Jim Lawrence (AccessD)
accessd at shaw.ca
Thu Nov 13 10:01:10 CST 2003
Hi All: This security thing can go a little overboard. If your applications have sensitive data and provides access from the general public no one will ever use a standard computer terminal and Access's MDB as the BE, it is just too flaky. SCO Unix had a 'Yellow Book' setting that when toggled basically made the system inaccessible and consumed all the system resources monitoring every access, every task performed and continually validated every user, again and again. The system now became a monster to handle and even to do the simplest of tasks, for the systems guy, could take an hour. (Everyone in that office was delighted when the data was backed up and the server was reformatted and the system re-installed.) My point is, that sometimes super tight security is a waste of time. A good talk by the office manager on how he/she will whack the first person who screws with things, without authorization, is the best security of all. Jim -----Original Message----- From: accessd-bounces at databaseadvisors.com [mailto:accessd-bounces at databaseadvisors.com]On Behalf Of Elam, Debbie Sent: Thursday, November 13, 2003 6:08 AM To: 'Access Developers discussion and problem solving' Subject: RE: [AccessD] POLL: Access Security 2 Have had a whole series of HR databases with sensitive data that needs locked tight. It takes me a while and I avoid it if I can. Secured databases are a PITA. I inherited a database locked so tight it was darn near impenetrable. All of this for info that was common knowledge in the workplace and not all that sensitive outside it. The thing is nearly impossible to modify or troubleshoot and I would love to give the guy that wrote this a piece of my mind. Debbie -----Original Message----- From: John W. Colby [mailto:jcolby at colbyconsulting.com] Sent: 13 November 2003 01:00 To: AccessD Subject: [AccessD] POLL: Access Security I'd like to take a poll regarding your knowledge of Access' built-in security. By security I do NOT mean the database properties, rather using workgroups / users to secure forms, tables, queries etc. Anyone interested in participating please choose one of the following: 1) I am an Access security guru. I can quickly and easily lock a database down so tight I can't even get back in. No help / books needed. 2) I am fluent with Access security. I can get the job done but it definitely takes a few hours. I probably won't need the help / books. 3) I have done Access Security on at least one real paying project. I would need help / books to do it again. 4) I have heard about Access Security, read about it, managed to shoot a toe off, maybe played around with it, but I am confident I could get the job done. Books / help definitly needed. 5) Access has built in security? What is this and where would I go to learn it? Why haven't I ever seen these books / help? If you would please just select a number and reply I would appreciate it. As for myself, I must admit I rate a solid 4. No client has ever been willing to pay for it and I have always had other things to learn / do so I just never did it (for real). John W. Colby www.colbyconsulting.com _______________________________________________ AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com _______________________________________________ AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com - JENKENS & GILCHRIST E-MAIL NOTICE - This transmission may be: (1) subject to the Attorney-Client Privilege, (2) an attorney work product, or (3) strictly confidential. If you are not the intended recipient of this message, you may not disclose, print, copy or disseminate this information. If you have received this in error, please reply and notify the sender (only) and delete the message. Unauthorized interception of this e-mail is a violation of federal criminal law. This communication does not reflect an intention by the sender or the sender's client or principal to conduct a transaction or make any agreement by electronic means. Nothing contained in this message or in any attachment shall satisfy the requirements for a writing, and nothing contained herein shall constitute a contract or electronic signature under the Electronic Signatures in Global and National Commerce Act, any version of the Uniform Electronic Transactions Act or any other statute governing electronic transactions. _______________________________________________ AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com