bcap said:
Presumably it would suffer from the same problem that
has afflicted reverse compilers since the dawn of time,
i.e. no meaningful identifiers, merely unhelpful tokens?
I was surprised to read that does not seem to be the case. As I said, I
have no need for such software, and little time to waste on pursuing
unnecessary information, so I did not obtain a copy and try it out. I do
not know if the third-party software works with Access 2007 ACCDEs, at all,
or the same.
The "compiled" output option may have been retained in Access 2007 for
performance rather than for security reasons. "Cracking" software
notwithstanding, I would generally recommend to my clients that the
front-end distributed to users be an MDE or an ACCDE, unless there were
compelling reasons to distribute an MDB or ACCDB. I have not done
applications for "general distribution", only "bespoke systems" for specific
clients' internal use, and it should be noted that I don't make any
recommendations regarding "general distribution" of Access database
applications.
With the exception of a couple of cases of consulting specifically on
security, in the days of Access 2.0 prior to the revelation of the
CopyObject flaw, my paying Access work has not used Access user and group
level security, but relied on server DB security to secure the data, or
permissions to users on the server shared folder. Where appropriate and
possible, the distributed front-end copy was compiled to MDE, and made
available in a shared folder, from which users could download a "good copy"
if "anything happened" to the copy of the front-end on the user's machine.
Larry Linson
Microsoft Office Access MVP