Solved

Catch/Disable PrintScreen Key in Microsoft Access

Posted on 2010-08-27
4
1,496 Views
Last Modified: 2013-11-28
Hello,

I have an access program that I am trying to lock down the best I can.  The goal is to not allow any of the data in the forms to be printed.  I've figured out how to get rid of the print menu options and how to disable Ctrl-P, but I'm stuck on what I can do to disable PrintScreen.  Is this possible?

Thanks for the help,
Christine
0
Comment
Question by:clarkincit
4 Comments
 
LVL 37

Expert Comment

by:Neil Russell
ID: 33541795
You could just remap that key to have no functionality at all in windows?
See article here... http://vlaurie.com/computers2/Articles/remap-keyboard.htm
0
 
LVL 5

Accepted Solution

by:
INHOUSERES earned 500 total points
ID: 33541957
0
 
LVL 74

Expert Comment

by:Jeffrey Coachman
ID: 33543028
FWIW,

There will *always* be a way for "malicious" user to get what they want.
Among other things, they can:
Use any one of dozens of techniques to access the table and print from there.
Print a report of the same data.
Link the data to another DB and print from there.
Copy the data
Memorize the Data
Crack any password
...ect

Remember, while you can disable the printscreen "Key", you cant stop someone from executing the same keystroke via automation (get the ASCI code for the print screen key (44))

Also you must somehow guarantee that a printscreen "Program" is not installed:
http://www.gadwin.com/printscreen/
http://www.americansys.com/psd.htm 
http://www.etrusoft.com/
http://www.techsmith.com/screen-capture.asp

However, if your needs are protecting against a "Casual/Average/Basic" user, then what you have been given so far may be fine.

;-)

JeffCoachman
0
 

Author Closing Comment

by:clarkincit
ID: 33545286
This fit the bill perfectly.  I realize that it's not a catch-all, but for basic users it will help.  Thanks!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction When developing Access applications, often we need to know whether an object exists.  This article presents a quick and reliable routine to determine if an object exists without that object being opened. If you wanted to inspect/ite…
Regardless of which version on MS Access you are using, one of the harder data-entry forms to create is one where most data from previous entries needs to be appended to new records, especially when there are numerous fields and records involved.  W…
Familiarize people with the process of utilizing SQL Server functions from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Microsoft Ac…
In Microsoft Access, learn how to use Dlookup and other domain aggregate functions and one method of specifying a string value within a string. Specify the first argument, which is the expression to be returned: Specify the second argument, which …

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now