Solved

What is Package and Sign?

Posted on 2010-11-11
2
469 Views
Last Modified: 2012-06-21
What is Package and Sign?   It doesn't seem to do much more than the other forms of the database, except insist on a digital signature.  I'm curious to know what one would use it for.

Thanks in advance.
0
Comment
Question by:CRB1609
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 85

Accepted Solution

by:
Scott McDaniel (Microsoft Access MVP - EE MVE ) earned 500 total points
ID: 34119188
That's what it does - it "signs" the database package to insure your endusers that YOUR code has not been tampered with. If you P&S your database, then make changes, you will "discard" the signature. It's really just a way for your endusers to be relatively sure that the database they receive from you is exactly the same as when it left your machine (and no one has hijacked it in the interim and inserted malicious code).

If you're going to deploy your database "in the wild", you'd (a) P&S the database, using a commercially obtained certificate and then (b) package up your database using an installer, as I suggested in your other question.
0
 

Author Closing Comment

by:CRB1609
ID: 34124520
PERFECT.  Thank you. This straightforward answer could have replaced pages of obscure text in the help and on the web.  Your blood's worth bottling.

CRB
0

Featured Post

[Live Webinar] The Cloud Skills Gap

As Cloud technologies come of age, business leaders grapple with the impact it has on their team's skills and the gap associated with the use of a cloud platform.

Join experts from 451 Research and Concerto Cloud Services on July 27th where we will examine fact and fiction.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
If you need a simple but flexible process for maintaining an audit trail of who created, edited, or deleted data from a table, or multiple tables, and you can do all of your work from within a form, this simple Audit Log will work for you.
Using Microsoft Access, learn some simple rules for how to construct tables in a relational database. Split up all multi-value fields into single values: Split up fields that belong to other things into separate tables: Make sure that all record…
In Microsoft Access, when working with VBA, learn some techniques for writing readable and easily maintained code.

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question