Solved

macros in mde file

Posted on 2002-04-01
2
342 Views
Last Modified: 2013-12-05
I have a mdb file, I made a mde file from it to prevent showing the code.
but the mde file contains some macros. how can I prevent users to show the design of these macros in the mde file.
0
Comment
Question by:fadiwilliam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 44

Expert Comment

by:Arthur_Wood
ID: 6910171
In general it is a VERY bad idea to use Macros FOR ANY PURPOSE in a real Access application.  This is so for several reasons (in fact, Microsoft has indicated that they are only supporting the macro capability in Access 2000+ for backward compatability, and MS STRONGLT advises against the conscious use of macros in applications developed with Access2000 and later versions)

1) Macros cannot be debugged - there is no way to interupt the steps of a macro to evaluate what is happeing at each step.

2) as you have discovered, since macros ARE NOT code, they are not affected by the process of generating an MDE, so the macros are fully exposed in the resulting MDE file.

3)Almost without exception, a macro can be replaced by the equivalent VBA code, with generally much more flexibility and control.
0
 
LVL 1

Accepted Solution

by:
jschrisman earned 10 total points
ID: 6910595
For each macro name in the list of macros, right click on the macro name and choose properties. Then set the Hidden property.

On the tools menu, choose Startup. Uncheck display database window and anything else you want to change.

This will hise the macros from the average user. However, anyone proficient in Access will be able to easily get around this.
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
Basics of query design. Shows you how to construct a simple query by adding tables, perform joins, defining output columns, perform sorting, and apply criteria.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question