Index_U


U

ubiquitous Users group , 355
allowing read-only rights for, 315 “17, 334
care with permissions assigned to, 313
denying access to tables for, 322
explanation of term , 309
removing permissions granted to, 367, 375
and User -Level Security wizard, 334, 336
UNC (universal naming convention), 95 “96
Understanding Microsoft Jet Locking (LDB Files) , 172
universal naming convention (UNC), 95 “96
update of this book, 21
upgrading
preventing, 265
whether assists in security, 17
Use Access Special Keys option, 30
User Accounts wizard, 427
User and Group Permissions dialog, 368, 370
user and object surveillance, 161 “96
Access Workbench program, 173 “76
checking for users who skip startup sequence, 191 “93
further reading, 193 “95
Jet User Roster form, 163 “69
preventing more users from logging on, 165 “66
retrieving user roster by using VBA code, 166 “69
LDBView utility, 169 “73
logging Windows users, computers, and Access accounts, 176 “82
completing user log, 180 “82
initiating user log, 178 “80
overview, 176 “78
overview, 161 “62
recording when objects are opened, 182 “87
retrieving computer name , 187 “88, 189 “90
retrieving Windows user ID, 187 “89
retrieving workgroup user name, 187 “88, 190 “91
using VBA code to log use of individual Access forms and reports , 184 “87
user commands, renaming, 254 “55
User_FX function, 179
User-Level Security Wizard
for Access 2000 (or Later)
results of, 340 “43
steps to protecting data with, 334 “40
for Access 97, 343 “45
UserLog table, 191, 195
Users and Groups dialog, 415, 416, 417
Users and Passwords dialog, 413, 415, 416
Users group, 243
adding new user to, 250
Admin account as member of, 253
changing permissions, 238 “39
clearing Open /Run permission for, 275 “76
Full Data Users group
permissions to access data, 321
permissions to change data in database, 336
removing permissions granted to, 375
reviewing permissions, 342
and password protection with workgroup security, 300 “301
ubiquitous Users group, 355
allowing read-only rights for, 315 “17, 334
care with permissions assigned to, 313
denying access to tables for, 322
explanation of term, 309
removing permissions granted to, 367, 375
and User-Level Security wizard, 334, 336
using permissions to tame, 278 “82
USys prefix, 70



Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net