Potential Security Problems

Oct 6, 2006

Hello,

I run a large database using Access for compiling cricket statistics. The database was made by a friend in South Africa. Recently I asked him for an added feature to renumber the files etc, and he send me an e-mail with a file renum.mdb.

For some reason I cannot open this file, the message I get is:

Microsoft Access cannot open this file.

The file is located outside your intranet or on an untrusted site. Microsoft Access will not open the file due to potential security problems.

To open the file, copy to your machine or an accessible network location.

I am not too technical when it comes to these issues, is there anyone out there who could help, I would be very grateful.

Victor

View Replies


ADVERTISEMENT

Access 2013 - A Potential Security Concern Has Been Identified

May 19, 2015

I have created a new database which i have split using the database splitter creating two files, the front end (.accdb) and the back end (.accdc)

The front end works find it allows me to input data and can be used my multiple users as once,however when i come to add a new table or new field within an existing table i get the following error when opening the .accdc:

currently the database in on my C drive however i have also tested it on the network and i am still having issues?

i have edited the access trust settings and trusted both the c drive and the network directory yet i am still having no luck?

View 4 Replies View Related

Potential Recordset Problem

Jul 26, 2006

I have customers, projects and work tables.
projects are linked to customer via customerid and work is linked to the project via projectid.

Ok..

What I'm trying to do is make a timesheet so that work done for a specific date for any project can be retrieved and concatenated into a string or put in row by row into a listbox.

As far as I'm aware, Dlookup only returns the first record, so if there was work done on more than one day for a different project, it won't retrieve it.
So that leaves Recordsets, I am a complete beginner when it comes to recordsets.

I haven't found any decent tutorials or helpful posts anywhere, so any help that you guys could give would be awesome.

Thanks
Bob

View 1 Replies View Related

Prompting User To Accept Or Decline Potential Duplicates While Importing Excel Table?

Jun 28, 2013

I have a database table to which I will be adding multiple records from various other contributors. I would like to build a simple, import-friendly excel table that I can mail out to others, so that they can fill it out and send it back to me. Then I will save import steps as a macro or something similar, so that I can easily import their data.

The hard part is that I would like a way for Access to compare the new records with the existing records, identify potential duplicate records by predetermined criteria (in other words, 'wild-carded' to some level of specificity, since duplicates could be off by just a few characters), and then prompt me to examine each record to be imported alongside however many existing records that have been identified as potential duplicates. Then I as the user could:

1. accept the import record as a new record

2. decline importing that record since it is a duplicate of an existing record, or

3. edit by hand an existing record that is a duplicate of the proposed import, but may require additional information, and then decline to import the new one.After each prompt, I would like the import process to continue to the next potential duplicate, and when there are no duplicates, to complete the import and display a message box that says "Import complete".

View 6 Replies View Related

Advice For Security & Question On Built In Access Security

Mar 26, 2007

I've read and gone though quite a few of the scrips and examples for creating logins and security and i'm getting to the stage when i need to have good understanding of the different methods.

Some of the examples whilst create a user login do not really allow for security within the database whilst the build in security wizard would appear to offer that functionality.

I am thinking that I will use the Workgroup file and that method. My question is am i able to utilise the fact that if a person 'AdamA' logs onto the database which is built into the workgroup security file. am I then able to take 'AdamA' to populate a table which records actions by a user? (I can't seem to find any thread or book reference to doing this)

View 4 Replies View Related

Add Security To A Table If Table Is Created After Initial Security Is Set Up

Oct 26, 2011

Is it possible to do this through vba. If security is setup for all the tables and a user goes in and creates a new table, can that table have security applied to it using code?

So maybe the creator of the table has read/write privileges but everyone else only has read only.

View 3 Replies View Related

Help Me About SECURITY???

Jul 1, 2005

:confused: I can't access my database. I used many tools to scan my database password, and I had many results but I can't used any one.
This's my database. Can you help me?

View 1 Replies View Related

Security

Aug 28, 2005

Hi

I am experimenting in creating security of a database, and elements within.

I started by creating a user account with a password. I then made a few mistakes, so wanted to delete the mdb, and start again.

