Attached are a series of security challenges that have been posted on several Access forums inclding Access World Forums and Utter Access.
All are designed to show ways of making Access apps reasonably secure as well as (hopefully) being 'fun' challenges to solve.
All the challenges are intended to be solvable without hacking.
Indeed trying to do so will probably make them harder to solve.
Follow the clues provided in each challenge description and the challenges themselves
You may need to search online for solutions to certain parts of the challenges
Access databases, including these, can NEVER be made 100% secure
A capable and determined hacker can break any Access database given sufficient time and motivation
However, by erecting various barriers, it is certainly possible to make the process so difficult and time consuming that it isn't normally worth attempting
The challenges increase in difficulty so it is suggested that they are attempted in the order listed. Click the links for further information and to download the challenge
4. Linked No Tables (AVAILABLE SOON)
I hope you enjoy puzzling out these challenges
Additional challenges may be added in future so please return to find what has been added
In addition, the following is provided as an example application:
Click the link below for a detailed article on the security of Access file formats
To provide feedback on a code sample, please enter your name, e-mail address and company (optional) below, add your comment and press the submit button. Thanks
If you found this site useful, please consider giving a donation to help offset the costs in keeping it running. Thanks