Solved

Securing MS Access 2010

Posted on 2013-06-07
5
336 Views
Last Modified: 2013-06-07
I have previously posted questions regarding Securing MS Access 2010, they have been answered but one problem remains.

When the application opens the bypass shiftkey is disabled, correct form displays, no objects.

Question is how do Iremove the "privacy options" on the file menu?
0
Comment
Question by:Brogrim
  • 3
  • 2
5 Comments
 
LVL 77

Expert Comment

by:peter57r
ID: 39228344
What 'Privacy Options'?
I don't have anything with that label on the File menu.

Are you referring to the list of checkboxes in Options>TrustCentre>TrustCentreSettings>Privacy
0
 

Author Comment

by:Brogrim
ID: 39228377
See screenshot below
Privacy-options.png
0
 
LVL 77

Expert Comment

by:peter57r
ID: 39228384
Interesting!  This is what I have...


I wonder if removing other options forces the Privacy entry to appear?
Capture10.PNG
0
 
LVL 77

Accepted Solution

by:
peter57r earned 500 total points
ID: 39228421
Googling , I have found this - the Q is not relevant but the answer seems to be.

http://stackoverflow.com/questions/7907255/hide-access-options
0
 

Author Closing Comment

by:Brogrim
ID: 39228511
Thanks
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Attachment field in SQL 3 26
User Level Security 6 37
Why get error when delete all records on a sub-form 2 15
Criteria for Date for DCount 4 17
Introduction When developing Access applications, often we need to know whether an object exists.  This article presents a quick and reliable routine to determine if an object exists without that object being opened. If you wanted to inspect/ite…
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
Basics of query design. Shows you how to construct a simple query by adding tables, perform joins, defining output columns, perform sorting, and apply criteria.
In Microsoft Access, learn different ways of passing a string value within a string argument. Also learn what a “Type Mis-match” error is about.

806 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question