Real World Microsoft Access Database Protection and Security
What's Next ?
In the next chapter, we will explore a gold-plated security method plus a few additional tricks to distract that database snoop whom we spend so much time worrying about. Some of the techniques that we will cover:
-
Compiling a version of our database into MDE format to provide the best possible security for the programmable parts of the application.
-
Disguising our queries behind forms and even using queries to remove linked tables from our databases.
-
Making our forms and reports launch as objects so that the forms cannot be placed in design mode.
-
Discussing the User-Level Security wizard and how it affects other objects.
We're in the home stretch for Access protection and security, and a few of these topics are just additional and interesting padlocks for a well-locked database.