|
by: Mike MacSween |
last post by:
S**t for brains strikes again!
Why did I do that? When I met the clients and at some point they vaguely
asked whether eventually would it be possible to have some people who could
read the data...
|
by: gasturbtec |
last post by:
please help im new at access programming and i just got this project
dropped in my lap because the old programmer quit. i've been doing ok
so far but now i need to add code to an existing database...
|
by: mar10 |
last post by:
I am creating a database in Access 2002 for a small firm that would
like security on the tables. They want some employees to have write
access only to tables, while others read-only.
I have not...
|
by: Bob Alston |
last post by:
Could develop web pages that would interact with the access/jet database
- like DAP but without the security flaw???
One of Access' competitors (Filemaker Pro as I recall) touts its EASY
way to...
|
by: Martin |
last post by:
Sorry, the prior message was multi-posted.
Here's a cross-posted version. Please disregard the other one.
Is there a way to create and encrypted database file?
What do people do when data...
|
|
by: carriolan |
last post by:
Hi
I have managed to secure a split database. Both frontend and backend
share a common workgroup, common security groups and common users and
permissions, but as in all good stories there is a...
|
by: =?Utf-8?B?S2plbGw=?= |
last post by:
Hi
I'm new to C# and .Net so be nice :-)
I'm going throught a steep learing curve right now and finding it really
hard when after several hours of coding is running into security issue when...
|
by: Mohsen A. Momeni |
last post by:
Hi,
Does it have any difference in security, whether to compile a function
as a static lib and link it with a program or just add the function to
the source?
In other words, suppose we have two...
|
by: Keith Wilby |
last post by:
I have an Access app with ULS applied. It has a main form and a subform
with a 1:M relationship. My client wants some of his users to be able to
edit 3 fields in the subform but read-only the...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated ...
|
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence...
|