hi everyone,
i distributed an application a little while back and got a call saying it wasn't working. apparently, someone got into the code and tried to tweek it to do something different then it was originally designed to do. it wasn't that big of deal, but i was wondering if there are any precautions i could take to monitor or at least document if any code behind forms/reports has been changed. i'd say in 99% of the time using jet security will work, but at least a couple people will want to have full admin rights. any ideas?
thanks
i distributed an application a little while back and got a call saying it wasn't working. apparently, someone got into the code and tried to tweek it to do something different then it was originally designed to do. it wasn't that big of deal, but i was wondering if there are any precautions i could take to monitor or at least document if any code behind forms/reports has been changed. i'd say in 99% of the time using jet security will work, but at least a couple people will want to have full admin rights. any ideas?
thanks