B
Beth
I have an Access 2000 database with a large number of forms and reports and
it is linked to a backend data file. Against my better judgement I am
having to deploy this database to a user that is intent on damaging the
files so they do not work and then trying to "reverse engineer" the program
to duplicate it. I need this program as locked down as possible. I have
done the following:
User level security with a new security workgroup where admin has no
privileges
converted almost all the queries to select statements in the forms and
reports or in the modules
disabled the database window and disabled the shift key
all code in modules
converted file to .mde
However, the individual will be given a mid level security access code (I
can't stop that).
So far I have found that she can still create a new database and import my
tables and the few queries that I have been unable to convert.
I am concerned I am missing other vulnerabilities.
Is there anything else I can do to secure the database? I am forever
grateful for any help I can get on this.
Thanks,
Beth
it is linked to a backend data file. Against my better judgement I am
having to deploy this database to a user that is intent on damaging the
files so they do not work and then trying to "reverse engineer" the program
to duplicate it. I need this program as locked down as possible. I have
done the following:
User level security with a new security workgroup where admin has no
privileges
converted almost all the queries to select statements in the forms and
reports or in the modules
disabled the database window and disabled the shift key
all code in modules
converted file to .mde
However, the individual will be given a mid level security access code (I
can't stop that).
So far I have found that she can still create a new database and import my
tables and the few queries that I have been unable to convert.
I am concerned I am missing other vulnerabilities.
Is there anything else I can do to secure the database? I am forever
grateful for any help I can get on this.
Thanks,
Beth