Further Reading


As you might expect, there is never enough information when it comes to powerful products like Access. To assist you with further investigations, I have put together a Web page with links to Web sites and articles on the issues relating to the material in this chapter. This page includes the following:

  • The location of the Jetutils.exe download.

  • The latest and the free versions of the Access Workbench, as discussed in Appendix B.

  • White paper on Understanding Microsoft Jet Locking (LDB Files) by Kevin Collins.

  • Where to find the Total Access Admin product from FMS.

  • Article on how to use ADO to return a list of users connected to a database (JetUserRoster).

  • Papers that discuss the .LDB file and how it works.

  • Articles on record locking.

  • More on the Jet roster and a technique to identify users.

  • Use Connection Control to Prevent User Log On at Run Time in Access 2000 (Microsoft Knowledge Base Article No. 198756).

  • How to troubleshoot corruption issues to reduce suspect state and connection problems.

  • Access passwords, workgroups, and ADO and customized connection strings.

  • How to Shut Down a Database Remotely (Microsoft Knowledge Base Article No. 304408).

  • New features in ADO, ADOX, and JRO, including the Jet UserRoster.

  • API to Retrieve the Windows User ID (Microsoft Knowledge Base Article No. 152970).

  • API to Retrieve the Computer Name (Microsoft Knowledge Base Article No. 148835).

  • How to detect idle time or inactivity.

  • Learn about ADO and find the latest downloads.

You can find the further reading Web page for this chapter in the Downloads section of the Apress Web site ( http://www.apress.com ) or at the following address: http://www.vb123.com/map/log.htm .




Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net