Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: The Access Protection and Security Driving Instructions
Figure 1-1: The demonstration database for Access 2002.
Figure 1-2: The permissions on a folder that a normal Access database uses.
Figure 1-3: The invaluable Google Groups tab.
Figure 1-4: Garry's security journey found him working on databases in the Gobi Desert.
Chapter 2: Protecting Your Database with Startup Options
Figure 2-1: Opening the startup options on the Tools menu.
Figure 2-2: The startup options available for Access 97.
Figure 2-3: The Main Switchboard startup form in the Northwind sample database.
Figure 2-4: The Database window makes the data and objects easily accessable to everyone.
Figure 2-5: Selecting the AllowToolbarChanges option will give your users access to most options.
Figure 2-6: The
frmStartupProperties
enables you to change the startup settings in code.
Figure 2-7: The users group does not have Administrator permission for the database.
Figure 2-8: Opening the Northwind database.
Figure 2-9: Setting up the Autokeys macro to make getting around Access a little easier.
Chapter 3: Using Database Options and Attributes to Protect Data and Objects
Figure 3-1: Choose the database options from the Tools menu.
Figure 3-2: The Access 2002 General tab with the most secure settings selected.
Figure 3-3: The MRU list reveals the location of databases that you have visited.
Figure 3-4: The Summary tab of database properties.
Figure 3-5: The summary information is visible if you hover over the file in Windows XP.
Figure 3-6: The MSysCompactError table shows problems with compacting.
Figure 3-7: The erroneous lines with "###" entries caused the Compact process to fail.
Figure 3-8: This form demonstrates the VBA code to change the General tab options.
Figure 3-9: The Access 2002 Edit/Find tab options, shown with the most secure settings selected.
Figure 3-10: This form demonstrates the VBA code required to change the Edit/Find tab options.
Figure 3-11: When you run an Insert query, you must confirm the action by responding to a prompt.
Figure 3-12: Access 2002 Advanced tab with the most secure settings selected.
Figure 3-13: This form demonstrates the VBA code required to change the Advanced tab options.
Figure 3-14: Right-click a table, query, form, report, macro, or module and choose Properties.
Figure 3-15: Select the Attributes Hidden check box to hide the object.
Figure 3-16: The Access 2002 View tab with the most secure settings selected.
Figure 3-17: The Object Browser makes hidden modules visible. Example is from Access 97.
Figure 3-18: The Project Explorer window enables you to navigate to all modules and code in your project.
Figure 3-19: This form demonstrates VBA code options for system tables, hidden objects, and temporary tables.
Figure 3-20: Hiding a column in a table or a query can help protect your information.
Chapter 4: Providing a Solid Foundation with Good Programming Practices
Figure 4-1: The AutoExec macro in the demonstration database includes a call to a function.
Figure 4-2: The Database Splitter wizard in action. Heed the warnings!
Figure 4-3: Enter the destination of the back-end database.
Figure 4-4: Arrows next to table names denote linked tables.
Figure 4-5: Update the links by clicking the Select All button.
Figure 4-6: The
frmRelinkDatabase
demonstration form.
Figure 4-7: The
frmErrorHandling
form demonstrates the error handling for VBA code.
Figure 4-8: When an error occurs, the error handler displays a message box.
Figure 4-9: This message box is a result of no error handling.
Figure 4-10: The Allow Viewing Code After Error check box in Access 97.
Figure 4-11: The disabled Debug button in Access 97.
Figure 4-12: Viewing the code in break mode.
Figure 4-13: Access help has a lot of material on linked tables.
Chapter 5: Backing up and Recovering Your Databases
Figure 5-1: Testing whether you have exclusive access to a database.
Figure 5-2: Backing up files on a regular basis is essential.
Figure 5-3: Adding the database to a .ZIP file.
Figure 5-4: Choosing to compact a database for backup purposes.
Figure 5-5: Selecting a new folder and entering a name that reflects that the database is a backup.
Figure 5-6: The exported comma-delimited file viewed in a text editor.
Figure 5-7: The second window of the Import Text wizard.
Figure 5-8: The Shippers table from the Northwind database in XML format.
