB.net application that makes use of a machine level DB connection string setting, and a user level starting location setting. The machine level setting and the default user based setting is of course stored in the app.exe.config file located in the same directory as the exe. Upon closing the form, I save the user setting which...
8
2204
by: Horacius ReX | last post by:
Hi, I need to write a program which reads an external text file. Each time it reads, then it needs to delete some lines, for instance from second line to 55th line. The file is really big, so what do you think is the fastest method to delete specific lines in a text file ? Thanks
0
7329
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
0
7477
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. ...
0
7604
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
1
5176
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes...
0
3317
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
0
3319
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
0
1705
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
1
890
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
551
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.