473,385 Members | 1,642 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

best security for dispatching access database?

8
Hi,

I'm looking for the best way to dispatch my database to many computers which I don't want any access to the source!

my database is for entring the data by users without see what is inside the database.
I have to use login at the start of database by different users and different access to allow view thre records or updating the records?

with user level-Security, many people can find the users pass and also admin pass with many cracks file which can find easily in internet.
and with mde I can not hide my table of login information, because by importing this table from another mdb file can see all the pass of users!!!

what you think,,,
which way is the best for dispatching like this database?


thanks
Ali
Jun 5 '07 #1
5 1619
Rabbit
12,516 Expert Mod 8TB
Hi,

I'm looking for the best way to dispatch my database to many computers which I don't want any access to the source!

my database is for entring the data by users without see what is inside the database.
I have to use login at the start of database by different users and different access to allow view thre records or updating the records?

with user level-Security, many people can find the users pass and also admin pass with many cracks file which can find easily in internet.
and with mde I can not hide my table of login information, because by importing this table from another mdb file can see all the pass of users!!!

what you think,,,
which way is the best for dispatching like this database?


thanks
Ali
Make the mde but keep the passwords and log-in in the code. If you need the flexibility to add new users then you'll have encrypt your passwords table.
Jun 5 '07 #2
Fekri
8
Thanks for your respond,

but I never use this encrypt !!!!

Can you explain me what is this and what is usefull?

Thanks a lot
Ali
Jun 6 '07 #3
Rabbit
12,516 Expert Mod 8TB
Thanks for your respond,

but I never use this encrypt !!!!

Can you explain me what is this and what is usefull?

Thanks a lot
Ali
Encryption algorithms are varied. There are a lot, I've never made one personally but basically an encryption algorithm takes data and transforms it into something not understandable unless you know how they did it.

A simple one is letter replacement where a letter is substituted for another letter.
Jun 6 '07 #4
Fekri
8
Hi,
thanks for your respond..

But I don't know how I should Encrypt the database??

Is it in the Access Menu?? or there is special way to do it?

I think this is what I need but please guide me how I can create it!!


Thanks
Ali
Jun 8 '07 #5
Rabbit
12,516 Expert Mod 8TB
Hi,
thanks for your respond..

But I don't know how I should Encrypt the database??

Is it in the Access Menu?? or there is special way to do it?

I think this is what I need but please guide me how I can create it!!


Thanks
Ali
You have to program one yourself or find it online, there's no native functionality for it. If you're looking for security then Access notoriously lacks it.
Jun 8 '07 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

11
by: Dave Smithz | last post by:
Having adopted someone else's PHP cope and completing a crash course in the language I came across a (probably common) problem with the current code. On a registration form, whenever users names...
1
by: Terry | last post by:
Hi, could someone please exmaplin to me what dynamic method dispatching is and how it's connected to virtual methods? Thanks Terry
5
by: great_googley_moogley | last post by:
Greetings, I am in the process of installing a SQL database at a customer location. I have determined that there are 3 ways to do this, and I wanted to know which is the best of the 3. 1...
11
by: DrUg13 | last post by:
In java, this seems so easy. You need a new object Object test = new Object() gives me exactly what I want. could someone please help me understand the different ways to do the same thing in...
116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
0
by: Anonieko Ramos | last post by:
ASP.NET Forms Authentication Best Practices Dr. Dobb's Journal February 2004 Protecting user information is critical By Douglas Reilly Douglas is the author of Designing Microsoft ASP.NET...
3
by: Michael Tsai | last post by:
Hi, It said that IIS 6 use HTTP.sys as the front end for handling HTTP request, and pass ASP.NET requests to w3wp.exe, but after some simple experiments, I found the security settings (e.g....
20
by: Keith G. Murphy | last post by:
I'm trying to get a feel for what most people are doing or consider best practice. Given a mod_perl application talking to a PostgreSQL database on the same host, where different users are...
0
by: David Helgason | last post by:
I think those best practices threads are a treat to follow (might even consider archiving some of them in a sort of best-practices faq), so here's one more. In coding an game asset server I want...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.