1- It worked with jack, 1234. But it seems it can be logged in with any other name and password. check JOJOBA, 567654.
You will need to add a field or two to your existing table and then be sure to manually, using code, update these fields when the user add or updates records. These fields would be UserID and CreateDate and/or ModifiedDate or both.2- How can we design it so that after jack logs in with his user/pass, all data are entered by his name. In other word we will be able to know which user has entered what specific data.
You would need to design a good user interface. There is a way to use code to disable the use of the Shift key when openiing the database. There are several other things that you will want to consider when distributing your database. I would suggest that you consentrate on getting the design of your tables correct for your database, and then creating the user interface. Then when you are ready to have users use it, you can post back asking specific questions about how to accomplish what you need.3- I am now really worried about a security leak. I used to go to “access options/current data base” and remove the check boxes from “display navigation pane” and “allow full menu” and then guide the user through a panel into different already designed forms and reports. Now it seems by simply holding down the SHIFT key the user will see the heart of database and will be able to change data. Is there a way to totally make access a secure and blocked database?