CallShell or FollowHyperlink

Posted on 2011-10-11
Last Modified: 2012-05-12
My users need to open PDFs from Access 2003.
I have used CallShell but with various versions of Acrobat they callshell my not reference that users version.
FollowHyperlink is an alternative buy I can't seem to get around the security warning.

Does anyone have a solution to either of these options?
Or another idea, perhaps?
Thank you,
Question by:ShawnGray
    LVL 12

    Accepted Solution

    Hi Shawn,

    Try using the GoHyperlink function of Allen Browne, that would do the trick for you.

    See below thread:

    Hope this helps,
    LVL 5

    Expert Comment

    I've had good success with followhyperlink specifically for pdf's but you mention security warnings.  Can you adjust your security settings to get around the warnings ?
    LVL 47

    Expert Comment

    by:Dale Fye (Access MVP)
    Can you post the security warning you are getting?  I frequently use the FollowHyperlink method, and don't recall a security warning, although it has been a while since I've used Access 2003.

    Author Comment

    My security settings on this machine are about as low as they can go.
    Win 7, Office 2010, using Access 2003 (its a long story).

    The message is:

    Microsoft Office
    Opening \\blah\blah....pdf
    Some files can contain viruses or otherwise be harmful to your computer
    It is important to be certain that this file is from a trustworthy source.
    Would you like to open this file?
    LVL 5

    Expert Comment

    LVL 12

    Expert Comment

    Did you tried the custom Function GoHyperlink?

    No warning message, nothing ....

    LVL 61

    Expert Comment

    To my understanding, you are not dealing with sandbox security (described at the above link), but hyperlink security - which has a different setting for disabling the warnings.

    See the following kb article:

    (I do not recommend disabling sandbox or hyperlink warning messages in a corporate environment without going through the proper channels.)

    Author Closing Comment

    Thank you all

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    6 Surprising Benefits of Threat Intelligence

    All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

    Today's users almost expect this to happen in all search boxes. After all, if their favourite search engine juggles with tens of thousand keywords while they type, and suggests matching phrases on the fly, why shouldn't they expect the same from you…
    In a multiple monitor setup, if you don't want to use AutoCenter to position your popup forms, you have a problem: where will they appear?  Sometimes you may have an additional problem: where the devil did they go?  If you last had a popup form open…
    As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
    Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    12 Experts available now in Live!

    Get 1:1 Help Now