Solved

How can we keep users out from the Debugging mode in Microsoft Access 2007 so they do not accidentally change any code

Posted on 2011-03-25
11
300 Views
Last Modified: 2012-06-27
We have been having problems with users accidentally changing code in an simple Access database we designed. Users have sometimes gone in to put in information and gotten a debug message and they have been known to type in code not realizing they are typing in our code.

How do we keep users from doing this. Please advise. Thank you.
0
Comment
Question by:ruavol2
11 Comments
 
LVL 75

Accepted Solution

by:
DatabaseMX (Joe Anderson - Access MVP) earned 417 total points
ID: 35217646
Start by adding a Password to your VBA project ... OR , create an ACCDE.  Either way prevents users from getting into code.

mx
0
 
LVL 75

Assisted Solution

by:DatabaseMX (Joe Anderson - Access MVP)
DatabaseMX (Joe Anderson - Access MVP) earned 417 total points
ID: 35217667
VBA Password:

VBA Editor >> Tools>> <YourProjectName>Properties>> Protection tab >> Lock For Viewing.  Enter your password.  DO NOT FORGET your password.

mx
Capture1.gif
0
 
LVL 77

Assisted Solution

by:peter57r
peter57r earned 83 total points
ID: 35217673
The simplest approach is to convert your file to an accde or mde file depending on what you are using.  There is no code for them to look at.  You MUST keep your original mdb/accdb file to do changes to the application.
0
 
LVL 75

Assisted Solution

by:DatabaseMX (Joe Anderson - Access MVP)
DatabaseMX (Joe Anderson - Access MVP) earned 417 total points
ID: 35217697
One additional thing.

IF ... you include robust Error Handling in your vba code, for the most part, you can prevent the Debug option/window from occurring.  Let me know if you need more info on Error Handling ...

mx
0
 
LVL 100

Expert Comment

by:mlmcc
ID: 35220140
I work with ruavol2 on this project

How do you create an accde file?

Do I need to install anything extra when the accde file is installed on the user's server?

Does the accde file include the data?


0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 75

Assisted Solution

by:DatabaseMX (Joe Anderson - Access MVP)
DatabaseMX (Joe Anderson - Access MVP) earned 417 total points
ID: 35220232
"How do you create an accde file?"
See image.
"Do I need to install anything extra when the accde file is installed on the user's server?"
No.
"Does the accde file include the data?"
Ideally no. You should have a Split configuration. Front End with every thing except data tables - this is your ACCDE, a copy on each users workstation ... linked to a master Back End on the server - ACCDB.

mx
Capture1.gif
0
 
LVL 100

Expert Comment

by:mlmcc
ID: 35220360
The ACCDB then has no code?

Can the ACCDE reside on the server and be shared?

mlmcc
0
 
LVL 75

Assisted Solution

by:DatabaseMX (Joe Anderson - Access MVP)
DatabaseMX (Joe Anderson - Access MVP) earned 417 total points
ID: 35220647
"The ACCDB then has no code?"
Correct. Tables only.

"Can the ACCDE reside on the server and be shared?"

Definitely.

Start with this:

How to manually split a Access database in Microsoft Access
http://support.microsoft.com/kb/304932

Splitting Microsoft Access Databases to Improve Performance and Simplify Maintainability
http://www.fmsinc.com/MicrosoftAccess/DatabaseSplitter/Index.html


'Preparing Your Access 2003 Database for Deployment, Part 1
http://msdn.microsoft.com/en-us/library/aa662933.aspx

mx
0
 
LVL 100

Expert Comment

by:mlmcc
ID: 35220697
Thanks

That is just what we needed to know

mlmcc
0
 

Author Closing Comment

by:ruavol2
ID: 35234646
Excellent.....Thank you both very much.
0
 
LVL 75
ID: 35234666
You are welcome ...

mx
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Overview: This article:       (a) explains one principle method to cross-reference invoice items in Quickbooks®       (b) explores the reasons one might need to cross-reference invoice items       (c) provides a sample process for creating a M…
A simple tool to export all objects of two Access files as text and compare it with Meld, a free diff tool.
Familiarize people with the process of utilizing SQL Server stored procedures from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Micr…
With Microsoft Access, learn how to specify relationships between tables and set various options on the relationship. Add the tables: Create the relationship: Decide if you’re going to set referential integrity: Decide if you want cascade upda…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now