Dù bằng cách nào, bạn có chắc để tìm mà Access cung cấp các giải pháp mạnh mẽ để phát triển các ứng dụng an toàn. Việc truy cập các tập tin trợ giúp, các bài viết cơ sở tri thức, và MSDN tất cả các cung cấp hướng dẫn hữu ích và hướng dẫn về các khía cạnh khác nhau của an ninh truy cập và làm thế nào để bảo mật dữ liệu và mã. | Chapter 22 Protecting Yourself with Access 2007 Security Of course Notepad is not likely to cause problems that would result in destroying your computer. But there are a lot of destructive programs on your computer for example as well as destructive commands such as DEL that could be run using such a technique. Those code lines could have been written in an Access macro. That macro could have been named AutoExec which automatically runs when a database is opened. If the Shell function had called a destructive program instead of Notepad or if the SQL had contained a destructive command like DEL data could be destroyed on the computer that opened the database or worse yet data could be destroyed on other computers networked to the computer that opened the database. So if you re not paying attention to the databases you open or worse yet your users aren t paying attention well you have heard about the countless hours spent recovering from viruses. That is nothing compared to the value of data that can be deleted if a hard disk drive is reformatted. And malicious code can do just that. Enabling a Database When Access opens a database it gives certain information known as evidence to the Trust Center. For Access the evidence includes the location of the file and the digital signature of the database if it has one. The Trust Center takes the evidence and makes a trust decision based on certain logic. The decision is then given to Access which opens the database in either Disabled or Enabled mode as needed. Figure 22-9 illustrates the logic for determining whether a database will open in Disabled mode. Figure 22-9 763 Chapter 22 Protecting Yourself with Access 2007 Security When a database is disabled there are a few different ways to enable it. First you can click the Options button in the Message Bar. That opens the Office Security Options dialog box as shown in Figure 22-10. Figure 22-10 To enable the database select Enable This Content and click OK. The .