In the next chapter, we will explore a gold-plated security method plus a few additional tricks to distract that database snoop whom we spend so much time worrying about. Some of the techniques that we will cover:
Compiling a version of our database into MDE format to provide the best possible security for the programmable parts of the application.
Disguising our queries behind forms and even using queries to remove linked tables from our databases.
Making our forms and reports launch as objects so that the forms cannot be placed in design mode.
Discussing the User-Level Security wizard and how it affects other objects.
We're in the home stretch for Access protection and security, and a few of these topics are just additional and interesting padlocks for a well-locked database.