However, when I now try to create a new database, or even open a pre existing database, I am asked for the user and password created in the now-deleted mdb.

Apart from the fact that it shouldn't ask for the user name and pasword created in the first database, I am sure it doesn't accept the password I intered in creating the account.

The easy solution would be to delete the file where Access stores user accounts. Where is it, and is it protected, such that I can't delete it? And even if the user name and password still exists somewhere, it should only apply to the database in which it was created, shouldn't it?

Thanks
Robert

View 2 Replies View Related

DB Security

Nov 10, 2005

Hi all,

Just looking for a little advice on data protection. I have a split database which is accessed from the front end (forms only). All data is stored on the back end, which is hidden away from the user.

The database is password protected, and both sides use a login authentication to avoid unwanted access. However, the usernames and passwords are easily retrievable by opening the database a text document.

Any ideas on how to make this more secure?

Cheers

sys

View 1 Replies View Related

Security

Dec 3, 2005

I try to play Security.

After I created it, the shortcut is created on the screen.
Everytime needs to click the shortcut to login it.

But, when I go to database file, and then click it, it does not work, it will show the following message:

You do not have the necessary permissions to use the <name> object. Have your system administrator or the person who created this object establish the appropriate permissions for you. (Error 3033)
You do not have the necessary permissions for the specified object. To change your permission assignments, see your system administrator or the object's creator.

So, is it ony the shortcut to login it?
if delete the shortcut uncarefully, how to do it??

Thanks.

View 2 Replies View Related

Security

Dec 7, 2005

Hi,

Problem 1:
I setup a security, stored the security file and other files in the drive D:

it works.

after I move the files to the drive C:, then it doesn't work.

Why it doesn't work?

Problem 2:
After I created security, there are acc.mdb, acc.bak, and Secured files, right.
how can I add this link:
"C:Program FilesMicrosoft OfficeOffice10MSACCESS.EXE" "D:acc.mdb" /WRKGRP "D:Secured.mdw" in the target to the acc.mdb file.

Because when it doesn't work, and then I created a shortcut of the acc.mdb file, then add the above code. Then it works, it give out the prompt.

Does any method instead of this, better than this?

Please let me know, thanks.

View 1 Replies View Related

Security

Dec 14, 2005

Hi
When using security login, can we logout and then login to the database without shutting down the database and re-opening.

Such as using a button to logout and then another to login.


Dave

View 2 Replies View Related

Security

Jan 17, 2006

Can some one help me?

I am trying to set up a database in which the the table portion is password protected but the query section can be manipulated or updated as users see fit. Does anyone know how to do this?

Thanks, S

View 1 Replies View Related

Security

May 5, 2006

Hi,

I have now finished my system that will run on a windows network. I now need to get the security setup so different users can access different pages.

I have set a list of users and specified what forms/tables they can access. The problem is, how does access know who is accessing the pages? For example, i have set 2 users - Dave G & Dave S - I have given Dave G access to the admin forms as he is the admin and I have given Dave S access to the general data input forms.

How is this enforced? How does access know which person is opening the forms. Unless access asks the user to login using their user name set in access, I cannot see how it can manage what users can do what.


Thanks

View 3 Replies View Related

Security HELP!!!!!

Jul 18, 2006

I have locked down my welding data base and had some problems arise mabe someone eles has had this problem. All of the tables in other data base that are linked to the welding data base now will not allow me to utilize them I get the error message that I do not have rights too that information. Even though I have full access rights to the welding data base and can make changes at will.

Why can't I do any thing to the others? HELP!!!!!

View 5 Replies View Related

WID Security

Aug 18, 2006

First of all, i am pretty new to this....

We have a few access databases in a network. More and more people in our organization are using the databases so I am learning to create some user-level security.

We have access 2000.

Access links to a WIF to create user-level security.

But I think there is an easy way that anyone can get pass that.

Even if I have set all the groups and users privileges and restrictions, anyone can simply switch from one WIF to another WIF, then they would have changed all their privileges and restrictions.

Am I understanding this correctly?

If so, what can I do better secure the database.

Another question:
How can I prevent someone from simply copy/delete the access file from windows? I am afraid that someone, maybe a disgruntled employee or even myself making stupid mistakes, delete the whole access .mdb file, and I would loss everything.

