Microsoft Access

218K

Solutions

51K

Contributors

Microsoft Access is a rapid application development (RAD) relational database tool. Access can be used for both desktop and web-based applications, and uses VBA (Visual Basic for Applications) as its coding language.

Share tech news, updates, or what's on your mind.

Sign up to Post

2018 Annual Membership Survey
LVL 12
2018 Annual Membership Survey

Here at Experts Exchange, we strive to give members the best experience. Help us improve the site by taking this survey today! (Bonus: Be entered to win a great tech prize for participating!)

With this "gap", Microsoft is going to have an improvement to the Controlled Folder Access functionality (luckily they accepted to change it). Look out for the next update ... Meanwhile, I foresee there will malware that will attempt the bypass (really soon...)
 http://www.securitybydefault.com/2018/01/microsoft-anti-ransomware-bypass-not.html
0
AI and machine learning humanize app development and marketing

Machine learning is being used as a marketing tool as it can access user data and gather additional insights on the users’ behavior and engagement preferences.
While artificial intelligence (AI) has been around for a while, scientists have recently made massive breakthroughs in the field of machine learning, a subfield of AI, as noted by NPR.


https://goo.gl/w4K83B
0
Adding awesome vector clipart to LibreOffice

I was recently poking around with LibreOffice and figured out how easy it is to add great vector clip art to ones LibreOffice gallery collection.  My experience with both LibreOffice and the site that provides so many awesome clip art images in vector and many other formats was so pleasant, I figured I would post this tutorial to give then both some love.

Step one in the tutorial is where we download the vector images we want to add to our gallery. This is where flaticon.com comes in.  They have over six hundred thousand icons - all of which you can download in multiple image formats including .png, .svg, .eps and .psd.  Many of the icons are available with their free account but you can get full access to a richer set of icons with their premium plans. Plans range from about $7.50 to $9.99 per month at the time of this writing. If you like their work, consider getting one of their premium plans.  

Gallery1.PNG  Gallery2.PNG











Once you are on flaticon.com, if you are a free user look for one of the icon packs with the [S] in the top left corner - this means the pack is available for free. Icon packs are saved as zip files by default, so you will need to unzip the folder to a familiar location on you hard drive such as Photos folder if you are using Windows - as I am in this tutorial.

With the folder unzipped, you are now ready to fire up LibreOffice. I am using LibreOffice Version: 5.3.4.2 (x64).



Gallery3.PNG
0
We have a List where data is fed through  a form i.e (+ New), I would like to restrict it in a way that majority of the Sharepoint users can only view the List and not be able to access the options in the red box. Only assigned users can have access to the red box.RFLForm.jpg
0
 
LVL 23

Expert Comment

by:Ferruccio Accalai
Is this meant as a question? If so open a question instead of a post
0
 

Author Comment

by:RFLafferty
Thank you
0
I have an access form, "frmCompetition" with a subform, "sfrmDogBrace." This is a database for field trials for bird dogs.   I would like to filter the contents of the subform based on selections I make in 3 separate comboboxes in the main form.  Any advice?  I've tried makeing the underlying query of the subform reference the contents of the 3 comboboxes as criteria.  No luck. Is there some vba code I could use?  My comboboxes are cboyear, cboday, and cbo brace.
0
 
LVL 59

Expert Comment

by:Jim Dettman (Microsoft MVP/ EE MVE)
Use the blue "Ask a Question" button in the page header.

Posts are for sharing news items.

Jim.
0
 
LVL 59

Expert Comment

by:Jim Dettman (Microsoft MVP/ EE MVE)
or something that you did and want to share, without writing an article or doing a video (think blog type stuff).

Jim.
0
0
In exchange 2007, wondering if anyone knows how to limit the view of specific public fodders to certain people or security groups.

I know how to limit access (ie author, contributor, editor, etc) but a client has asked that only certain people be able to see certain public folders to reduce the overall amount of viewable public folders (to reduce "clutter" if you will) for everyone viewing the public folder structure. ....
0
 
LVL 14

Administrative Comment

by:Andrew Leniart
Hi classanets,

What you've done here is made a "Post".  The Post function is designed to share information with the Experts Exchange community.

You'll get much better results if you use the Ask a Question button.

It's the big blue button at the top of your browser screen. See below...

Ask a Question

Hope that's helpful.

Andrew
EE TA
1
This is a copy of part of the article located here:
http://www.tomshardware.com/news/how-to-fight-fcc-net-neutrality,36017.html

net neutrality
vote takes place 12/14/17:


Even so, it is the work of but a moment, so we all may as well do it. Go to www.fcc.gov/ecfs/filings/express, and under Proceeding, enter 17-108 (the dystopian-named “Restoring Internet Freedom” order). Fill in the form very, very, very carefully, ensure you get an email confirmation, and submit.

Your voice will be louder, as it were, with a phone call. Call the FCC and leave a message letting the agency know that you want to keep net neutrality as it is. Dial 1-888-225-5322, and be polite, patient, and persistent. You want Option 1, Option 4, Option 2, Option 0. Enter a complaint on proceeding 17-108.

Here’s a sample script: “Hi, my name is ___, and I live in [city], [state]. I’m registering a complaint about the proposed repeal of net neutrality, because it will hurt American consumers, reduce internet access, and restrict the open flow of information. I strongly oppose the undoing of net neutrality, which is at the core of proceeding 17-108. Thank you.”

Then call your members of Congress. The FCC commission is appointed and makes these decisions, but Congress can pressure the agency to do the right thing, and it can also put forward legislation to make net neutrality law instead of just policy. Find your congresscritter at https://contactingcongress.org/, and call the local office …
1
The new generation of project management tools
The new generation of project management tools

With monday.com’s project management tool, you can see what everyone on your team is working in a single glance. Its intuitive dashboards are customizable, so you can create systems that work for you.

I need assistance here, I have many tables in Access (about 9), which I want to export just by clicking a tab to a single excel sheet. I have tried some code and it did not work, I will appreciate if I can be assisted....
0
 
LVL 35

Expert Comment

by:Rob Henson
Alabi, you have raised a post here. You will get better response from Experts if you raise this as a question. Use the big blue button at the top of the screen or this link:

https://www.experts-exchange.com/askQuestion.jsp
1
 

Author Comment

by:ALABI ADEWALE
Thanks Mr. Rob Henson, I appreciate. I already post there, expecting replies
0
EQIFAX DATA BREACH.

The Equifax data breach is one of the deadliest cyberattacks in the modern times not only in terms of affected people but also due to the intensity of accessed personal data. Equifax reported that between mid-May and June 2017, their system was hacked and the personal information of 173 million customers was exposed. Below we highlight some incites about this breach and then take a look at exactly how this was accomplished at the bottom.

Accessed information

According to Equifax, the hackers were able to access customer’s names, Social Security Number, customer’s date of birth, card numbers, addresses and driver’s license numbers.

Why this breach is one of the deadliest attacks

The Yahoo data breach in 2016 had 1 billion customers affected where only the passwords and phone numbers were accessed. But in the case of Equifax, sensitive data was accessed which means that:

Criminals can use the Social Security number to other credit accounts using a customer’s names.
Hackers can also maneuver their way and shop online using the credit card details obtained.
The hackers can sell the data to other criminals which makes the effect very grave.
An accessed customer’s data is not immune to future’s fraud, extortion and blackmail. The accessed information can haunt a customer forever.
How to find out if your information was exposed

Equifax has established a “Potential Impact” tab on its website (www.equifaxsecurity2017.com) that helps …
0
 
LVL 9

Expert Comment

by:Sean Plemons Kelly, CISSP
This was literally copied and pasted from hackingloops.

Let's go to a "Security" site from a company that hid the fact that they had a massive data breach that affected (more or less) everyone with a credit score in the US. Let's plug in our SSN anyway (fun fact, it doesn't matter if you are on a secure system or using encryption if the destination isn't secure).
0
This is my school project / assignment scenario - I have to draw a Logical Network Design...NEED HELP

The rollout of the wireless network has been suspended for now, but the stock analysis tool is being implemented. It is to be called My Stock Analysis Tool (MSAT). MSAT is going to use a three-tier client-server architecture. The tiers will be a web browser at the client end, a separate web server tier, and the MSAT server that performs application logic and all the data storage and access logic. In this way, there is no issue with installing/supporting a software client on end-user computers. Both customers and DRUB staff will use MSAT through a web-based interface, although staff may see extra options. Apart from accessing MSAT, staff also use Microsoft spreadsheet and word processing software on their computers (Windows XP PCs and laptops) for preparing reports, with work-in-progress files stored on staff computers.
0
 
LVL 35

Expert Comment

by:Rob Henson
Snowbella, well done for being honest and up-front that this is a school project; that will help experts guide you rather than propose answers as they would for normal questions.

