Francisco H Tapia
my.lists at verizon.net
Thu Nov 13 10:45:13 CST 2003
On the Access-L list they used to say: Read the Security FAQ, read it again, until you think you've got it, and once you're sure, you read it again for good measure. ;) this was true when I got started, and as a guide I have always re-read it before diving into security even tho I've learned most of the steps. -- -Francisco paul.hartland at fsmail.net wrote: >Is there a category for knowing that access has built in security, has tried to get it to work, has never got it to work, and has given up on it unless I get a brainwave and step-by-step idiots guide on it. >Paul Hartland > > > >Message date : Nov 13 2003, 09:27 AM >>From : Roz Clarke >To : 'Access Developers discussion and problem solving' >Copy to : >Subject : RE: [AccessD] POLL: Access Security >I guess I fit in this category as well as #3 > >:) > >Roz > >-----Original Message----- >From: Andy Lacey [mailto:andy at minstersystems.co.uk] >Sent: 13 November 2003 09:21 >To: 'Access Developers discussion and problem solving' >Subject: RE: [AccessD] POLL: Access Security > > >Snap. Put me in Andrew's no 6 category. See, we even roll-our-own >categories. > >Andy Lacey >http://www.minstersystems.co.uk > > > >>-----Original Message----- >>From: accessd-bounces at databaseadvisors.com >>[mailto:accessd-bounces at databaseadvisors.com] On Behalf Of >>Haslett, Andrew >>Sent: 13 November 2003 01:16 >>To: 'Access Developers discussion and problem solving' >>Subject: RE: [AccessD] POLL: Access Security >> >> >>6) I don't use the built in security functions of Access. I >>Use MDE's and roll my own security depending on the >>requirements of the client. >> >>-----Original Message----- >>From: John W. Colby [mailto:jcolby at colbyconsulting.com] >>Sent: Thursday, 13 November 2003 11:30 AM >>To: AccessD >>Subject: [AccessD] POLL: Access Security >> >> >>I'd like to take a poll regarding your knowledge of Access' >>built-in security. By security I do NOT mean the database >>properties, rather using workgroups / users to secure forms, >>tables, queries etc. >> >>Anyone interested in participating please choose one of the following: >> >>1) I am an Access security guru. I can quickly and easily >>lock a database down so tight I can't even get back in. No >>help / books needed. >>2) I am fluent with Access security. I can get the job done >>but it definitely takes a few hours. I probably won't need >>the help / books. >>3) I have done Access Security on at least one real paying >>project. I would need help / books to do it again. >>4) I have heard about Access Security, read about it, managed >>to shoot a toe off, maybe played around with it, but I am >>confident I could get the job done. Books / help definitly needed. >>5) Access has built in security? What is this and where >>would I go to learn it? Why haven't I ever seen these books / help? >> >>If you would please just select a number and reply I would >>appreciate it. >> >>As for myself, I must admit I rate a solid 4. No client has >>ever been willing to pay for it and I have always had other >>things to learn / do so I just never did it (for real). >> >>John W. Colby >>www.colbyconsulting.com >> >> >> >>