473,385 Members | 1,606 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Shared Access File

180 100+
How can i set my shared access file cannot be deleted by other people in LAN?
Jan 30 '12 #1

✓ answered by NeoPa

Within any Windows Domain the file permissions are NTFS compatible, and that includes a permission to delete. If users don't have this permission set then they will be unable to delete the file. Be very careful not to let anyone set the Deny Permission for Delete as that could cause your systems and/or administrators to be unable to delete it too.

PS. This is a Windows question and not related to Access or VBA.

5 1354
Rabbit
12,516 Expert Mod 8TB
You can't. Write permissions are required to modify the data in the database and that includes delete permission. There's no permission that is only for delete.
Jan 30 '12 #2
eneyardi
180 100+
So how can i protect my shared files? My access program is a LAN base
Jan 30 '12 #3
sierra7
446 Expert 256MB
Hi.
I'm not a network guru but I know you can locate the backend in a folder on the server which is hidden to general uses. The front-end explicitly links to this file via the known folder-name but the users cannot see it to delete it or steal data by copying to pen-drive.

If they can get into what was the 'Database Window' they can stil wreck havoc.

Which reminds me that I must stop them pressing F11 in Access 2010!

S7
Jan 30 '12 #4
NeoPa
32,556 Expert Mod 16PB
Within any Windows Domain the file permissions are NTFS compatible, and that includes a permission to delete. If users don't have this permission set then they will be unable to delete the file. Be very careful not to let anyone set the Deny Permission for Delete as that could cause your systems and/or administrators to be unable to delete it too.

PS. This is a Windows question and not related to Access or VBA.
Jan 30 '12 #5
eneyardi
180 100+
Thanks a lot guys for your quick reply.
Feb 1 '12 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: Douglass Turner | last post by:
Hi, Please release me from my own private hell. Platform: SuSE 8.1 I'm installing python 2.3 tarball as follows: ../configure --enable-shared make
6
by: Ernesto | last post by:
I'm in the process of moving a Python application from Windows to Linux. This means that the drivers for windows ".dll" now must be Linux drivers "shared library file" (.so I think). With...
5
by: DeanL | last post by:
Hi all, I'm having a few problems with a shared access 97 db. I have the database split with the tables on the server and everything else in "client" front ends with links to the tables, e.g....
3
by: gmax2006 | last post by:
Hi, I am using RedHat Linux 4. and I developed an oracle 10g based application by using cx_Oracle (cx_Oracle-4.1-10g-py23-1.i386.rpm) and Python 2.3.4. When I run the application through...
13
by: Elton Cohen | last post by:
Hi newsgroup! Can anyone tell me where I should put a simple Access database file in order to be accessible for every computer in the network (same workgroup)? There does not need to be any...
1
by: vasilip | last post by:
root@Server:/opt/ibm/db2/V9.1/bin# ./db2adutl ../db2adutl: error while loading shared libraries: libApiDS.so: cannot open shared object file: No such file or directory I just installed db2 9.1...
4
by: Randoz | last post by:
I have a shared access program is a shared directory on a server. I have put no restictions are set up anything different than the defaults. Some indivduals are not having any problem at all and...
3
by: limperger | last post by:
Hello! This is quite important. We have an Access file shared in a network. Every user has its front-end copy that is linked to a back-end copy. This database has an autonumber field to count...
2
by: Rhuddlan | last post by:
Hi, I am using RedHat EL 4 and I developed an oracle 10g based application by using cx_Oracle (cx_Oracle-4.3.1-10g-py23-1.i386.rpm) and Python 2.3.4. Running the application through direct...
3
by: Rams chin | last post by:
Hi, Iam trying to build crda agent module on a cross platform(ARM). To build the same, one of the input module is m2crypto shared object file. I have sucesfully cross compiled and m2crypto.so file...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.