473,799 Members | 3,161 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Secure Replacement for Access Written in VB

Scenario:

We have several SQL 2000 servers that our employees use by linking tables
through Access XP. They have read only access to several tables and views –
they also write their own views to get the data in a form that is useful for
them.

The problem is that the users are in a habit of not linking to the tables,
but rather, importing the data. This is a problem because despite numerous
warnings against unsafe practices they continue to import the data into large
unsecure Access databases thereby circumventing the security features of SQL
Server. The data should NEVER be local.

Frankly, if I can do it, I’m gonna try to eliminate Access from everyone’s
workstation. The security risk is too great. What I need then is a
replacement – a program that allows people to build and save queries, link to
several SQL Servers, and sort the data as required without the user having
the ability to pull the data for local storage. All the abilities of Access
without the ability to “Make Table” or “Import Data”.

Is there a control that would help with this?
A program?
Thoughts? Suggestions?

Apr 12 '06 #1
2 1217
"Mad_Gerbil " <Ma*******@disc ussions.microso ft.com> wrote in message
news:DA******** *************** ***********@mic rosoft.com...
Is there a control that would help with this?
A program?
Thoughts? Suggestions?


I've commented here:

http://www.itwriting.com/blog/?postid=407

Tim
Apr 13 '06 #2
How about replacing Access with a reporting tool like Cognos Impromptu or
Business Objects?

John G.

"Mad_Gerbil " <Ma*******@disc ussions.microso ft.com> wrote in message
news:DA******** *************** ***********@mic rosoft.com...
Scenario:

We have several SQL 2000 servers that our employees use by linking tables
through Access XP. They have read only access to several tables and
views -
they also write their own views to get the data in a form that is useful
for
them.

The problem is that the users are in a habit of not linking to the tables,
but rather, importing the data. This is a problem because despite
numerous
warnings against unsafe practices they continue to import the data into
large
unsecure Access databases thereby circumventing the security features of
SQL
Server. The data should NEVER be local.

Frankly, if I can do it, I'm gonna try to eliminate Access from everyone's
workstation. The security risk is too great. What I need then is a
replacement - a program that allows people to build and save queries, link
to
several SQL Servers, and sort the data as required without the user having
the ability to pull the data for local storage. All the abilities of
Access
without the ability to "Make Table" or "Import Data".

Is there a control that would help with this?
A program?
Thoughts? Suggestions?

Apr 19 '06 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

10
4778
by: Matthew Sims | last post by:
I've been performing search after search all over the internet reading up on all topics about making PHP secure with MySQL. There's a lot out there and not many concrete examples on how you should specifically incorporate secure code. But I did read up on the mysql_escape_string function and wonder...is this all I really need to use to keep attackers from trying to access my database from a web form? I've also seen uses of:
0
1705
by: ian douglas | last post by:
Hey all, Anyone have a wraper written as a drop-in replacement for PDFlib? That is, use their function names, parameters, pretty much identically? I'm making some slight modifications to an open-source administrative software package that requires PDFlib, and according to pdflib's licensing agreement, administrative purposes for an educational facility requires a $450 license.
5
2518
by: Paul Miller | last post by:
We've run into minidom's inabilty to handle large (20+MB) XML files, and need a replacement that can handle it. Unfortunately, we're pretty dependent on a DOM, so a pulldom or SAX replacement is likely out of the question for now. Has someone done a more efficient minidom replacement module that we can just drop in? Preferrably written in C?
92
6545
by: Reed L. O'Brien | last post by:
I see rotor was removed for 2.4 and the docs say use an AES module provided separately... Is there a standard module that works alike or an AES module that works alike but with better encryption? cheers, reed
6
4842
by: Billy Jacobs | last post by:
I have a website which has both secure and non-secure pages. I want to uses forms authentication. How do I accomplish this? Originally I had my web.config file in the root with Forms Authentication set up and it worked just fine. Then I realized that I needed to have some pages unsecure. I then created 2 directories. One named Secure and the other named Public. I placed my web.config file in my
4
1532
by: Shabam | last post by:
I'm developing an application and want to have the "remember me" feature, so that users don't have to log back in again in the next visit. The problem here is, what happens if the user's cookie is stolen? Or, what prevents someone from figuring out the algorithm to the cookie session string? I've thought of using a random string (stored in the database) that's written to the user's cookie once he's logged in. Since it's random there...
20
5703
by: Paul D. Boyle | last post by:
Hi all, There was a recent thread in this group which talked about the shortcomings of fgets(). I decided to try my hand at writing a replacement for fgets() using fgetc() and realloc() to read a line of arbitrary length. I know that the better programmers in this group could write a more robust function, but here is my shot at it anyway. I would appreciate people's comments on my fget_line() code below (usage example included). Any...
7
3026
by: Seth | last post by:
I have noticed that the id of my session object changes when I switch from a non-secure to a secure connection. What I'm trying to do: I have a cookie that is built on the non-secure side of things. What I need to do is to switch to a secure connection and then later on while still in that secure connection delete the cookie that was created on the non- secure side. I need to do this because I can not reference the non-secure cookie...
14
1586
by: Dave | last post by:
Hello, Not sure if this is php related or not, but i'd like to have certain users who have the ability to upload files to my site, and others to download files. I thought about .htaccess and basic authentication, but then i thought that's not very secure i was wondering if there was a php solution, something that splits user uploads and downloads in to two separate sections? I checked out some scripts on phpbuilder.com but they don't seem...
0
10484
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10251
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
10027
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9072
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development projectplanning, coding, testing, and deploymentwithout human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7565
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupr who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5463
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5585
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4141
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
3
2938
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.