473,397 Members | 2,084 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,397 software developers and data experts.

Lock/secure back end tables

82 64KB
am in the process of finalizing my access vba project, read a lot of ways how to secure the back end tables in the server however they are quite complicated and needed to re-touch my fe codes ... just askin' maybe there is a simpler way to do it... thank you guys ...
Apr 11 '13 #1

✓ answered by Seth Schrock

You would have to relink the tables and then provide the password at that time, but there is no code involved and then once the connection is made, there is no difference.

13 1286
Seth Schrock
2,965 Expert 2GB
Simpler than what? What have you tried? What version are you using?
Apr 11 '13 #2
deanvilar
82 64KB
Sir seth, actually I haven't tried anything yet .. but as I read some procedures, I need to put codes on my FE and do something else ... am using Access 2003, I want to have a security within the tables itself by not doing some modification on my FE...
Apr 11 '13 #3
Seth Schrock
2,965 Expert 2GB
What kind of things are you wanting to protect from? Just design changes? You could encrypt your BE which would make it so that only people with the password could make changes. I'm not sure how well this works in Access 2003 though.
Apr 11 '13 #4
deanvilar
82 64KB
yes sir seth, something like that ... to encrypt the BE is that possible to do without touching my FE?
Apr 11 '13 #5
Seth Schrock
2,965 Expert 2GB
You would have to relink the tables and then provide the password at that time, but there is no code involved and then once the connection is made, there is no difference.
Apr 11 '13 #6
deanvilar
82 64KB
oh thank you! .. let me try to re-link them back ...thank you again as always sir seth.
Apr 11 '13 #7
Rabbit
12,516 Expert Mod 8TB
You should be aware though that anyone with access to the front end can see the data on the backend unencrypted.
Apr 11 '13 #8
deanvilar
82 64KB
any other suggestion sir rabbit?
Apr 11 '13 #9
Rabbit
12,516 Expert Mod 8TB
Yeah. Don't use Access if security is a big concern.

But pragmatically speaking, most people don't have a choice. What you need to know is that there's nothing you can do to secure your data that can't be undone.

How difficult you want to make it for the other user depends on your requirements. And what we would need is clear concise requirements. Just saying you want to secure data is extremely vague.
Apr 11 '13 #10
deanvilar
82 64KB
actually I just wanted a password to the BE so that other users wont able to make changes or edit the tables ...
Apr 12 '13 #11
Rabbit
12,516 Expert Mod 8TB
For them to be able to connect to the backend, the password will be needed. And if they're connected, they can make changes. There's no way around that in Access.
Apr 12 '13 #12
Seth Schrock
2,965 Expert 2GB
They can make changes to the data, but not the design. Which are you wanting deanvilar?
Apr 12 '13 #13
deanvilar
82 64KB
to make changes for the users is ok... but not other personnel who's not entitled to go into the system itself...
Apr 12 '13 #14

Sign in to post your reply or Sign up for a free account.

Similar topics

1
by: Jake | last post by:
I have a deadlock situation, part of the problem looks like this; spid ecid dbid ObjId IndId Type Resource Mode Status ------ ------ ------ ----------- ------ ----...
6
by: alex via SQLMonster.com | last post by:
Hi, anybody can help me. How can i synchronize 2 tables on 2 different sql servers 2000 i mean TABLE1(col1, col2, col3, col4) and TABLE1(col1, col2, col3, col4, col5, col6) the first 3...
2
by: Trent | last post by:
Hello, all. I have the following production DB2 environment. DB2 8.1.4 (fp4) WG edition with 2 production databases on Windows 2003 standard edition. My first question is regard with...
8
by: Komandur Kannan | last post by:
We have a smart device application running on handhelds(Symbol MC9000G). The backend is Oracle and a middle tier web services development done in Vb.net. We use pessimistic Locking due to...
14
by: google | last post by:
I am creating a new database for use within our company, that I'd like to make reasonably secure (short of a true server based solution). The back-end of a non-server based database seems to be...
5
by: Bob Bins | last post by:
Is there a way to create a shared lock using the Monitor class or any other synchronization class in .NET? So I have one resource that may have multiple threads using it at once but a second...
2
blossam
by: blossam | last post by:
Hi frnd, I have created an application in vb.net for which i have create database in mysql 4.1 I want to secure all tables of mysql database in such way that no one can see structure or data of any...
0
by: rupalirane07 | last post by:
Hi all , When i Run the report in reporting services, it locks the tables. so is there any option to Unlock the tables. I m using just select query to run the report but when i run the report it...
9
by: Kelii | last post by:
Currently I have a button that allows the user to "Close Company" - at the moment it doesn't do anything :D I would like the button to "disconnect" the back end then show my Open Company form. ...
25
by: zmickle | last post by:
Excuse my noobness. I am managing an access database that is shared by 4 users. Management does not want to use any technologies outside of access for this application (no SQL Server, etc). I...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.