473,405 Members | 2,294 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,405 software developers and data experts.

Removing security from Access 2002 db

10
I have inherited a db at my workplace which has security on it. I would like to remove the security from it. I can logon to the database with an account that is in the admins, full permissions and users groups. It is not the admin account. Can any one help me get the security off? I want it off because I created a table that I am the owner off and out of the blue, I can no longer even open the table. When I go to group permissions and try to give myself access to this table again, it denies me saying that in order to change the permissions of the object, I must have administrator permission for it. If someone can help me get access of my table again that would be great but in the long run I think I would like to get rid of the security altogether. It is no longer necessary. Thanks in advance for any assistance.
Jan 12 '07 #1
1 2221
NeoPa
32,556 Expert Mod 16PB
Access security is a bit of a mess really.
Without knowing more, the only suggestion I can come up with is to :
  1. Rename the current security file from *.Mdw to something else.
  2. Replace the original System.Mdw if it's no longer in it's original place.
  3. Run Workgroup Admin program to reset the security file to the original (non-passworded one).
HTH.
Jan 13 '07 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: Fran Tirimo | last post by:
I am developing a small website using ASP scripts to format data retrieved from an Access database. It will run on a Windows 2003 server supporting FrontPage extensions 2002 hosted by the company...
1
by: | last post by:
I think that I start to understand this .NET security. Basically it comes to this: * You use strong names in the dll and exe, so the application user must configure this application with key...
3
by: icb | last post by:
Hi I have a front-end/back-end setup. The front-end utilises all unbound forms populating the back-end via the code I have written. All fine so far. Prior to splitting the database I ran the...
3
by: mar10 | last post by:
I am creating a database in Access 2002 for a small firm that would like security on the tables. They want some employees to have write access only to tables, while others read-only. I have not...
2
by: TechBoy | last post by:
I am trying to learn on the fly about Access Security for an app we are developing. I realize Access security is an advanced subject with many details. I wanted to share a scenario and ask a...
3
by: TechBoy | last post by:
I had a useracct called xxx123 I had set up. Now there is a problem in that **every single** .mdb file I open now on my PC (regardless of age of the file, location of the file, etc) now asks for...
1
by: Sam Vanderstraeten | last post by:
Hi all, My situation: - VB.net & Visual Studio 2002 - IIS 6.0 - Windows XP Pro (development) and Windows 2000 server (release) I created a test-application (before I started to develop the...
5
by: Rocky | last post by:
My Access 2007 file fails to open on a machine with the 2007 Access runtime version installed. It comes up with a Security alert message. Is there a security setting in the Access Database that...
0
by: =?Utf-8?B?ZWQ=?= | last post by:
I had this exact problem using a vb.net client accessing a Java web service. The solution takes 3 steps: 1.) Create custom ClientOutputFilter 2.) Create a custom Assertion that uses filter from...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.