G
Guest
could someone let me know what order to conduct the following :
Encode the data base,
split the database,
make multiple copies of the front end,
make SOME of the front ends into mde files (leave others for further
development),
apply user level security,
determine startup options,
disable shift key override,
anything else to nail the security.
Cheers.
Encode the data base,
split the database,
make multiple copies of the front end,
make SOME of the front ends into mde files (leave others for further
development),
apply user level security,
determine startup options,
disable shift key override,
anything else to nail the security.
Cheers.