|
by: Mike MacSween |
last post by:
S**t for brains strikes again!
Why did I do that? When I met the clients and at some point they vaguely
asked whether eventually would it be possible to have some people who could
read the data and some who couldn't but that it wasn't important right now.
And I said, 'sure, we can do that later'.
So now I've developed an app without any thought to security and am trying
to apply it afterwards. Doh!, doh! and triple doh!
|
by: gasturbtec |
last post by:
please help im new at access programming and i just got this project
dropped in my lap because the old programmer quit. i've been doing ok
so far but now i need to add code to an existing database that is used
to connect to other databases and generate reports. below is sample
code of how the database does the linking i hope i give you enough
info to help me but if not let me know and i will give more.
Sub txtShipDataFileSub()
Dim...
|
by: mar10 |
last post by:
I am creating a database in Access 2002 for a small firm that would
like security on the tables. They want some employees to have write
access only to tables, while others read-only.
I have not done anything with security since way back in version '97.
I'm reading some white papers I've found to gain knowledge of
current security issues.
My question is, can I create security problems with other access
programs I have created as I...
|
by: Bob Alston |
last post by:
Could develop web pages that would interact with the access/jet database
- like DAP but without the security flaw???
One of Access' competitors (Filemaker Pro as I recall) touts its EASY
way to build web forms using its product. Sounds like they are trying
to beat Access in a new venue - the web.
Bob Alston
bobalston9 AT yahoo DOT com
|
by: Martin |
last post by:
Sorry, the prior message was multi-posted.
Here's a cross-posted version. Please disregard the other one.
Is there a way to create and encrypted database file?
What do people do when data security is important at the file level? In
other words, you don't want anyone to be able to take the database file (or
files) and extract data from them.
|
|
by: carriolan |
last post by:
Hi
I have managed to secure a split database. Both frontend and backend
share a common workgroup, common security groups and common users and
permissions, but as in all good stories there is a catch.
All works well for the newAdmin user, but not so for the newUser. In
the AutoExec macro I have a call on some VBA to reconnect the frontend
and backend databases. It does not reconnect for the newUser. My
conclusion is that the security...
|
by: =?Utf-8?B?S2plbGw=?= |
last post by:
Hi
I'm new to C# and .Net so be nice :-)
I'm going throught a steep learing curve right now and finding it really
hard when after several hours of coding is running into security issue when
trying the new application on a client machine. (I'm a domain admin on the
client/network)
and apparantly the problem is in the very first lines of code in my
|
by: Mohsen A. Momeni |
last post by:
Hi,
Does it have any difference in security, whether to compile a function
as a static lib and link it with a program or just add the function to
the source?
In other words, suppose we have two files, func.c containing a
function which is called in main and main.c containing the main
function. what is the difference when we link func.o with main.o to
make a binary, with linking func.lib with main.o to make the binary,
concerning security...
|
by: Keith Wilby |
last post by:
I have an Access app with ULS applied. It has a main form and a subform
with a 1:M relationship. My client wants some of his users to be able to
edit 3 fields in the subform but read-only the rest. What's the "preferred"
solution to this?
I thought I could either
provide 2 subforms with their queries permissions set accordingly or
provide 1 subform and use code to loop through the objects to lock/unlock
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|