Solved

What is Package and Sign?

Posted on 2010-11-11
2
461 Views
Last Modified: 2012-06-21
What is Package and Sign?   It doesn't seem to do much more than the other forms of the database, except insist on a digital signature.  I'm curious to know what one would use it for.

Thanks in advance.
0
Comment
Question by:CRB1609
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 84

Accepted Solution

by:
Scott McDaniel (Microsoft Access MVP - EE MVE ) earned 500 total points
ID: 34119188
That's what it does - it "signs" the database package to insure your endusers that YOUR code has not been tampered with. If you P&S your database, then make changes, you will "discard" the signature. It's really just a way for your endusers to be relatively sure that the database they receive from you is exactly the same as when it left your machine (and no one has hijacked it in the interim and inserted malicious code).

If you're going to deploy your database "in the wild", you'd (a) P&S the database, using a commercially obtained certificate and then (b) package up your database using an installer, as I suggested in your other question.
0
 

Author Closing Comment

by:CRB1609
ID: 34124520
PERFECT.  Thank you. This straightforward answer could have replaced pages of obscure text in the help and on the web.  Your blood's worth bottling.

CRB
0

Featured Post

Salesforce Has Never Been Easier

Improve and reinforce salesforce training & adoption using WalkMe's digital adoption platform. Start saving on costly employee training by creating fast intuitive Walk-Thrus for Salesforce. Claim your Free Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I see at least one EE question a week that pertains to using temporary tables in MS Access.  But surprisingly, I was unable to find a single article devoted solely to this topic. I don’t intend to describe all of the uses of temporary tables in t…
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
Familiarize people with the process of utilizing SQL Server stored procedures from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Micr…
In Microsoft Access, learn how to “cascade” or have the displayed data of one combo control depend upon what’s entered in another. Base the dependent combo on a query for its row source: Add a reference to the first combo on the form as criteria i…

742 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question