Kath Pelletti
SDSSoftware at optusnet.com.au
Wed Nov 12 19:50:57 CST 2003
No - I have (years ago) trained advanced users in Access security over and over again, so the basics had to become second knowledge to me.
I was asked by a client when writing a large-ish system to specifically use security so I did that. I have helped clients who have secured databases with setting up shortcuts to specifically call their mdw files, as they often have several mdb's secured and several mdw's. I have helped clients who have corrupted their system mdw's restore them back etc etc.
So it may take me some basic revision now that I do not use it (my choice and totally my preference) but not much.
Kath
----- Original Message -----
From: John W. Colby
To: Access Developers discussion and problem solving
Sent: Thursday, November 13, 2003 12:33 PM
Subject: RE: [AccessD] POLL: Access Security
Kath,
Pardon me if I seem incredulous but you are saying that you have used Access
Security once, three years ago, but could secure a database in a few hours
without referencing any books or help? Is this the same security I am
looking at? Am I making it harder than it is?
John W. Colby
www.colbyconsulting.com
-----Original Message-----
From: accessd-bounces at databaseadvisors.com
[mailto:accessd-bounces at databaseadvisors.com]On Behalf Of Kath Pelletti
Sent: Wednesday, November 12, 2003 8:26 PM
To: Access Developers discussion and problem solving
Subject: Re: [AccessD] POLL: Access Security
Yeah - I would be a 2, but unless the client specifically insists on that
form of security (it did happen once but 3 years ago) I use my own login /
security procedure.
Kath
----- Original Message -----
From: Haslett, Andrew
To: 'Access Developers discussion and problem solving'
Sent: Thursday, November 13, 2003 12:15 PM
Subject: RE: [AccessD] POLL: Access Security
6) I don't use the built in security functions of Access. I Use MDE's and
roll my own security depending on the requirements of the client.
-----Original Message-----
From: John W. Colby [mailto:jcolby at colbyconsulting.com]
Sent: Thursday, 13 November 2003 11:30 AM
To: AccessD
Subject: [AccessD] POLL: Access Security
I'd like to take a poll regarding your knowledge of Access' built-in
security. By security I do NOT mean the database properties, rather using
workgroups / users to secure forms, tables, queries etc.
Anyone interested in participating please choose one of the following:
1) I am an Access security guru. I can quickly and easily lock a database
down so tight I can't even get back in. No help / books needed.
2) I am fluent with Access security. I can get the job done but it
definitely takes a few hours. I probably won't need the help / books.
3) I have done Access Security on at least one real paying project. I
would
need help / books to do it again.
4) I have heard about Access Security, read about it, managed to shoot a
toe
off, maybe played around with it, but I am confident I could get the job
done. Books / help definitly needed.
5) Access has built in security? What is this and where would I go to
learn
it? Why haven't I ever seen these books / help?
If you would please just select a number and reply I would appreciate it.
As for myself, I must admit I rate a solid 4. No client has ever been
willing to pay for it and I have always had other things to learn / do so
I
just never did it (for real).
John W. Colby
www.colbyconsulting.com
_______________________________________________
AccessD mailing list
AccessD at databaseadvisors.com
http://databaseadvisors.com/mailman/listinfo/accessd
Website: http://www.databaseadvisors.com
IMPORTANT - PLEASE READ ********************
This email and any files transmitted with it are confidential and may
contain information protected by law from disclosure.
If you have received this message in error, please notify the sender
immediately and delete this email from your system.
No warranty is given that this email or files, if attached to this
email, are free from computer viruses or other defects. They
are provided on the basis the user assumes all responsibility for
loss, damage or consequence resulting directly or indirectly from
their use, whether caused by the negligence of the sender or not.
_______________________________________________
AccessD mailing list
AccessD at databaseadvisors.com
http://databaseadvisors.com/mailman/listinfo/accessd
Website: http://www.databaseadvisors.com
_______________________________________________
AccessD mailing list
AccessD at databaseadvisors.com
http://databaseadvisors.com/mailman/listinfo/accessd
Website: http://www.databaseadvisors.com
_______________________________________________
AccessD mailing list
AccessD at databaseadvisors.com
http://databaseadvisors.com/mailman/listinfo/accessd
Website: http://www.databaseadvisors.com