Figure 5-9: The text file that can reload the tables into a blank database.
Figure 5-10: The
SaveAsText
and
LoadFromText
methods viewed in the Immediate window.
Figure 5-11: The Back Up All Objects to Text form.
Figure 5-12: The message that appears to tell you where the files went and how to recover them.
Figure 5-13: Folder showing all the objects exported to individual files.
Figure 5-14: The Product Sales query after being exported to a backup text file.
Figure 5-15: The VBA recovery file that helps import all the objects into a blank database.
Figure 5-16: The database documentor output shows important database properties.
Figure 5-17: The relationship window, which you can print as part of your backup material.
Figure 5-18: The Import Objects wizard after the Options button is clicked.
Figure 5-19: The Backup menu command.
Figure 5-20: Access 2003 backup wizard in action.
Chapter 6: User and Object Surveillance
Figure 6-1: The Jet User Roster form, which shows users in a database.
Figure 6-2: Warning received when users try to connect to a database that has been locked.
Figure 6-3: Finding a database from which you require a list of users.
Figure 6-4: LDB Viewer, showing a list of users in a database.
Figure 6-5: The Access Workbench, showing a list of computers in a database.
Figure 6-6: The no security details warning from the Access Workbench.
Figure 6-7: The
frmUserObjectLogs
form shows how to log users and object use.
Figure 6-8: The hidden user logging form.
Figure 6-9: The UserLogs table, which stores logging details at time of entry and exit.
Figure 6-10: A report that shows Windows user ID information.
Figure 6-11: The
rptGR8_UserObjectLogs
report, showing activity for forms and reports .
Figure 6-12: The Windows XP user ID as shown in fast user switching mode.
Chapter 7: Protecting Your Database with Menus and Toolbars
Figure 7-1: Menus, toolbars, and shortcut menus.
Figure 7-2: Customizing toolbars by using the View menu.
Figure 7-3: Customizing toolbars by right-clicking.
Figure 7-4: Naming a new custom toolbar.
Figure 7-5: Selecting the commands that you need for your toolbar.
Figure 7-6: Adding a separator with the Begin a Group command.
Figure 7-7: Converting a toolbar to a menu bar.
Figure 7-8: Dragging New Menu to the menu bar.
Figure 7-9: Adding a form to a custom menu.
Figure 7-10: A custom menu for the Northwind database.
Figure 7-11: The message invoked when you make a toolbar into a shortcut (pop-up) menu.
Figure 7-12: Displaying shortcut menus with other toolbars.
Figure 7-13: A demonstration of a Form View shortcut menu.
Figure 7-14: Adding custom menus and toolbars to your form.
Figure 7-15: The
frmSafeFormMenus
form, which changes all form shortcut and toolbar properties.
Figure 7-16: Adding the Protection menu, which includes forms from the demonstration database.
Figure 7-17: The startup properties, which include information on menus and toolbars.
Figure 7-18: The menu bar at the top of the page, which now becomes your custom menu.
Figure 7-19: Fewer menu items available in the built-in menus.
Figure 7-20: The
frmDisableMenuItems
form, which disables/enables developer commands.
Figure 7-21: The sample software, with disabled commands on the Access built-in menus.
Figure 7-22: - Additional toolbar VBA code in the
frmShowMenus
form.
Chapter 8: Developer Workgroup Security
Figure 8-1: The design for the developer workgroup strategy.
Figure 8-2: Finding the workgroup administrator in the Security submenu in Access 2002 and Access 2003.
Figure 8-3: The first dialog that appears when you run the Workgroup Administrator.
Figure 8-4: The developer workgroup setup information.
Figure 8-5: Inserting a new Admin user password.
Figure 8-6: Adding a new user, called Developer.
Figure 8-7: A user who doesn't belong to the Admins group.
Figure 8-8: Removing the Admins group from the Member Of list box.
Figure 8-9: Renamed user and security commands
Figure 8-10: Building a developer workgroup file.
Figure 8-11: Clearing the Read Design check box in the Permissions area.
Figure 8-12: Changing the ownership of the form to the Developer.
