Drew Wutka
DWUTKA at marlow.com
Thu Apr 17 04:58:01 CDT 2003
Ditto! never used an .mde in a final product...but then again, a lot of my actual 'contract' work for Access stuff is repair or modify projects...not complete from the ground up. I have used them in testing, but that's it. I did notice they were still susceptible to the 97 'drag and drop' security bug. Drew > -----Original Message----- > From: Andy Lacey [mailto:andy at minstersystems.co.uk] > Sent: Thursday, April 17, 2003 2:00 AM > To: accessd at databaseadvisors.com > Subject: RE: [AccessD] Secured vs. Unsecured FEs > > My 2c > I have never used an MDE and I have never had a user curious enough (for > curious read stupid) to tamper with an FE. And that's a LOT of users at a > lot of compnaies over the years. I must live a charmed life. I wouldn't > hesitate to go the MDE route if I had to, but I never have. > > (Just hadn't seen any posts on this side of the debate and couldn't stand > the idea of the list being unanimous on any subject ;-) ) > > Andy Lacey > <http://www.minstersystems.co.uk> > > > -----Original Message----- > From: accessd-bounces at databaseadvisors.com > [<mailto:accessd-bounces at databaseadvisors.com>] > Sent: 17 April 2003 00:23 > To: accessd at databaseadvisors.com > Subject: RE: [AccessD] Secured vs. Unsecured FEs > > I had a user inform me that she had tried to make a change to a > table and the database wouldn't let her. The database was split, and she > was trying to make the change to the linked table through the FE. One has > to wonder why any user thinks they have the right to just start modifying > tables, but things like this DO happen. And to then TELL ME that she was > trying to do this... it boggles the mind! > > In most cases I use the split FE/BE, with the FE located on a server > and downloaded by a shortcut on the user's desktop. The user can modify > whatever they want on their copy. The next time they fire up the FE, they > get a clean copy from the server. I usually have a copy on my system at > my office as well. > > John W. Colby > Colby Consulting > <www.ColbyConsulting.com> > > -----Original Message----- > From: accessd-bounces at databaseadvisors.com > [<mailto:accessd-bounces at databaseadvisors.com]On> Behalf Of > Charlotte > Foust > Sent: Wednesday, April 16, 2003 7:13 PM > To: accessd at databaseadvisors.com > Subject: RE: [AccessD] Secured vs. Unsecured FEs > > > When I do independent contracting, that is exactly what I do ... > Unless > the contract specfies otherwise. I learned many years ago that it > was > the only way to protect the application from "curious" users or > those > who had taken a class in Access and were anxious to use what they > learned. <g> > > Charlotte Foust > > > ----------------------------------------------------- > eMailBoss puts you in command of your email. > Get your copy today at <http://www.eMailBoss.com> << File: > ATT00022.txt >> << File: ATT49323.txt >>