Solved

VB and Access

Posted on 1999-01-25
6
181 Views
Last Modified: 2012-05-04
Kind of a two part question here it goes. When using VB cna you access an Access DB? I am pretty sure you can but is the Access DB then become part of the VB executable or is it still an Access MDB file? Any way to make this unnaccessable to the typical user who has Access? Part two: Is using a DB the best method for data storage, or would a different type of data file storage be a better solution?
0
Comment
Question by:bartman26
  • 3
  • 2
6 Comments
 
LVL 3

Accepted Solution

by:
traygreen earned 50 total points
ID: 1470697
1)Yes you can attach to an Access .MDB file from VB using either bound or unbound controls w/ RDO/ADO or DAO.
2)No the MDB file will still be a seperate file.
3)The only thing you can do, to the best of my knowelege is to password protect the database.
4)What is best is often an exercise in what works best for you.  Both in terms of implementation and end product functionality.  DB files will provide a lot of functionality in a short manner of time.  If #3 (security is more of an issue to you) you might look at other possibilities such as up-scaling to MS Sequel or going to encrtpyted flat files
0
 

Expert Comment

by:Kory
ID: 1470698
You are able to access an Access DB. I have used it when I created a Financial Management System for Canadian Tire Stores. I believe that when you create the exe, it just combines all your code and forms into one file. The mdb is still seperate. As for the best type of data storage... it is what I used for the FMS. You are able to use a text file and encrypt it, but not only will it take much more code to encrypt/decrypt it, but it will also be more difficult to access the data within the file.
0
 

Author Comment

by:bartman26
ID: 1470699
Can you password protect the DB and still access it from VB? If so do you have to do something special in VB to access it once it is password protected? Also how do you go about encrypting a flat file?
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 3

Expert Comment

by:traygreen
ID: 1470700
To the best of my knoweldge you can.  I working with MS Sequel.  No Access in the last couple of years.

The following url's address your question re accessing an Access MDB - the second focuses on the password issue.

http://207.82.250.251/cgi-bin/linkrd?hm___action=http%3a%2f%2fwww%2eexperts%2dexchange%2ecom%2fQ%2e10121456

http://207.82.250.251/cgi-bin/linkrd?hm___action=http%3a%2f%2fwww%2eexperts%2dexchange%2ecom%2fQ%2e10121456

Encrypting Flat files - Where do we start.  There are dozens if not hundreds of encryption schemes out there.  Most of them written by people alot smarter than me.  A simple encryption scheme would be to generate a random number (key) then go through a data stream 1 character at a time and running a simple caluculation against it.  Then storing the calculations result rather than the actual character value in the file.  To read the file, you just reverse the calculation.  In order for the file to be read, you would need to know the key and the calculation to read the file easily.
0
 

Author Comment

by:bartman26
ID: 1470701
Thanks Traygreen, what I needed to know about access, watch for my next question, I now want to know differences between access and sequel in laymens terms. I took a look on MS web sight and it wasn't a comparison that I would have liked. Thanks again.
0
 

Author Comment

by:bartman26
ID: 1470702
Thanks Traygreen, exactly what I needed to know about access, watch for my next question, I now want to know differences between access and sequel in laymens terms. I took a look on MS web sight and it wasn't a comparison that I would have liked. Thanks again.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I’ve seen a number of people looking for examples of how to access web services from VB6.  I’ve been using a test harness I built in VB6 (using many resources I found online) that I use for small projects to work out how to communicate with web serv…
When designing a form there are several BorderStyles to choose from, all of which can be classified as either 'Fixed' or 'Sizable' and I'd guess that 'Fixed Single' or one of the other fixed types is the most popular choice. I assume it's the most p…
Get people started with the process of using Access VBA to control Excel using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Excel. Using automation, an Access application can laun…
This lesson covers basic error handling code in Microsoft Excel using VBA. This is the first lesson in a 3-part series that uses code to loop through an Excel spreadsheet in VBA and then fix errors, taking advantage of error handling code. This l…

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now