Share this Page URL

Chapter 19. Implementing Security > Startup Options - Pg. 670

Implementing Security 670 Just the Steps Hide an object 1. 2. 3. 4. 5. 1. 2. 3. Open an existing database. Click on the Tables object in the Object list of the Database window. Right-click on the a table, and click Properties. On the General tab of the Properties dialog box for the table you selected, select the Hidden check box. Click OK. Open an existing database. Click Tools, Security, Encode/Decode Database. Access will display a File Save dialog box. Browse to the location where you want to save the file, and, in the File Name box, enter a filename; then click Save. Encode a database You can distribute your .mde file just as you would your .mdb file. However, your .mde file is sig- nificantly less prone to modification, thus retaining the integrity of your database. You should note that once a file is converted to an .mde file, it can't be converted back. Because of this, you should save your .mdb file in case you want to make modifications or corrections to code in your database. One approach would be to use the .mde file for publication purposes only and use the .mdb file as the "source" database. With this approach, all changes to the database (enhancements, bug fixes, changes) would be done to the .mdb, which would then be saved as an MDE file and published for public consumption.