473,404 Members | 2,213 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,404 software developers and data experts.

Hidden data in Access - advanced stuff folks (maybe)

I am looking for a way to have a table (or similar) in an access database that can be queried/read from but not seen in its entirity from any users.

For example, say I wanted a table that had 2 fields - UserName and Password.
There are 20 users in this table and each had a unique password to access another applicaton (or even a website).

A Windows user JBloggs is logged onto the network and runs the database where there is a button on a form called Get Password. When he clicks this, a piece of code is run to get his username from the windows logon session, passes it to the hidden table (or collection) and returns his password.

This is all hypothetical at the moment and was just wondering what methods ways I should use to explore this.
For example, is it possible to create a class library (dll) in Visual Studio with all the table values hard coded in and this dll then referenced from Access. By the Way I have to use Access so I may be limited in what I can achieve.

I look forward to any suggestions.
Jan 27 '09 #1
5 2326
NeoPa
32,556 Expert Mod 16PB
Have you considered encrypting the data stored such that, although it is visible to all, it is interpretable by none?
Jan 27 '09 #2
I have considered encryption but wouldn't know how. Am I able to encrypt a table in access and still use it?
Jan 27 '09 #3
NeoPa
32,556 Expert Mod 16PB
As long as every access of the data used a function call to decrypt it, Yes.
Jan 27 '09 #4
OK sounds good to me.
A couple of things;
i). you know of any tutorials/links that explain the process on how to encrypt a table and decrypt the data using a function?

ii). Would a savvy user be able to see the functions being used to decrypt the table and and write some code to populate a temp table by using the same decrypting code (basically what I am getting at is, is it watertight on the security front)?
Jan 28 '09 #5
NeoPa
32,556 Expert Mod 16PB
@MattGaff
Not really I'm afraid. I did find some interesting links by googling "encrypt data routine", but I'll let you see what you can from there.

Remember that most encryption routines need a key which is available to both encrypt and decrypt the data. Keeping this hidden from a determined explorer is a separate problem.
@MattGaff
No. Not (watertight) as far as I can see. I simply use an algorithm which converts the data. It uses no key, and is therefore very weak as far as security goes. It relies on the explorer being baffled and confused. With my target audience that is adequate.

I suppose if you implemented one of the stronger routines and protected the source of your project, you may be able to get a watertight effect.
Jan 28 '09 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

10
by: Randell D. | last post by:
Folks, Perhaps someone can figure this out - this is 'the process of my script' I have a form whereby I can add multiple contacts to a single address. There is only one...
16
by: D Witherspoon | last post by:
I am developing a Windows Forms application in VB.NET that will use .NET remoting to access the data tier classes. A very simple way I have come up with is by creating typed (.xsd) datasets. For...
15
by: Mark C | last post by:
All, I have exhaustingly been looking through the newsgroups in search of a way to systemically output an Access 97 report to a pdf file using the full version of Adobe Acrobat. I want the user...
12
by: Nhmiller | last post by:
When I start to type the data for a new record, I would like a dropdown box to open next to it from which I can choose the data from a previously entered record that starts with the same letter....
71
by: Lauren Wilson | last post by:
Hello folks, Would love yo get all informed opinions and/or facts on the following: Over the last few weeks I have spent quite a bit of time reviewing all the Access and .NET stuff I could...
18
by: Andre Laplume via AccessMonster.com | last post by:
I have inherited a bunch of dbs which are are shared among a small group in my dept. We typically use the dbs to write queries to extract data, usually dumping it into Excel. Most dbs originated...
4
by: trond | last post by:
Hello all, Before I start I'd like to point out that I am a complete novice when it comes to asp.net - My background is in network and operating systems, and although I have been doing a bit of...
351
by: CBFalconer | last post by:
We often find hidden, and totally unnecessary, assumptions being made in code. The following leans heavily on one particular example, which happens to be in C. However similar things can (and...
0
by: DrewYK | last post by:
I have the project that may never end in front of me. I am creating a routine that will take SpreadSheets from Excel and bring them into Access. I am not using any "DoCmd"s because the goal...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.