Solved

Blocking someone from changing the extension on a Microsoft Access Database

Posted on 2013-10-23
4
295 Views
Last Modified: 2013-10-28
Does anyone happen to know if there is a way that I can block a user from chaning the file extension on a access database.  The project that I am working on allows me to put a copy of a form on someones desktop that lets them fill in the information and upload it to my database.  The file that I place on there desktop is .accdr.  Works great.  But if someone changes the file extension to a .accdb then they can get into the database and find out where the information is being stored.  I know by default file extensions are hidden but a lot of my employees have them shown and know how to show them. I know I should have designed this database in SQL but I am not to good at that haha.  Any advice would be greatly appreciated.
0
Comment
Question by:kkenison
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 58
ID: 39594331
You have to:

1. Distribute as a MDE (source code stripped out).

2. Perform a check at startup for being in runtime mode:

If application.SysCmd(acSysCmdRuntime)  = False then
   Msgbox....
    Application.Quit
End if

Jim.
0
 
LVL 74

Expert Comment

by:Jeffrey Coachman
ID: 39594401
if someone changes the file extension to a .accdb then they can get into the database and find out where the information is being stored.
Even if you create an MDE/accde file, they can still (if they know how) see where the linked table points to... (Select the table, and hover the mouse over the name)

I am sure there may be a way to "lock this down", so lets see what Jim or another expert may have up their sleeves...


JeffCoachman
0
 
LVL 46

Accepted Solution

by:
aikimark earned 250 total points
ID: 39594446
1. don't use permanently attached tables -- use dynamic or encrypted SQL with the IN clause that points to the destination/source database.
2. encrypt any local data that might help a hacker/cracker
0
 

Author Closing Comment

by:kkenison
ID: 39607141
Thank you very much for the help. This seems to work great.  Thanks again.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As tax season makes its return, so does the increase in cyber crime and tax refund phishing that comes with it
You need to know the location of the Office templates folder, so that when you create new templates, they are saved to that location, and thus are available for selection when creating new documents.  The steps to find the Templates folder path are …
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Suggested Courses

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question