Solved

How can I By-pass or auto login to an ODBC database

Posted on 2008-06-20
8
1,151 Views
Last Modified: 2012-08-14
How  can I By-pass the user id and password prompts or auto login to an ODBC database?
0
Comment
Question by:mbrennan_pacbell_net
8 Comments
 
LVL 5

Accepted Solution

by:
Steve Dubyo earned 168 total points
ID: 21834481
Those details can be embedded.  Is this a linked table we are talking about ?
0
 

Author Comment

by:mbrennan_pacbell_net
ID: 21834608
Yes,  It is a linked table (Specicially linked into an Access database).

Thanks,

Mike
0
 
LVL 2

Expert Comment

by:jgoeders
ID: 21835193
Workspaces(0).OpenConnection("MyNewConnection", , , "ODBC;DSN=...;UID=MYLOGON;PWD=MYPASSWORD")
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 2

Assisted Solution

by:jgoeders
jgoeders earned 166 total points
ID: 21835195
connect to an odbc database through this code:

Workspaces(0).OpenConnection("MyNewConnection", , , "ODBC;DSN=...;UID=MYLOGON;PWD=MYPASSWORD")

insert the DSN of the database and you logon and password.  then just run this code when the database opens.
0
 
LVL 7

Expert Comment

by:Dauhee
ID: 21837321
optionally remove the password from the access database :)
0
 
LVL 30

Assisted Solution

by:hnasr
hnasr earned 166 total points
ID: 21838710
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Read about achieving the basic levels of HRIS security in the workplace.
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
In Microsoft Access, learn how to use Dlookup and other domain aggregate functions and one method of specifying a string value within a string. Specify the first argument, which is the expression to be returned: Specify the second argument, which …

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now