secure new FE after import

J

johnlute

I opened my secured FE database file and then closed it while leaving
Access open. I created a new blank database and imported all of the FE
objects into it from the secured FE file that I had closed.

What are the steps that I need to take to secure the new FE file? I
thought the steps that I took would secure it however it didn't.

Thanks!
 
T

Tom van Stiphout

On Fri, 9 Oct 2009 13:40:11 -0700 (PDT), johnlute <[email protected]>
wrote:

There are no shortcuts to downloading, studying, and fully
understanding the Access Security FAQ. As my friend Larry used to say:
30-some pages, no filler.

-Tom.
Microsoft Access MVP
 
A

Arvin Meyer [MVP]

The subject is a bit complex to address in a newsgroup posting. So
everything you need to know about security:

Security FAQ
http://support.microsoft.com/download/support/mslfiles/SECFAQ.EXE

Lynn Trapp's summarization:
http://www.ltcomputerdesigns.com/The10Steps.htm

KB articles:
http://support.microsoft.com/default.aspx?scid=KB;en-us;q165009
http://download.microsoft.com/download/access97/faq1/1/win98/en-us/secfaq.exe
http://support.microsoft.com/default.aspx?kbid=325261

Joan Wild's articles:
http://www.jmwild.com/security02.htm
http://www.jmwild.com/security97.htm
http://www.jmwild.com/SecureNoLogin.htm
http://www.jmwild.com/Unsecure.htm

--
Arvin Meyer, MCP, MVP
http://www.datastrat.com
http://www.mvps.org/access
http://www.accessmvp.com

Disclaimer: Any code or opinions are offered here as is. Some of that
code has been well tested for number of years. Some of it is untested
"aircode" typed directly into the post. Some may be code from other
authors. Some of the products recommended have been purchased and
used by the author. Others have been furnished by their manufacturers.
Still others have not been personally tested, but have been
recommended by others whom this author respects.
 
J

johnlute

Thanks, Arvin.

The subject is a bit complex to address in a newsgroup posting. So
everything you need to know about security:

Security FAQhttp://support.microsoft.com/download/support/mslfiles/SECFAQ..EXE

Lynn Trapp's summarization:http://www.ltcomputerdesigns.com/The10Steps.htm

KB articles:http://support.microsoft.com/defaul...upport.microsoft.com/default.aspx?kbid=325261

Joan Wild's articles:http://www.jmwild.com/security02.ht...NoLogin.htmhttp://www.jmwild.com/Unsecure.htm

--
Arvin Meyer, MCP, MVPhttp://www.datastrat.comhttp://www.mvps.org/accesshttp://www.accessmvp.com

Disclaimer: Any code or opinions are offered here as is. Some of that
code has been well tested for number of years. Some of it is untested
"aircode" typed directly into the post. Some may be code from other
authors. Some of the products recommended have been purchased and
used by the author. Others have been furnished by their manufacturers.
Still others have not been personally tested, but have been
recommended by others whom this author respects.








- Show quoted text -
 
J

johnlute

Thanks, Tom. So basically, you have to go through similar steps that
were taken to secure the database in the first place. I just figured
that being logged in as the owner and importing all objects from my
own secured database into a new one wouldn't require 30 pages of
nonsense.

Silly me.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top