Transcript

Procedures for Protecting a Database

Better worlds through database protection

S A F E T Y M ATT E R S

Re m o v i n g t h e a l i e n e l e m e n t

Don’t forget to write

• First line of defense

Better worlds through database protection

H u m a n i n t e r v e n t i o n

f o r t i fi c a t i o n

Imag

e c

ourt

esy

of

Colo

nia

l M

ari

nes

Better worlds through database protection

Statistics suggest that ne·far·i·ous activities involving your database occur…

MOSTLY AT NIGHT...

MOSTLY…

E V E N W H E N I T ’ S R A I N I N G …

S L E E P B E TT E R

FOLLOWING SOME BASIC RULES

Better worlds through database protection

• 1: Check and reset settings using the Auto Exec macro

• 2: Hide the Database window

• 3: Bypass the bypass

• 4: Split the database

Better worlds through database protection

• 5: Avoid Compact On Close

Simple ways to add a few layers of security to a database

• 6: Hide objects — a subtle form of protection

• 7: Use error handling to protect code

• 8: Password-protect the database

• 9: Convert to mde or accde format

• 10: Password-protect the system

Better worlds through database protection

Better worlds through database protection

When all else failslocate and contactthis woman

LT. ELLEN RIPLEY

Don’t panicand lose your headlike thisunfortunatesynthetic life form

P O I N T S T O R E M E M B E R

She maynot save youbut she cancertainly saveyour database

This concludes the presentation

top related