Protect Access2000 Database Security

Source: Internet
Author: User
In the Office family, people often only have an understanding of access2000 on its operation interface, the database management function remains on simple applications such as creating tables, inputting data, using the Form Wizard, Report Wizard, and data access page wizard. In fact, Access2000 is very powerful and beyond your imagination. It is

In the Office family members, people often only have an understanding of access 2000 on its operation interface, the database management function remains in simple applications such as table creation, data input, Form Wizard, Report Wizard, and data access page wizard. In fact, Access 2000 is very powerful and beyond your imagination. It is

In the Office family members, people often only have an understanding of access 2000 on its operation interface. DatabaseThe management function is still suspended.
In simple applications, such as creating tables, inputting data, using the Form Wizard, Report Wizard, and data access page wizard. In fact, Access 2000 is very powerful.
Big, and beyond your imagination. It is the most comprehensive function since Microsoft announced Access, and is most closely integrated with Windows and the Internet. DatabaseSoftware is a task
Very powerful and easy to use DatabaseManagement System (DBMS), that is DatabaseA system for storage, processing, and management.




Manage workgroup information files

For DatabaseBecause it stores a large amount of data, how to improve SecuritySex is a very important issue. Access 2000 has a working group information file named System. mdw by default, which stores Access DatabaseAll SecurityInformation, including user accounts and group accounts.

Note that the original System. mdw workgroup information file is not Security. When Access is installed, the installer automatically defines the default workgroup In the workgroup information file it creates. Before you start Access again, use the default workgroup information file. In the workgroup information file, you can store SecurityAccount.

Therefore SecurityBefore creating an account, you must select the Access workgroup information file that stores these accounts, and make sure that the selected workgroup information file is created using the unique workgroup identifier (WID. By default, the reason why the original System. mdw workgroup information file is not SecurityBecause its WID is blank, anyone can obtain the Administrator account defined in the workgroup information file, which has access DatabasePermissions DatabaseNot very good. Security. The user can use the worker Worker Program (workgadm.exe) in the accesscomponent directory to manage the information files of the Working Group.

Group and user management

   DatabaseThe Administrator has the right to add or delete groups and users. It is best to design members of the same project into a group. Access classifies users into various groups, so Database SecurityManagement can be greatly simplified, that is, assigning permissions to a group rather than a single user, and then changing the permissions of a single user by adding or deleting the user to or from the group. Users in the same group can be granted new permissions by performing an operation. To DatabaseOf Security. DatabaseUsers and groups should be deleted in a timely manner.

Set administrator password

After using the new workgroup information file, you can set an administrator password to prevent others from accessing your DatabaseSystem. To set the administrator password, follow these steps.

1. Click "tools/ Security/User and group account "to bring up the" window "for users and group accounts (see figure ).

2. Click the "Change logon password" tab to bring up the Change Password dialog box. In the dialog box, enter the old password. When you enter the password for the first time, you do not need to enter the password because the Administrator does not have a password. Enter the new password twice in the new password and verification box, and click the [OK] button.

When you restart Access, a "Logon" box appears, asking you to enter the name and password. After you enter them separately, click the [OK] button. Note that the password is case-sensitive and should be kept in mind; otherwise, the password cannot be entered. Database.

To change the user password, enter the user name in the Login Dialog Box. If the user name does not have a password, enter DatabaseYou do not need to provide a password. If you have a password, you need to provide the original password. Open Database, Set the user's new password according to the above steps, and start the next time DatabaseWhen using the changed user name to log on, you must provide the new password to open Database.

   DatabasePermissions

In Access 2000 DatabaseThere are two types of access permissions: explicit and implicit. Explicit permission is used to directly grant permissions to a user account, which is dedicated to this user account and has nothing to do with other users. Implicit permission is the permission granted to the group account, that is, the permissions granted to the group when the user joins the group. If a user has both of the preceding permissions SecuritySexual DatabaseWhen the access is performed, the permissions are the intersection of the two permissions.

In Access DatabaseAccess Group and user DatabasePermission setting can only be done by the Administrator. The configured permissions include: "Open/run", "read design", "Modify design", "manage", "read data", "update data", "insert data", and "delete data.

Set and modify user permissions

Log on as an administrator and start Database. Click "tools/ Security/User and group permissions. The "user and group permissions" window is displayed. There are two radio buttons: "user" and "group, used to change the permissions of users or groups. The Group permission includes the user permission. If the Group permission allows data update, the user has the right to update the data, regardless of whether the permission is selected. Select an object for permission setting in the object type, including tables, queries, forms, reports, macros, and modules. The Object Name box lists all the content of the object. For example, if the object type is table, the names of all tables are listed.
You can select one or more tables. To set permissions, click the check button (check box) in the lower part of the window. After the selection is complete, click the [OK] button. By modifying group permissions, all users in a group have the same permissions. For example, to revoke the Design Modification permission of a user group DatabaseYou do not have the right to modify the design.

Encryption Database

   Security ProtectionThe more measures, DatabaseThe more Security. Access will DatabaseEncryption. If the user is new DatabaseStored in the original location, and with the original DatabaseIf the same name is used, Access will automatically use the encrypted DatabaseChange the original DatabaseReplace. If the storage cannot be encrypted due to insufficient disk space or other reasons Database, Access will retain the original Database.

Encryption DatabaseFollow these steps:

1. Use the relevant workgroup information file to start Access and disable all opened DatabaseAnd ensure that all users on the Internet no longer use this Database.

2. Click "tools/ Security/Encryption/Decryption Database", The" encryption and decryption "dialog box appears.

3. In the dialog box, you can specify Database, Here DatabaseIt must also be a setting SecurityMechanism Database. Click [OK. " Database"Save as encrypted" dialog box.

4. In this dialog box, you must specify the encrypted DatabaseName, and valid DatabaseAnd then click [OK.

The last note is that Access 2000 is DatabaseTherefore, a better configuration is required. For users who install Access 2000, the required hardware configuration is as follows:

1. Pentium 200 or above.

2. 2 GB or above hard disk.

3. No less than 32 MB memory.

4. One Optical Drive.

Installing Access 2000 requires about MB of disk space. When you select a drive, you must have sufficient disk space. Otherwise, the installation will fail or you will not be able to use it properly.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.