R
Robert
Hello. I would like some general advice.
1. Is the security which is described in the 10-step document that is
posted here form time to time the so-called "Access User-Level Security"?
Are they one and the same?
2. Do you recommend it? Is it worth the trouble? Are there better ways?
I realize individual requirements may vary but what has been your
experience?
3. Where can I get a small sample database employing this security?
Robert
1. Is the security which is described in the 10-step document that is
posted here form time to time the so-called "Access User-Level Security"?
Are they one and the same?
2. Do you recommend it? Is it worth the trouble? Are there better ways?
I realize individual requirements may vary but what has been your
experience?
3. Where can I get a small sample database employing this security?
Robert