None of the methods previously mentioned or those I add below will deter a
determined hacker or someone that is serious about causing serious damage to
your data. But if you use a combination of them, you can deter most users
from getting direct access to the data.
In addition to the ideas mentioned in the third hyperlink below, I
occassionally do:
1. Change the file name extension from mdb or accdb to something less
obvious. You can still link to files with a file name extension that does
not match the standards, but this makes it more difficult for someone to find
your data.
2. Occassionally, I have created a "Admin.mdb" file which contains a single
table with the network userids of the individuals who have permission to open
my backend data files. I generally put this file in an obscure folder that
my "users" don't know about. Then, in the backend data file, I use the
startup() function mentioned in the techrepublic article to check to see
whether the userid of the person attempting to open the backend is in my
Users table in the Admin mdb file. If not, I close the application.
3. Another method I have used is store the UNC path of the backend database
as a property within the front end. I add a table which contains the names
of the tables to be linked to the application, and I relink these tables
every time the application loads, and drop them from the FE everytime the
application closes. This can be a bit annoying if you have a lot of tables,
but the benefit is that your users will have a more difficult time
identifying just where the backend data resides. Obviously, this will not
help if your users have access to the database window or navigation pane.
HTH
Dale
David said:
These should get you started. If you're not too far along, you may want to
consider using SQLServer Express (its free BTW). I'm pretty much to the point
where from here on out, I'll be using it instead of an Access backend.
http://www.xs4all.nl/~sbpoley/tech/access-security.html
http://support.microsoft.com/default.aspx/kb/132143
http://blogs.techrepublic.com.com/10things/?p=552
[quoted text clipped - 8 lines]