Changing a query Dynamically

Thanks Greg

I no longer sign Access files myself but hopefully Phillip Stiefel (sonic8) will see and possibly respond to this thread
 
That article only mentions signing the accdc package. As far as I am aware, there is no way to usefully sign an accde file.
Well, the article describes what you end up with when following the documentation on "Signing your database". - And, yes, that is effectively creating and signing an AccDC package.

Beyond that, I agree with your assessment of the current options for signing Access files and do not have anything to add. :-/
 
adding a digital signature to an ACCDB/ACCDE file has absolutely no effect.

This is in fact a basic security concept. One of the reasons that .MDx and .ACCDx files are less than perfectly secure is that the putative hacker doesn't play by the rules.

It has long been known that when you lock something, you do so by using a particular type of system call. Hackers, because they use backdoors and such, never go through the system routine that would normally check for locks. If your hacker had a way to determine a physical block address on a disk and had physical I/O capability (which is one of the things hackers commonly get), THERE ARE NO LOCKS.

Therefore, when someone puts a digital signature on something, that only tells the FILE system that a signature exists. In this case, Access doesn't care so doesn't honor the implications of the signature or test the file for tampering.

It is important, therefore, to realize that methods used to secure a database only work for those people who play by the rules. For people to whom rules are at best speed bumps along the road, they will drive in that Mack truck and abscond with all your data pretty much at leisure. Which is why encryption and other obscuration methods are so important if you have critical data.
 
Signatures were never intended to secure the data. Their purpose is solely to validate that the file has not been tampered with since having an authorised signature applied.

They are used in conjunction with system settings that prevent the running of unsigned applications or applications where the signature does not match the content, depending on the settings.

In the case of Office documents it prevents users inadvertently opening files that may contain malicious macros.
 

Users who are viewing this thread

Back
Top Bottom