Figure 8-13: The error message issued when an object cannot be imported into another database.
Figure 8-14: A warning message that appears when the user account cannot convert a database.
Figure 8-15: The Convert/Open Database message, which appears when you open a database with a later version of Access.
Figure 8-16: The Change Owner tab shows that the Developer is the owner of the database.
Figure 8-17: The
frmCheckandChangeOwnership
demonstration form.
Figure 8-18: The User and Group Permissions dialog.
Figure 8-19: Database Administer permission stops users from changing the startup options on this dialog.
Figure 8-20: Clearing all permissions for all objects for the Admin user.
Figure 8-21: Removing permissions for objects owned by the Users group.
Figure 8-22: The minimum permissions that should be applied to the Users group.
Figure 8-23: Removing design permission from a module in Access 97.
Figure 8-24: The user account that does not have the permissions will receive this error message.
Figure 8-25: Help in Access 2002.
Chapter 9: Security Concerns, Encryption, and Database Passwords
Figure 9-1: Encrypting/ decrypting a database from the Tools menu.
Figure 9-2: Verifying the ownership of the database.
Figure 9-3: Message that appears when you cannot encrypt and decrypt a database.
Figure 9-4: The Accounts and Groups tables from a workgroup file.
Figure 9-5: A password recovery program, which retrieves complex workgroup passwords instantly.
Figure 9-6: Opening the database in Exclusive mode to add a database password.
Figure 9-7: Setting the database password.
Figure 9-8: The change database password command.
Figure 9-9: Removing Administer permission from the Users group.
Chapter 10: Securing Data with Workgroup Security
Figure 10-1: Making sure that the Developer account owns all the tables.
Figure 10-2: Removing all the permissions for the Database object type.
Figure 10-3: The message that results from completely removing the database object permissions.
Figure 10-4: Checking whether all permissions have been removed for the Admin account.
Figure 10-5: Removing permissions from some tables for the Users group.
Figure 10-6: Error message that indicates that the Admin account can no longer open the table.
Figure 10-7: Setting read-only permission for all tables for the Users group.
Figure 10-8: A table, query, or form in read-only mode.
Figure 10-9: Making a new account that will be used to edit data.
Figure 10-10: Adding a new users group to the database.
Figure 10-11: Adding the Editor user to the Full Data Users group.
Figure 10-12: Granting full data permissions to the Full Data Users group.
Figure 10-13: No permission to open the Categories form due to read data permissions.
Figure 10-14: Right-clicking the Access executable to send a shortcut to the desktop.
Figure 10-15: Modifying the target line of the shortcut by right-clicking the shortcut file.
Figure 10-16: The
frmCmdLine
form, which allows you to mimic shortcut files securely.
Figure 10-17: Page one of the security wizard, where you can select an existing workgroup file.
Figure 10-18: Page two of the security wizard, showing the optional selection of objects.
Figure 10-19: Page three of the wizard, which allows you to choose the different permission schemes.
Figure 10-20: Page four of the wizard, which allows you to assign permissions to the Users group.
Figure 10-21: Page five of the wizard, which allows you to add additional user accounts, passwords, and PIDs.
Figure 10-22: Page six of the wizard, which allows you to allocate users to groups.
Figure 10-23: Saving the unsecured database in the final page of the wizard.
Figure 10-24: A report showing all the security settings and passwords.
Figure 10-25: The report of the workgroup file.
Figure 10-26: The Editor should have no permissions for any table.
Figure 10-27: The Full Data Users group permissions on tables.
Figure 10-28: The Access 97 User-Level Security wizard.
Figure 10-29: The Access 97 Users-Level Security wizard should not look like this.
Figure 10-30: Adding a new group account to the end user's default workgroup file.
Figure 10-31: Adding the Admin account to the group.
Figure 10-32: Multiple users on a single Windows XP home computer.
Figure 10-33: The secure folder where the Access default workgroup file is stored.
Figure 10-34: Other limited accounts cannot look at your personal files.
Figure 10-35: The design view of a RWOP query, showing the Run Permissions properties.
