Kath Pelletti
SDSSoftware at optusnet.com.au
Wed Nov 12 19:50:57 CST 2003
No - I have (years ago) trained advanced users in Access security over and over again, so the basics had to become second knowledge to me. I was asked by a client when writing a large-ish system to specifically use security so I did that. I have helped clients who have secured databases with setting up shortcuts to specifically call their mdw files, as they often have several mdb's secured and several mdw's. I have helped clients who have corrupted their system mdw's restore them back etc etc. So it may take me some basic revision now that I do not use it (my choice and totally my preference) but not much. Kath ----- Original Message ----- From: John W. Colby To: Access Developers discussion and problem solving Sent: Thursday, November 13, 2003 12:33 PM Subject: RE: [AccessD] POLL: Access Security Kath, Pardon me if I seem incredulous but you are saying that you have used Access Security once, three years ago, but could secure a database in a few hours without referencing any books or help? Is this the same security I am looking at? Am I making it harder than it is? John W. Colby www.colbyconsulting.com -----Original Message----- From: accessd-bounces at databaseadvisors.com [mailto:accessd-bounces at databaseadvisors.com]On Behalf Of Kath Pelletti Sent: Wednesday, November 12, 2003 8:26 PM To: Access Developers discussion and problem solving Subject: Re: [AccessD] POLL: Access Security Yeah - I would be a 2, but unless the client specifically insists on that form of security (it did happen once but 3 years ago) I use my own login / security procedure. Kath ----- Original Message ----- From: Haslett, Andrew To: 'Access Developers discussion and problem solving' Sent: Thursday, November 13, 2003 12:15 PM Subject: RE: [AccessD] POLL: Access Security 6) I don't use the built in security functions of Access. I Use MDE's and roll my own security depending on the requirements of the client. -----Original Message----- From: John W. Colby [mailto:jcolby at colbyconsulting.com] Sent: Thursday, 13 November 2003 11:30 AM To: AccessD Subject: [AccessD] POLL: Access Security I'd like to take a poll regarding your knowledge of Access' built-in security. By security I do NOT mean the database properties, rather using workgroups / users to secure forms, tables, queries etc. Anyone interested in participating please choose one of the following: 1) I am an Access security guru. I can quickly and easily lock a database down so tight I can't even get back in. No help / books needed. 2) I am fluent with Access security. I can get the job done but it definitely takes a few hours. I probably won't need the help / books. 3) I have done Access Security on at least one real paying project. I would need help / books to do it again. 4) I have heard about Access Security, read about it, managed to shoot a toe off, maybe played around with it, but I am confident I could get the job done. Books / help definitly needed. 5) Access has built in security? What is this and where would I go to learn it? Why haven't I ever seen these books / help? If you would please just select a number and reply I would appreciate it. As for myself, I must admit I rate a solid 4. No client has ever been willing to pay for it and I have always had other things to learn / do so I just never did it (for real). John W. Colby www.colbyconsulting.com _______________________________________________ AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com IMPORTANT - PLEASE READ ******************** This email and any files transmitted with it are confidential and may contain information protected by law from disclosure. If you have received this message in error, please notify the sender immediately and delete this email from your system. No warranty is given that this email or files, if attached to this email, are free from computer viruses or other defects. They are provided on the basis the user assumes all responsibility for loss, damage or consequence resulting directly or indirectly from their use, whether caused by the negligence of the sender or not. _______________________________________________ AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com _______________________________________________ AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com _______________________________________________ AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com