473,809 Members | 2,739 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Protection for Columns

I would like to know how to set protection on specific
columns. I know we can protect Workbook and Worksheet, but
I have no idea how I can protect specific columns. Thank
you.
Nov 20 '05 #1
4 1207
"M-Hero" <an*******@disc ussions.microso ft.com> schrieb
I would like to know how to set protection on specific
columns. I know we can protect Workbook and Worksheet, but
I have no idea how I can protect specific columns. Thank
you.


Would you please explain us what you are talking about? Workbook and
Worksheet sounds like Excel terms. Are you using VB.NET (that's what this
group is all about) to control Excel? If not, please turn to an Excel group.
If yes, the question doesn't seem to be specific to VB.NET, it's more a
question on the Excel object model. Please have a look at it first. If
you've got problems creating the VB.NET code to do what you want, feel free
to let us know.
--
Armin

Nov 20 '05 #2
Cor
Hi Mr Hero,
I would like to know how to set protection on specific
columns. I know we can protect Workbook and Worksheet, but
I have no idea how I can protect specific columns. Thank
you.


I saw this answer in another thread, is this what you mean, I don't know if
it works for you?

To lock specific columns; check this out.

Sub lock_columns()
Cells.Select
Selection.Locke d = False
Selection.Formu laHidden = False
Columns("B:C"). Select
Selection.Locke d = True
Selection.Formu laHidden = False
ActiveSheet.Pro tect DrawingObjects: =True, _
Contents:=True, Scenarios:=True
End Sub

Cor
Nov 20 '05 #3
* "M-Hero" <an*******@disc ussions.microso ft.com> scripsit:
I would like to know how to set protection on specific
columns. I know we can protect Workbook and Worksheet, but
I have no idea how I can protect specific columns. Thank
you.


<news://news.microsoft. com/microsoft.publi c.excel.program ming>

--
Herfried K. Wagner
MVP · VB Classic, VB.NET
<http://www.mvps.org/dotnet>
Nov 20 '05 #4
Hi Cor,

ROFLMAO.

Excellent irony. ;-))

Regards,
Fergus
Nov 20 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

9
2369
by: Howard | last post by:
I am currently looking at the various packages that are available for software protection. I have a particular question that I'd welcome your feedback on. Background info: I work for a company that develops software, and typically releases software SDKs. Development is in C++ using MS Visual C++. We need to apply software encryption/protection to achieve: 1) Time-limited versions (e.g software expires after X days)
0
2031
by: SoftComplete Development | last post by:
SoftComplete Development Updates EXECryptor to v. 2.1.20 Software piracy! Cracked serial numbers! Thousands of commercial products are posted on the warez sites and become available to all who want have your software product and pay no money for your development work! Shareware developpers look for good protection for their products and create some protection themselves or find ready-made tools. But there's no many programs really...
12
3327
by: Mr Beaton | last post by:
Hey all, I'm far from new to programming, neither ASP nor SQL. However, my SQL knowhow is apparently wanting... I have allways validated user input to pieces prior to integrating it into a SQL statement, in order to avoid SQL Injection attacs. A colleague of mine told me that binding my vars would make them SQL scalar, but I have been left in the dark as to HOW... The web left me none the wiser, as well, so here goes: Anyone got a...
7
2434
by: Boni | last post by:
Dear all, in order to protect my assembly component from decompilation I implemented following schema: I created mixed mode C++ project wich has managed cProxy class and unmanaged cMemLoader. In the cMemLoader I load encrypted assembly, decrypt it into memory buffer and then marshal this buffer into managed memory and load the assembly from memory.
2
1075
by: M-Hero | last post by:
Would anyone happen to know how to protect a specific column? I know how to protect Workbook and Worksheet, but Column.
9
1917
by: John | last post by:
Hi, I would like to protect my software from copying. What are best tools for it (hardware protection is not an option), do you have some reccomendation for protection or third party software that works? Thanks very much John
19
2214
by: John | last post by:
I would like to use some third party software for copy protection, software that prevents from copy paste program to another computer (not obfuscator). I am looking for some good solution (hardware lock is not an option). Can you reccomend me software based on your experiences?
5
6622
by: Iain | last post by:
Hi All I have the code below (Using Delphi 2006 Developer to create an C# ASP.Net page to update a simple database table. When the page is fired I get the following error message +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Compiler Error Message: CS0122: 'LivLeadTime.WebForm2.Livery_DeleteCommand(object, System.Web.UI.WebControls.DataGridCommandEventArgs)' is inaccessible
0
1876
by: dba | last post by:
Hi folks, I would just like to share with you SQL CodeSecure, a newly released database protection and auditing tool from SqlLabs: SQL CodeSecure provides ultimate protection from unauthorized creation, modification and deletion of database objects. It provides flexibility through various protection types and granularity at different protection levels. CodeSecure comes with a full-featured auditing tool that keeps track of all changes...
0
9722
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10643
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10378
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10391
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10121
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
6881
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5550
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5690
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
3
3015
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.