Scenario:
We have several SQL 2000 servers that our employees use by linking tables
through Access XP. They have read only access to several tables and views –
they also write their own views to get the data in a form that is useful for
them.
The problem is that the users are in a habit of not linking to the tables,
but rather, importing the data. This is a problem because despite numerous
warnings against unsafe practices they continue to import the data into large
unsecure Access databases thereby circumventing the security features of SQL
Server. The data should NEVER be local.
Frankly, if I can do it, I’m gonna try to eliminate Access from everyone’s
workstation. The security risk is too great. What I need then is a
replacement – a program that allows people to build and save queries, link to
several SQL Servers, and sort the data as required without the user having
the ability to pull the data for local storage. All the abilities of Access
without the ability to “Make Table” or “Import Data”.
Is there a control that would help with this?
A program?
Thoughts? Suggestions? 2 1217
"Mad_Gerbil " <Ma*******@disc ussions.microso ft.com> wrote in message
news:DA******** *************** ***********@mic rosoft.com... Is there a control that would help with this? A program? Thoughts? Suggestions?
I've commented here: http://www.itwriting.com/blog/?postid=407
Tim
How about replacing Access with a reporting tool like Cognos Impromptu or
Business Objects?
John G.
"Mad_Gerbil " <Ma*******@disc ussions.microso ft.com> wrote in message
news:DA******** *************** ***********@mic rosoft.com... Scenario:
We have several SQL 2000 servers that our employees use by linking tables through Access XP. They have read only access to several tables and views - they also write their own views to get the data in a form that is useful for them.
The problem is that the users are in a habit of not linking to the tables, but rather, importing the data. This is a problem because despite numerous warnings against unsafe practices they continue to import the data into large unsecure Access databases thereby circumventing the security features of SQL Server. The data should NEVER be local.
Frankly, if I can do it, I'm gonna try to eliminate Access from everyone's workstation. The security risk is too great. What I need then is a replacement - a program that allows people to build and save queries, link to several SQL Servers, and sort the data as required without the user having the ability to pull the data for local storage. All the abilities of Access without the ability to "Make Table" or "Import Data".
Is there a control that would help with this? A program? Thoughts? Suggestions? This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Matthew Sims |
last post by:
I've been performing search after search all over the internet reading
up on all topics about making PHP secure with MySQL. There's a lot out
there and not many concrete examples on how you should specifically
incorporate secure code.
But I did read up on the mysql_escape_string function and wonder...is
this all I really need to use to keep attackers from trying to access
my database from a web form?
I've also seen uses of:
|
by: ian douglas |
last post by:
Hey all,
Anyone have a wraper written as a drop-in replacement for PDFlib? That
is, use their function names, parameters, pretty much identically?
I'm making some slight modifications to an open-source administrative
software package that requires PDFlib, and according to pdflib's
licensing agreement, administrative purposes for an educational
facility requires a $450 license.
|
by: Paul Miller |
last post by:
We've run into minidom's inabilty to handle large (20+MB) XML files, and
need a replacement that can handle it. Unfortunately, we're pretty
dependent on a DOM, so a pulldom or SAX replacement is likely out of the
question for now.
Has someone done a more efficient minidom replacement module that we can
just drop in? Preferrably written in C?
|
by: Reed L. O'Brien |
last post by:
I see rotor was removed for 2.4 and the docs say use an AES module
provided separately... Is there a standard module that works alike or
an AES module that works alike but with better encryption?
cheers,
reed
|
by: Billy Jacobs |
last post by:
I have a website which has both secure and non-secure
pages. I want to uses forms authentication. How do I
accomplish this?
Originally I had my web.config file in the root with Forms
Authentication set up and it worked just fine. Then I
realized that I needed to have some pages unsecure.
I then created 2 directories. One named Secure and the
other named Public. I placed my web.config file in my
| |
by: Shabam |
last post by:
I'm developing an application and want to have the "remember me" feature, so
that users don't have to log back in again in the next visit.
The problem here is, what happens if the user's cookie is stolen? Or, what
prevents someone from figuring out the algorithm to the cookie session
string?
I've thought of using a random string (stored in the database) that's
written to the user's cookie once he's logged in. Since it's random there...
|
by: Paul D. Boyle |
last post by:
Hi all,
There was a recent thread in this group which talked about the
shortcomings of fgets(). I decided to try my hand at writing a
replacement for fgets() using fgetc() and realloc() to read a line of
arbitrary length. I know that the better programmers in this group could
write a more robust function, but here is my shot at it anyway.
I would appreciate people's comments on my fget_line() code below
(usage example included). Any...
|
by: Seth |
last post by:
I have noticed that the id of my session object changes
when I switch from a non-secure to a secure connection.
What I'm trying to do:
I have a cookie that is built on the non-secure side of
things. What I need to do is to switch to a secure
connection and then later on while still in that secure
connection delete the cookie that was created on the non-
secure side. I need to do this because I can not
reference the non-secure cookie...
|
by: Dave |
last post by:
Hello,
Not sure if this is php related or not, but i'd like to have certain
users who have the ability to upload files to my site, and others to
download files.
I thought about .htaccess and basic authentication, but then i thought
that's not very secure i was wondering if there was a php solution,
something that splits user uploads and downloads in to two separate
sections? I checked out some scripts on phpbuilder.com but they don't seem...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
| |
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development projectplanning, coding, testing, and deploymentwithout human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupr who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
| |
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |