The Protection of ms access

Asked By 0 points N/A Posted on -
qa-featured

Explain about the protection features present in MS Access?

Thank you people.

SHARE
Best Answer by lee hung
Best Answer
Best Answer
Answered By 75 points N/A #88369

The Protection of ms access

qa-featured

You do not access MS Access from C you do it from windows by using MS Access API calls. MS Access does not run on a computer running Linux, QNX or DOS etc. but they can all be programmed in C.

Below is additional information about helping to secure your computer and prevent any unauthorized access from other people or software programs; helping keep your information safe.

Operating system and software patches and updates.

There is no such thing as perfect software, often a software program may have several issues and could potentially have security vulnerabilities that can leave your computer open to attacks that compromise your computer and your data.

Software patches,updates, and drivers are made available, often for free, to consumers to help keep a software & operating system running properly and secure.

If the program you're using does not have any method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program. A listing of third-party companies and links to each of their pages can be found on our third party support page.

Answered By 20 points N/A #88371

The Protection of ms access

qa-featured

MS Access offers many ways to secure any file or any application as you like also remain the product productive. The most important thing is to secure your file by set a password access. You can control all the database object by this.

What an important thing it is! But this is a weak form of protection which can easily be manipulated by intruders and normally use for common user. For higher level of protection there is a use of workgroup security which is define by user name and password. You can also encrypted database.

With the help of ACCdb format you can step up to a advanced encryption.

Related Questions