Solved

How to break link between system.mdw and Access 97

Posted on 2002-05-14
6
410 Views
Last Modified: 2008-07-03
A user has created an mdb, assigned rights to objects, used the work group administrator to join a work group, then, as far as I can tell, went back to an unsecured backup and renamed it to the original mdb file name.

They are being prompted for the mdw when they try to open the renamed unsecured backup.

What can we do to get rid of the link to the mdw? I have not been there yet to see if there is an mdw on the hard drive. I am told the copy on the network was deleted.

Thanks in advance for your help and please let me know if you need more information.
0
Comment
Question by:smoyano
  • 4
6 Comments
 
LVL 6

Expert Comment

by:blakeh1
Comment Utility
Are they using a shortcut that uses the /wrkgrp switch to specify the workgroup file
0
 

Author Comment

by:smoyano
Comment Utility
Thanks blakeh1. They are not using a shortcut but are instead double clicking on the .mdb file in Explorer.
0
 

Author Comment

by:smoyano
Comment Utility
blakeh1: It turns out that she is prompted for the .mdw when she starts access not only when she double-clicks on the mdb file.

0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Accepted Solution

by:
wilmet earned 150 total points
Comment Utility
Suggest that they use the Workgroup Administrator to join with "system.mdw" which is the defauly security file for Access.  It's usually located in the D:\Program Files\Microsoft Office\Office folder.
0
 

Author Comment

by:smoyano
Comment Utility
Thank you wilmet. I will be there tomorrow and will get back to you.
0
 

Author Comment

by:smoyano
Comment Utility
It worked.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Today's users almost expect this to happen in all search boxes. After all, if their favourite search engine juggles with tens of thousand keywords while they type, and suggests matching phrases on the fly, why shouldn't they expect the same from you…
In Debugging – Part 1, you learned the basics of the debugging process. You learned how to avoid bugs, as well as how to utilize the Immediate window in the debugging process. This article takes things to the next level by showing you how you can us…
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
In Microsoft Access, learn how to use Dlookup and other domain aggregate functions and one method of specifying a string value within a string. Specify the first argument, which is the expression to be returned: Specify the second argument, which …

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now