Access this article describes the techniques for using Access's security features and good habits to control access macro viruses.
Anti-virus common skills
It is important to keep your antivirus software updated at all times. New viruses appear every day, anti-virus vendors also through the network, BBS and other carriers to constantly introduce the latest virus database and software, so a focus on security users, should ensure a suitable frequency to constantly update their anti-virus software, not with unreliable people or systems to share the database, Not downloading or using an obscure Access database from a network is an effective way to prevent access viruses.
Microsoft's Future Solutions
Users familiar with Word 97, office/9.shtml ' target= ' _blank ' class= ' article ' >excel 97 know that when you open a document or workbook that contains macros, Word and Excel will prompt: " The file contains macros and whether macros are run. This is because in the 95 version of the software began a large number of macro viruses, so in the 97 version of the increase in this alarm function. Access viruses have never been seen before and are not available in Access 97, and Microsoft will provide this functionality in a new version of Access.
Using Access security features to prevent viruses
Database security has two options: Database password protection, user-level security.
1. Database password protection
You can add a password to the database by following these steps:
(1) Open the database in exclusive mode.
(2) Select "Security" in the "Tools" menu and select "Set Database Password".
(3) Enter and verify the password.
After that, to open the database, you must enter the correct password. And the virus to infect a password-protected database, access security features will prompt the user to enter a password, alert users will realize that this is an abnormal operation, in the Password Input dialog box select "Cancel" will not open the database, thereby preventing the virus infection.
2. User-level security
Use user-level security to give different permissions to users in different groups. The operation method is as follows:
(1) Use the Workgroup Administrator program to create and connect a workgroup file. This program is typically located in the \program Files\Microsoft Office Directory, and the shortcut is named "MS Access Workgroup Administrator."
(2) Create a new user and add the user to the Administrators group.
(3) Remove the administrator account from the Administrators group.
(4) Assign a password to the user in the newly created Administrators group, forcing him to log in with a password.
(5) Restart Access and log in as the new administrator user.
(6) Run the user-Level Security wizard, create a new database, and copy all objects to the new database.
Now you have a security-protected database. You can add users and groups to them through the Security dialog box, assigning the appropriate permissions. Since then, if a potentially toxic database is downloaded from the network, you can use the default workgroup file to open the database, even if it is really poisonous, and the virus in the poisoned database does not have enough permissions to infect the security-protected database.