I do backup the file, but even if I back it up every night, if something like this happens, i would have lost a whole day of work.

Your advice are highly appreciated.

Thank you all for your help.

View 1 Replies View Related

Security

Aug 22, 2006

Hi,

I followed the security wizard and everything worked fine. However, when I move the database to another computer or another folder, it prints this message:

'You don't have the necessary permission to use (path)...'

Is there anyway to avoid this please?

Thanks,
B

View 14 Replies View Related

Security

Nov 22, 2006

Access security is really very confusing, thought I had conquered it but I was wrong. I have been playing with a test DB. How on earth do you reset a password for a user? I just can't see where you go to assign a new password.
Managed to clear the password but then got stuck.
Cheers
RussG

View 2 Replies View Related

Asking For Security

Dec 12, 2006

Hi,

I have a question for user-level security and workgroup.

Suppose we setup user-level security and have a workgroup with storing all username, password, and groups,
if adminstrator want to change one user permission, let's say that change the user permission from update to read permission only, then the user should only have read permission, right. However, previously, the user copied the workgroup file himself before adminstrator change his permission, if he apply to his copied workgroup file, and log in the database, he can still have update permission.

So, how do I prevent the user using his copied workgroup file for the database?

How can I solve it?

Thanks.

View 4 Replies View Related

Security

Jul 22, 2007

Hi again

The security on my database so far is justthe standard everyone has a user name and a password, no one can alter the design of a form apart from me

I am just wondering if there is any way that I can prevent people viewing and altering tables, queries etc. It would be good if when the open the database the main form comes up so they can navigate from that and they are always taken back to this and they can never see the database window

Does this have anything to do with front end and back end databases?

Sorry its a bit vauge but hopefully you will know what I mean

thanks

View 5 Replies View Related

Security DB

Jul 25, 2007

I want to maintain my database work log i.e., who ever opens the database (not through application) and changing the table should be saved in work log. Any way to acheive this?

View 1 Replies View Related

Security

Oct 30, 2007

Can anyone help?

I want to secure a database with two types of access:
1. Those that can view all data and make changes
2. Those who can view selective data
I have tried the wizards, and find them difficult to follow.

Any ideas
Thanks
Steve

View 1 Replies View Related

Security

Oct 30, 2007

Can anyone help?

I want to secure a database with two types of access:
1. Those that can view all data and make changes
2. Those who can view selective data
I have tried the wizards, and find them difficult to follow.

Any ideas
Thanks
Steve

View 3 Replies View Related

Security Key

Jan 25, 2008

Since this message board doesn't have a security forum yet :) I will just post this here:
Does anyone know if there is a windows or system event I can check for to find out if something has been removed from a USB or parallel port? My program reads the code from the key at startup (there are USB and parallel versions of the key), and the program quits if the key is not found or the code is expired, but what if the user puts in the key, starts the program, and then removes the key? I thought of putting the keycode checking module on a timer that runs every minute or so, but that seems like a rather painful way of doing it. I thought maybe I could just run the code if a system change is detected . . . any ideas?

View 5 Replies View Related

Security Help!

Jan 31, 2008

I am creating a database for use on a network. I have made a workgroup file for security purposes. I have made a shortcut that links to the workgroup file and database so it opens with the security passwords. However, if you open the shortcut properties, it shows where the database file itself is saved. A user could look at these properties, find out where the database is, go to that location, and open the database bypassing the security. How can I secure either the shortcut or database file itself so people cannot find out where the database is located and open without using the workgroup file security????

View 1 Replies View Related

DB Security

Feb 13, 2008

I know this question has been brought up a million times on here and I have done searches but everyone always refers to using the Workgroup Administration within Access to provide user level security. I have a database which uses this type of security but basically it is a complete pain in the backside. I run half a dozen databases off my computer and I have to change my workgroup file every time I open a new DB because I need to have different security settings on each DB.

Is there a way of securing a database without using the Workgroup option?

I found this but its not really any use because all it does is list the code for it and there are no step by step instructions for noobs like me - http://www.blueclaw-db.com/microsoft_access_security.htm

View 3 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved