473,396 Members | 1,743 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

There is no security if the mdw file can be seen by users

I've been searching for an effective way of security an Access database. From creating database password, encrypting, disabling shift key at start up, and the user-level security.

The user level security is the most secured way of protecting Access database. But if the mdw file will be distributed or will be known to users then security is gone by just paying for password cracker software easily available in the internet. They can also crack database passwords. These softwares are easily available for just 20 US$.

I've been reading from the internet that to distribute your user level security enhanced database you need to also distribute the workgroup information file (*.mdw) file. Otherwise they cannot use your database.
May 7 '08 #1
2 2154
puppydogbuddy
1,923 Expert 1GB
I've been searching for an effective way of security an Access database. From creating database password, encrypting, disabling shift key at start up, and the user-level security.

The user level security is the most secured way of protecting Access database. But if the mdw file will be distributed or will be known to users then security is gone by just paying for password cracker software easily available in the internet. They can also crack database passwords. These softwares are easily available for just 20 US$.

I've been reading from the internet that to distribute your user level security enhanced database you need to also distribute the workgroup information file (*.mdw) file. Otherwise they cannot use your database.
Yes. See this link: http://support.microsoft.com/kb/305542
Remember, application security is in addition to windows authentication, and after you have converted your mdb to an mde file, effectively removing the source code to your database. Unless your data or database design is so extraordinarily valuable or sensitive, I don't think anyone is going to go to all that trouble (assuming they have the technical skills to do it).
May 7 '08 #2
missinglinq
3,532 Expert 2GB
What's being secured from whom has to be the cardinal question, when dealing with security issues.

If you have toddlers about the house and you don't want them messing around with the computer in your home office, you put a child-proof cap on the door handle.

If you frequently give parties and don't want your guests wandering in to the same office, you replace the door knob with one that open with a key.

If your home office is the storage facility for the secret Coca Cola formula, worth millions, you add a biometric access system, pressure pads, armed guards and dog patrols.

You get the idea.

Looking at a database, the questions become are you trying to protect your data, the integrity of the structure of your database, or both, and from whom?

If you're trying to protect data and or the structure (design) of your db from casual snoopers, i.e. authorized users with too much time on their hands, a combination of user level security and/or conversion to MDE files will do the trick. The same applies if you simply don't want the janitor, working after hours, accessing a copy of your customer list.

If, on the other hand, you're worried about a high level techie coming in with the sole intention of stealing proprietary data, then you need to be using something more than just a plain Access database. MySQL and Oracle can be used as the back end for an Access front end and provide a great deal more in the way of data security.

And in the final analysis, any security system that can be implemented by man can be broken by man.

Linq ;0)>
May 7 '08 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

3
by: djc | last post by:
I need a way to upload a file to the server without any help from a user. does anyone have an example i could use. Thanks
1
by: PrisNo6 | last post by:
I have some old code locked in two Access 97 files where I lost the mdw file and the pid do to system crashes. Can someone refer me to a commercial vendor who can crack these files? - Regards -...
5
by: VB Programmer | last post by:
I want my webform to create a file on the users machine. How can I do this? I tried this but it doesn't work... Dim strFileName As String = "C:\Temp\MyFile.ABC" Dim sw As New...
4
by: HNguyen | last post by:
Hi, I have a Web application in ASP.NET. My Application allows the users upload files into the server after checking their user names and passwords. For each transaction, the Web program will...
12
by: Mesan | last post by:
I have a directory in an app I'm building that has access limited to users within a specific role and all aspx pages in that directory are unavailable just as I'd hope but other files (pdfs and...
2
by: Alex Lirus | last post by:
Hi. We are facing a problem with an old PHP application. The application browse the local server directory in order to show to the client browser file info and data. When we remove all the...
1
PAHSTeacher
by: PAHSTeacher | last post by:
I have had success writing to a .mdb database file stored on the server. However, I would like each user to have their own database, which could be copied from a template on the server to their...
3
by: curious2007 | last post by:
#include "chartdir.h" int main(int argc, char *argv) { // The data for the bar chart double data = {85, 156, 179.5, 211, 123}; // The labels for the bar chart const char...
1
by: hype261 | last post by:
So I have a weird issue that I hope somebody has seen before. I have an Access database that has a security workgroup file. I created a shortcut that has the following target... "C:\Program...
3
beacon
by: beacon | last post by:
Hi everybody, I have a database that I intend on setting up user/group permissions for using the built-in security wizard, but I don't want to have to manage adding every user since the database...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.