Max Wanadoo
max.wanadoo at gmail.com
Mon Mar 16 11:12:34 CDT 2009
Hi William, I would say that in normal cases the FE is an mde so stealing it wouldnt be much good without taking the BE as well. It can only be taken if the envrypted volume is mounted otherwise they are taking garbage effectively. It can only be mounted by a user who knows the password and is sittting at that computer. FE drives (in my case z:\) are not shared across the net althought the BE (\\server\z::) is. That too has to be mounted to see data. Both the FE and BE are password protected and the functionality within it is determined by the level of access granted to the individual user. So to get to full usability the larcenist will need to have top level clearance. What you could also do, if you wanted to incur the overhead is that immediately on startup the FE unlinks the tables and then relinks them. If the BE is not mounted/available then they are left with a FE with no tables. I dont do this automatically but I do have a function to do it on request and this is done via a system table which holds the database/table details and then runs through that linking them in - so the most info this would give would the the names of the tables objects but no content. So, instide the system it can be taken by a trusted user. Outside the system, probably not. HTH Max On Mon, Mar 16, 2009 at 2:16 PM, William Hindman < wdhindman at dejpolsystems.com> wrote: > ...after reading your doc, does this deter a normal system user from > copying > the database to a usb or cd and viewing the data on an outside system? > William > > -------------------------------------------------- > From: "Max Wanadoo" <max.wanadoo at gmail.com> > Sent: Monday, March 16, 2009 4:43 AM > To: "Access Developers discussion and problem solving" > <accessd at databaseadvisors.com> > Subject: [AccessD] Securing My App FrontEnd > > > Hi all, > > Many thanks for those who helped me over the weekend. I have now adopted > > a > > strategy to secury my application. This is outline in the document at > > http://www.peoplelinks.co.uk/MyAppsSecurity.pdf. > > > > I would appreciate any comments and feedback. > > > > Having worked on it and tested it on my home PC over the weekend (with > the > > help of you guys), I now have to trial it on a work PC to see if it all > > hangs together in a work environment. > > > > The document quoted will then be updated in the light of what happens > > next. > > Once I get the FE secure, I will do something similar to the BE. > > > > Thanks > > Max > > -- > > AccessD mailing list > > AccessD at databaseadvisors.com > > http://databaseadvisors.com/mailman/listinfo/accessd > > Website: http://www.databaseadvisors.com > > > > -- > AccessD mailing list > AccessD at databaseadvisors.com > http://databaseadvisors.com/mailman/listinfo/accessd > Website: http://www.databaseadvisors.com >