Hi.
This begs the question: What, pray tell, are you going to do with the
executable content if you actually find any?
Are you going to import the tables into a new database, leaving this
potentially malicious executable content in the original MDB file (presumably
for subsequent deletion)? If so, then why bother figuring out how to check
for executable content first, instead of just importing the tables into a new
file, deleting the original, and be done with it?
Are you going to delete this executable content? Executable content, by the
way, includes VBA code, action queries and macros, so you may have to get rid
of more than just modules if you're chucking executables. If you delete this
executable content, will this cripple the database application? If so, how
much will it cost you to fix it and how much time is it going to take a
developer you know is trustworthy to replace the deleted code, queries and
macros?
Are you going to delete the entire MDB file, since, as you say, it's
potentially dangerous? If so, how much will it cost you and how much time is
it going to take a developer you know is trustworthy to replace it?
What has your risk assessment revealed that you are fearful of executable
content within MDB files? Are you expecting to find a virus? Has a former
disgruntled employee or a dysfunctional relative warned of impending MDB code
bombs? MDB query bombs? MDB macro bombs? Are you expecting an unknown
assailant to E-mail you any of the above?
If it's a virus you suspect, then scan the files with a commercial antivirus
software application, such as Norton or McAfee, before opening them. If it's
a former disgruntled employee's or dysfunctional relative's maliciousness you
suspect, then make sure you have backups of your computer systems and
important files, and then take legal action if his maliciousness actually
hits your computers, because tampering with people's computers where harm
results is a criminal act. If it's an unknown assailant sending you
malicious files, then you could check to determine whether the shift bypass
has been disabled (if so, then re-enable it) before opening the file by
pressing the <SHIFT> key until the database is completely opened, then
examine the executable content for anything malicious. But if you're afraid
of what unknown sources are sending you, then why would you even bother
opening the file? Open MDB files only from developers you trust, and
there're no worries if you have -- and use -- antivirus software.
HTH.
Gunny
See
http://www.QBuilt.com for all your database needs.
See
http://www.Access.QBuilt.com for Microsoft Access tips and tutorials.
See
http://www.Access.QBuilt.com/html/expert_contributors2.html for contact
info.
- - -
If my answer has helped you, please sign in and answer yes to the question
"Did this post answer your question?" at the bottom of the message, which
adds your question and the answers to the database of answers. Remember that
questions answered the quickest are often from those who have a history of
rewarding the contributors who have taken the time to answer questions
correctly.