However, to get better assistance you need to raise this as a question using the big blue button at the top of the page or this link:

https://www.experts-exchange.com/askQuestion.jsp
0
Cyber News Rundown: Edition 11/10/17

CyberNewsRundown.jpg
UK-Based Cryptocurrency Hit By Cyberattack

Prior to the official launch of Electroneum, a UK-based cryptocurrency that uses smartphones for its mining process, was targeted by a DDoS attack that shut down both the website and the app for several days. The attack effectively blocked all users from accessing their accounts, as the entire network was forced offline, to ensure the safety of investors’ funds.

Canadian University Held for Ransom

In the past week, officials have been working with affected students to secure their personal information after hackers breached the university’s systems and gained access to student records. The university has since taken its email system offline, as the hackers were spreading the leaked information throughout the email lists. Along with the data circulation, the hackers also demanded the university pay a large ransom of roughly 23,000 USD within 48 hours, though officials are still uncertain when the breach itself occurred.

WaterMiner Cryptocurrency Mod for GTA 5

As more cryptocurrency miners are embedded in software, one Russian hacker has gone a step further by exploiting a mod for the popular game Grand Theft Auto 5. The exploit silently uses a computer’s power to mine digital currency and, with the help of a modified version of the XMRig miner, can hide itself if it suspects monitoring software is active.

More on the Webroot blog here.
0
Let’s learn something new is the term known Error Database. What is this KEDB? And how it is connected to software testing world?

The key to progress lies in climbing the stairs step by step, instead of a single jump skyward. Approaching slowly and carefully expects knowledge to be stored, utilized and enhanced. In Information Technology Infrastructure Library one such tool that enables associations to make this progress is the Known Error Database.

What is a Known Error Database Tool?

A known error database is a database that portrays the majority of the known issues inside the general frameworks. It depicts the circumstances in which these issues show up, and when conceivable, it offers a workaround that will get the client around the issue and back to profitable work. The configuration management system is part of known error database.

This database also turns out to be a part of the general Problem Management Database, where IT can go to distinguish and organize issues that need perpetual resolutions. Workarounds are just impermanent fixes with the goal that work can precede until the point when issues are definitely settled.

The ITIL known error database must incorporate screenshots of the issues, and additionally the content of error messages, and portrays the issue from the perspective of the client.

Advantages of a Known Error Database

IT groups inside undertakings build up a known error database format as it offers …
0
Your access to October’s Course of the Month expires today! Enroll now and begin adding Microsoft SQL to your professional skills.
0
Today is the last day you'll be able to download Office 2007 SP's, Access 2007 Database Engine, Access 2007 Run time, and other software related to Office 2007 from Microsoft.

Make sure you download what you need to support your software.   Original post with some Microsoft Access links is here:

https://www.experts-exchange.com/posts/3107/MS-Access-2007-Users-Developers-IMPORTANT-NOTE.html

  You'll also want to download the Service Packs (SP's).
2
Gmail just launched a physical Security Key access option, dubbed as Advanced Protection, for their service:
https://landing.google.com/advancedprotection/

You'll need to purchase two physical security keys to enroll in it.

Here is the announcement from their blog:
https://www.blog.google/topics/safety-security/googles-strongest-security-those-who-need-it-most/

Good to see a big email service provider taking security seriously, for 'personal' users.

7
 
LVL 54

Expert Comment

by:Scott Fell, EE MVE
Good post. Because I am lazy, I made a request to have this type of thing save to my ee knowledgebase or browser bookmark.

https://www.experts-exchange.com/bugs/21366/Save-posts-to-knowledge-base-as-a-bookmark.html
1
Has your access to vSphere Web Client (VCSA 6.5) crashed this morning with Shockwave Crashed, Google have released a sneaking update 27.0.0.170 to flash which causes Shockwave to crash when accessing VCSA 6.5.

Fix - delete 27.0.0.170 and put back an older version!

You can also read about it here

http://www.virtuallyghetto.com/2017/10/shockwave-flash-has-crashed-workaround-for-vsphere-web-flash-client.html
3
 
LVL 1

Expert Comment

by:patron
Thanks , now we did replaced the dll to get this working , further will wait for another version
0
 
LVL 126

Author Comment

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Chrome and Adobe have now been updated with a release version which works!
1
[Webinar] Kill tickets & tabs using PowerShell
LVL 12
[Webinar] Kill tickets & tabs using PowerShell

Are you tired of cycling through the same browser tabs everyday to close the same repetitive tickets? In this webinar JumpCloud will show how you can leverage RESTful APIs to build your own PowerShell modules to kill tickets & tabs using the PowerShell command Invoke-RestMethod.

