Solved

Catch/Disable PrintScreen Key in Microsoft Access

Posted on 2010-08-27
4
1,505 Views
Last Modified: 2013-11-28
Hello,

I have an access program that I am trying to lock down the best I can.  The goal is to not allow any of the data in the forms to be printed.  I've figured out how to get rid of the print menu options and how to disable Ctrl-P, but I'm stuck on what I can do to disable PrintScreen.  Is this possible?

Thanks for the help,
Christine
0
Comment
Question by:clarkincit
4 Comments
 
LVL 37

Expert Comment

by:Neil Russell
ID: 33541795
You could just remap that key to have no functionality at all in windows?
See article here... http://vlaurie.com/computers2/Articles/remap-keyboard.htm
0
 
LVL 5

Accepted Solution

by:
INHOUSERES earned 500 total points
ID: 33541957
0
 
LVL 74

Expert Comment

by:Jeffrey Coachman
ID: 33543028
FWIW,

There will *always* be a way for "malicious" user to get what they want.
Among other things, they can:
Use any one of dozens of techniques to access the table and print from there.
Print a report of the same data.
Link the data to another DB and print from there.
Copy the data
Memorize the Data
Crack any password
...ect

Remember, while you can disable the printscreen "Key", you cant stop someone from executing the same keystroke via automation (get the ASCI code for the print screen key (44))

Also you must somehow guarantee that a printscreen "Program" is not installed:
http://www.gadwin.com/printscreen/
http://www.americansys.com/psd.htm 
http://www.etrusoft.com/
http://www.techsmith.com/screen-capture.asp

However, if your needs are protecting against a "Casual/Average/Basic" user, then what you have been given so far may be fine.

;-)

JeffCoachman
0
 

Author Closing Comment

by:clarkincit
ID: 33545286
This fit the bill perfectly.  I realize that it's not a catch-all, but for basic users it will help.  Thanks!
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The first two articles in this short series — Using a Criteria Form to Filter Records (http://www.experts-exchange.com/A_6069.html) and Building a Custom Filter (http://www.experts-exchange.com/A_6070.html) — discuss in some detail how a form can be…
When you are entering numbers in a speadsheet, and don't remember what 6×7 is, you just type “=6*7" instead. It works in every cell! This is not so in Access. To enter the elusive 42 in a text box, you have to find a calculator, and then copy the re…
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…
With Microsoft Access, learn how to specify relationships between tables and set various options on the relationship. Add the tables: Create the relationship: Decide if you’re going to set referential integrity: Decide if you want cascade upda…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question