Chapter 20. Macro Security

Now more than ever, we have to concern ourselves with the security of our computer systems. One form of security addresses securing the information contained in our databases as well as the intellectual property built into our databases. This form of security was discussed in Chapter 16, "Database Security."

Another form of security has to do with preventing malicious attacks on our computers-attacks that can delete files, spread viruses, or otherwise disrupt our work. This chapter discusses the security enhancements built into Access 2003, which help us protect our computer systems and our users' computer systems.

In Microsoft's efforts to make sure everything is secure, they had to deal with the fact that an Access database has a lot of power (something Access developers have known all along). And because of this power, someone who chooses to use Access maliciously can make an Access database perform destructive operations.

Unfortunately, curbing this power led Microsoft to make changes to Access 2003 that will cause us to do a little more work to make databases as easy to use as they have been with prior versions of Access. But let's face it, if our users used Access to open a database from someone else and that database then attacked their computer, they could easily blame Access, rather than the database they opened, for the attack. Their confidence level for using Access in the way we would like them to use it would be right out the window. So, ...

Get Access 2003 VBA Programmer's Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.