As best I can tell (this is from a while ago) it means:
ABE090, A(censored) Law Office, PO Box(censored)
ABR020, Marion (censored) Someone, PO Box(censored)
My greatest difficulty, was NOT recovering this previous encryption of mine,
but having to plug-in a Windows 3.1 disk and try and remember how to use it!!!
I think it's a bit rich of people like Rick Brandt (undoubtedly a technical
expert) and Joan Wild (another one) to purport to give advice on distributing
Access applications. Because, NEITHER of them use it that way!
(Joan is particularly on record as stating she DOES NOT USE Access Security
for such purposes. Also, you can see that her advice is limited only to the
machinations of actual Access Security, which is fine because she has said she
does NOT use Access security in practise. If either of them had, they would be
very aware of advice on add-in products)
Even suggestions to use SQLServer can be a bit suspect.
a) it may not be as suitable or as easy for general remote distribution as
Access.
b) depending on how it's written, Access is inevitably a portal into SQLServer
which might not therefore, as a unit, be secure. (David) had some usefull
interpretations of this within the last year in this newsgroup.
The overall point is that, yes things can be broken by "security experts".
Who's a security expert? and how much incentive do they have? In this
newsgroup, most questions are answered by "security experts". OF COURSE THEY
CAN BREAK IT but can your average customer?
Also, (program copying) is a matter of statistics. A business decision
really. MS has some great schemes (CD-KEY). It does not prevent copying (so I
hear), but it sure goes a long way to upping the business statistics. That's
why I said, in my first post, you need at the least a list of valid customers
(checking methods which are completely outside of Access)
It's never black-and-white. In some respects, it's unfair to rely solely on
MS-Access (or SQLServer or Oracle for that matter, for reasons stated)
The purpose of this newsgroup, I believe, is to advise on what can be done to
secure something, given the tools available. Certainly not how to break it,
though of course they are interrelated.
In Other Words: I don't b.know! All my suggestions are more-or-less equally
questions.
Chris
PS NO Reflections on Rick or Joan! Who are doing their best with an insecure
product. Merely used as illustrations...securing stuff is a right struggle
that's for sure.