473,378 Members | 1,504 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,378 software developers and data experts.

Restoring a Secured Database?

I have a secured database that had all its corresponding files deleted (bak, image of screenshot, .secure file). I have tried rebuilding this database by copying and pasting the objects in it into a new database, but because it is secured, I can't do this with forms, reports, or macros in the database (I can't look at their design either). Is there a way to restore the functionality of the database either by restoring the original database or by copying the forms, reports, and macros into a new database?
Aug 24 '10 #1
5 1104
Oralloy
985 Expert 512MB
@Stevestan1,

What's stopping you from restoring your DB backup and rolling forward from there? It sounds like things are untennable at the moment.

Another way of asking is "what would be lost"?

Luck!
Aug 24 '10 #2
The backup was deleted along with all the corresponding secured database files
Aug 25 '10 #3
Oralloy
985 Expert 512MB
Oh. (in the typical downfalling voice indicating shared frustration.)

Do you know how to break into a secured database? I think you use "shift-click", or "cntrl-click", when you open it. However, the real Access experts here can tall you for sure. That'll be like opening the DB without all the overhead.

Another thing you can do is to set your version of access to disable macros, or some such. Then it comes up in an effectively unsecured manner. Then you can open things in design mode.

We do that around here, because the company enforces it as a security policy. It keeps folks from sending virus databases in and having the code auto-executed.

We are rapidly getting to the point where my advice will do you more harm than good, though. Be careful and keep backups at every major step, so you don't accidentally destroy something.

Good Luck!
Aug 25 '10 #4
Tried the shift-click and cntrl-click; the security settings are still there. I don't think any locks were disabled.
How do you disable macros in Access?
Aug 25 '10 #5
Oralloy
985 Expert 512MB
In the "Trust Center", there is a "Macro Settings" option.

Under that tab, there is an option to disable all macros with notification, which is what I use.

Can you find it?
Aug 25 '10 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

1
by: erin | last post by:
When I run: select * from testtable I get this error message: Invalid object name 'testtable'. However, if I run: select * from testuser.testtable
1
by: eddie wang | last post by:
Hi, I restored a database 2 months ago. After the restore, I lost all my "users" for that database. It has been a while, so I don't remember the detail of what I did. How can I reserve all the...
1
by: Brian Sadler | last post by:
Does anyone know where I can find information on how to setup my shell in unix/linux to allow me to restore a database from an sql dump... Example... I have a database on 83200.mysql.com ...
3
by: Therese A. Sorna | last post by:
Hello all, Is there a way to add users to a secured database without having to go into Security -> User and Group Accounts? I have a table for all employees on a secure database, and want to be...
1
by: Lee Rouse | last post by:
I have a secured Access 2000 database. There are approximately 30 user accounts already set up. Each user logs into their copy of the front-end by via a desktop shortcut which includes their...
4
by: xunitinmullik | last post by:
Hello ppl: I am facing a problem that I ahve never experienced before with the secured database. I created an MS Access 2000 application (.mdb) using MS Access 2002 and secured it using exactly...
5
by: MLH | last post by:
Is there a quick way to do it? I'm logged in as the superuser and owner of database and all database objects. I would like to export it to a completely un- secured application. Do I have to...
5
by: Spook | last post by:
Hi. I have created a secured database which lots of my colleagues use. However when I want to make changes I can't because invariably there is somebody using it. Is there a way of either...
1
by: pcard | last post by:
Hello, I ran the User-Level Security Wizard to try to secure an Access database that I created. But after I finished the steps, saved the report that contains all the important user/group info, and...
3
by: timekeepumd | last post by:
Hello, I am running Access 2000 and have 2 databases. From database 1 I need to open database 2. The problem is that I set up user level security using the Access wizard so I have a workgroup...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.