order of security

G

Guest

could someone let me know what order to conduct the following :
Encode the data base,
split the database,
make multiple copies of the front end,
make SOME of the front ends into mde files (leave others for further
development),
apply user level security,
determine startup options,
disable shift key override,
anything else to nail the security.

Cheers.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top