Chapter 11: Object Protection and Security Measures
Figure 11-1: Entering the developer workgroup information into the wizard fields.
Figure 11-2: All users requireRead Design permission for queries.
Figure 11-3: The Open/Run permission for forms.
Figure 11-4: Entering the full path to a database in the Source Database field.
Figure 11-5: A list of tables and queries in the source database.
Figure 11-6: Removing all permissions for the Invoices query for the Users group.
Figure 11-7: Choosing Owners as the query permission property.
Figure 11-8: A form opened as a class object cannot be put in design mode.
Figure 11-9: Protecting the VBA project by a password.
Figure 11-10: Password-cracking software figures out your VBA project password.
Figure 11-11: Changing the location of the database in the Data Link Properties dialog.
Figure 11-12: Changing the System Database property to point to the workgroup file.
Figure 11-13: The Field Pane, showing all tables.
Figure 11-14: The Employees DAP, which now works with user-level security.
Figure 11-15: When users open a data access page, they will need to enter a user name and password to view it.
Chapter 12: Protecting and Securing Your Database with the Operating System
Figure 12-1: Establishing a network share on the
/data/
folder.
Figure 12-2: Entering the details for the network share.
Figure 12-3: The network share, now set up and available to be referenced in the Address bar.
Figure 12-4: Adding new users in the Users and Passwords dialog.
Figure 12-5: Selecting the Restricted User option.
Figure 12-6: The new account, which is now a member of the Users group.
Figure 12-7: The first stage in adding a new group of users.
Figure 12-8: Viewing all the groups on your computer.
Figure 12-9: Adding user accounts to the Group that will edit your databases.
Figure 12-10: The new User account is now a member of two groups.
Figure 12-11: Typing the path to the Network share into the Address bar.
Figure 12-12: Choosing properties to change permissions on a folder.
Figure 12-13: Removing permission from the Everyone group.
Figure 12-14: Adding the two groups to the permissions for this folder.
Figure 12-15: The file and folder permissions.
Figure 12-16: The error that appears when a user account cannot open a folder.
Figure 12-17: Setting up an equivalent user account on the peer-to-peer server.
Figure 12-18: Entering and confirming the password on the peer-to-peer server.
Figure 12-19: Joining this new user to the Access Editors group.
Figure 12-20: Modifying folder permissions for the Access Editors group.
Figure 12-21: The Access control settings for the folder.
Figure 12-22: Selecting a user or group.
Figure 12-23: Selections required to stop a group from browsing the contents of a folder.
Figure 12-24: The Access Editors now have a new deny permissions entry.
Figure 12-25: Confirming that the deny permission is going to take priority.
Figure 12-26: The error received when browsing to a folder that has no listing permission.
Figure 12-27: You cannot browse the folder.
Figure 12-28: A shortcut file that points to a database in a protected folder.
Figure 12-29: Setting up password protection on your logon screen saver.
Previous page
Table of content
Next page
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176
Authors:
Garry Robinson
BUY ON AMAZON
Software Configuration Management
Configuration Verification and Audit
A Practical Approach to Configuration Verification and Audit
Appendix A Project Plan
Appendix I System Service Request
Appendix S Sample Maintenance Plan
Cisco Voice Gateways and Gatekeepers
Securing MGCP Gateways
Description of SIP
Review Questions
Transcoding for CallManager Express
Downloading Tcl Scripts from Cisco.com
Data Structures and Algorithms in Java
Packages and Access Levels
Problems
Vocabulary
External Sorting
C.1. Sum Notation
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 15. Control Your Computer from Your Palm
Hack 40. Stop Moochers from Stealing Your Wi-Fi Bandwidth
Hack 41. Visualize a Network
Hack 84. Spider Omni Antenna
Hack 88. Primestar Dish with Biquad Feed
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Why Master SQL*Plus?
Controlling Variable Substitution
Oracles Data Dictionary Views
Tuning and Timing
The Site and User Profiles
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Working with Ideas
Value Stream Mapping and Process Flow Tools
Voice of the Customer (VOC)
Descriptive Statistics and Data Displays
Reducing Lead Time and Non-Value-Add Cost
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies