Just note that this shouldn't be used for information that must remain
confidential. Anyone who can find these newsgroups can find techniques
for bypassing workbook protection.
I don't know about better, depends on what you are trying to achieve. As
J.E. Pointed out these methods are not particularly secure, and easy to
"crack." If you are just trying to remove intermediate data from "friendly"
users, either will work fine.
I don't know about better, depends on what you are trying to achieve. As
J.E. Pointed out these methods are not particularly secure, and easy to
"crack." If you are just trying to remove intermediate data from "friendly"
users, either will work fine.
Want to reply to this thread or ask your own question?
You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.