Protecting my Access database

I have an Access database that I send out to clients as an MDE file.  I have some security built into the code, but my concern is mainly along the lines of someone being able to decompile it and getting into the code/forms (via a third party product) .

I do appreciate that most of my clients wouldn't go down this route, but I feel that I need to know how secure things are.
Andy BrownDeveloperAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

peter57rCommented:
You might want to look at this.

http://www.everythingaccess.com/mdeprotector.htm

One service offered by that site is to reverse engineer an mde to an mdb.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Jim Dettman (Microsoft MVP/ EE MVE)President / OwnerCommented:
<<I have an Access database that I send out to clients as an MDE file.  I have some security built into the code, but my concern is mainly along the lines of someone being able to decompile it and getting into the code/forms (via a third party product) .>>
  A MDE is simply a MDB with all the source code stripped out.  For someone to get your source code, they would need to de-compile all the pcode.
 To my knowledge, no one has ever done that to date (created a VBA de-compiler). There are a couple of companies out there that can read the p-code and glean things from it and write *new* code that is equivalent, but they cannot simply take your project and de-compile it effortlessly.  It takes quite of bit of doing to get equivalent source code. So all in all, someone would need to go through a lot of effort to even come close to the source.
 As for the objects, that's a different story.  A MDE does nothing to protect those.  Only user level security does that and it's easily breakable.  Anyone can get you object definitions and properties from a MDB or MDE.
JimD.
0
Jim P.Commented:
The other thing to do is put in a trademark or copyright notice with contact info at the top of every module and create and "about" box that gives your contact info as well.

Most scrupulous companies that would do a reverse engineering type thing would hopefully contact you that they had been asked to do it. Or reject the request out of hand.
0
Powerful Yet Easy-to-Use Network Monitoring

Identify excessive bandwidth utilization or unexpected application traffic with SolarWinds Bandwidth Analyzer Pack.

Andy BrownDeveloperAuthor Commented:
Thanks guys - that's some really good information.  I think I'll purchase the "source code protector" (as it can only be a good thing).
0
Jim P.Commented:
Glad to be of assistance. May all your days get brighter and brighter.
0
Andy BrownDeveloperAuthor Commented:
Thank you - you also.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Software

From novice to tech pro — start learning today.