Solved

What is Package and Sign?

Posted on 2010-11-11
2
444 Views
Last Modified: 2012-06-21
What is Package and Sign?   It doesn't seem to do much more than the other forms of the database, except insist on a digital signature.  I'm curious to know what one would use it for.

Thanks in advance.
0
Comment
Question by:CRB1609
2 Comments
 
LVL 84

Accepted Solution

by:
Scott McDaniel (Microsoft Access MVP - EE MVE ) earned 500 total points
ID: 34119188
That's what it does - it "signs" the database package to insure your endusers that YOUR code has not been tampered with. If you P&S your database, then make changes, you will "discard" the signature. It's really just a way for your endusers to be relatively sure that the database they receive from you is exactly the same as when it left your machine (and no one has hijacked it in the interim and inserted malicious code).

If you're going to deploy your database "in the wild", you'd (a) P&S the database, using a commercially obtained certificate and then (b) package up your database using an installer, as I suggested in your other question.
0
 

Author Closing Comment

by:CRB1609
ID: 34124520
PERFECT.  Thank you. This straightforward answer could have replaced pages of obscure text in the help and on the web.  Your blood's worth bottling.

CRB
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is a continuation or rather an extension from Cascading Combos (http://www.experts-exchange.com/A_5949.html) and builds on examples developed in detail there. It should be understandable alone, but I recommend reading the previous artic…
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Familiarize people with the process of utilizing SQL Server stored procedures from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Micr…
Familiarize people with the process of utilizing SQL Server functions from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Microsoft Ac…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question