Cyber News Rundown: 10/13/17

CyberNewsRundown.jpg
Rigzone Founder Caught Stealing Data

Over the last few months, officials have been piecing together the case against Rigzone founder, David Kent. After selling the Rigzone domain several years ago, Kent used several backdoors he’d implemented to access account information for over 700,000 customers, which he then attempted to sell back to Rigzone. By setting up several dummy accounts, Rigzone staff determined the specific IP address Kent used and apprehend him.

Criminals Hack Eastern Europe Bank for Millions

In the last year, banks in several Eastern European countries have seen a drastic rise in fraudulent charges at ATMs that have allowed hackers to make off with nearly $40 million dollars. Attackers start by manipulating the banks overdraft protection and setting up proxies to allow accomplices in other countries withdraw massive quantities of money from separate accounts. In addition to spoofing the overdraft system, the attackers also installed remote access software on bank computers to enable further intrusion to the institution’s systems.

More on our blog here.
2
MS Access 2007 Users/Developers - *** IMPORTANT NOTE ***

  This is a heads up that the following Access components available as standalone downloads are moving past extended support in the near future and along with other Office 2007 products, will not be available for download after that time.

  If you have any software that depends on the 2007 (32bit) database engine or the 2007 run time, you'll want to download these as soon as possible so you have them.  

•      Access 2007 runtime  - https://www.microsoft.com/en-us/download/details.aspx?id=4438
•      Office Data Connectivity Components (ACE) - https://www.microsoft.com/en-us/download/details.aspx?id=23734&40ddd5bd-f9e7-49a6-3526-f86656931a02=True&a03ffa40-ca8b-4f73-0358-c191d75a7468=True&751be11f-ede8-5a0c-058c-2ee190a24fa6=True
•      ADE - https://www.microsoft.com/en-us/download/details.aspx?id=24569 (includes the packaging wizard, source code control, and the save as template functionality)
 
4
Don't Get Hooked!

September-Consumer-Blog_Phishing_800.png
Another day, another phishing attack. From businesses to consumers, phishing attacks are becoming a more widespread and dangerous online threat every year. One wrong click could quickly turn into a nightmare if you aren’t aware of the current techniques cyber scammers are using to get access to your valuable personal information.

Stay safe with these tips.

1
Hello Team, i need a need a calendar solution that can be shared by the entire office. I want different people to be able to view, access and edit the same calendar data across networks.
Which is the best solution for this ?
0
 
LVL 54

Expert Comment

by:Scott Fell, EE MVE
Lee, you will get a better response if you ask a question.  Just click on the blue Ask a Question button at the top.

Scott
Topic Advisor
1
 

Expert Comment

by:Erik Dick
Google calendar is your best bet everyone can submit and edit to it. You can also have meeting rooms as users so no one double books.
1
Hi i would like to know is there a website that can compare all access point products? For example like GSMarena for handphones or smart phones. Thanks
0
 
LVL 35

Expert Comment

by:Rob Henson
This may be better raised as a question rather than a post using the Networking topic (assuming it is network access to which you refer). Use the big blue button at the top of the screen to start question. At the bottom of the question screen there is an option to add topics; same as you have done here with Microsoft Access.

I have googled "access point products" and see numerous suppliers but not one that gives an overview of different items, except Amazon who will have their share of reviews for specific products.

Adjust the google search to "access point reviews" and you get some links that may be of use.
1
I recently passed my Microsoft 70-346 Exam.  As part of my revision I used Flash Cards that I created to help memorise key information.  The Flash Cards have been created on Cram and I've recently made them public.  You can access them from here:

http://www.cram.com/flashcards/70-346-8863906

I've gone overboard on the amount of information on there but It might help those attempting to pass this exam.  Obviously this is to be used in conjunction with other courses.  I can recommend the course on Platform Scholar.

The information on the Flashcards are valid as far as I am aware.  Obviously I take no liability for incorrect information.
5
 
LVL 1

Expert Comment

by:Joe Danyi
Thank you for the flash cards! you Rock
2
 
LVL 22

Author Comment

by:David Atkin
Thanks Joe :) .  I've got my 70-347 shortly as well.  If I pass, I'll make those publicly available as well.

Also, if you want an online video I highly recommend the Platform Scholar courses.
0

Microsoft Access

218K

Solutions

51K

Contributors

Microsoft Access is a rapid application development (RAD) relational database tool. Access can be used for both desktop and web-based applications, and uses VBA (Visual Basic for Applications) as its coding language.

Vendor Experts

Gil FeldmanMonday Learn more about Monday