?
Solved

Protecting my Access database

Posted on 2009-07-04
6
Medium Priority
?
289 Views
Last Modified: 2013-12-13
I have an Access database that I send out to clients as an MDE file.  I have some security built into the code, but my concern is mainly along the lines of someone being able to decompile it and getting into the code/forms (via a third party product) .

I do appreciate that most of my clients wouldn't go down this route, but I feel that I need to know how secure things are.
0
Comment
Question by:Andy Brown
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 77

Accepted Solution

by:
peter57r earned 1200 total points
ID: 24777214
You might want to look at this.

http://www.everythingaccess.com/mdeprotector.htm

One service offered by that site is to reverse engineer an mde to an mdb.
0
 
LVL 58

Assisted Solution

by:Jim Dettman (Microsoft MVP/ EE MVE)
Jim Dettman (Microsoft MVP/ EE MVE) earned 400 total points
ID: 24777254
<<I have an Access database that I send out to clients as an MDE file.  I have some security built into the code, but my concern is mainly along the lines of someone being able to decompile it and getting into the code/forms (via a third party product) .>>
  A MDE is simply a MDB with all the source code stripped out.  For someone to get your source code, they would need to de-compile all the pcode.
 To my knowledge, no one has ever done that to date (created a VBA de-compiler). There are a couple of companies out there that can read the p-code and glean things from it and write *new* code that is equivalent, but they cannot simply take your project and de-compile it effortlessly.  It takes quite of bit of doing to get equivalent source code. So all in all, someone would need to go through a lot of effort to even come close to the source.
 As for the objects, that's a different story.  A MDE does nothing to protect those.  Only user level security does that and it's easily breakable.  Anyone can get you object definitions and properties from a MDB or MDE.
JimD.
0
 
LVL 38

Assisted Solution

by:Jim P.
Jim P. earned 400 total points
ID: 24777276
The other thing to do is put in a trademark or copyright notice with contact info at the top of every module and create and "about" box that gives your contact info as well.

Most scrupulous companies that would do a reverse engineering type thing would hopefully contact you that they had been asked to do it. Or reject the request out of hand.
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Closing Comment

by:Andy Brown
ID: 31599777
Thanks guys - that's some really good information.  I think I'll purchase the "source code protector" (as it can only be a good thing).
0
 
LVL 38

Expert Comment

by:Jim P.
ID: 24777337
Glad to be of assistance. May all your days get brighter and brighter.
0
 

Author Comment

by:Andy Brown
ID: 24777342
Thank you - you also.
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question