Mylton
Member
- Local time
- Today, 15:24
- Joined
- Aug 3, 2019
- Messages
- 124
Góis morning
These doubts became more evident to me from the need to learn, to look for literature and/or “more basic” examples.
These doubts became more evident to me from the need to learn, to look for literature and/or “more basic” examples.
Essas dúvidas ficaram mais evidentes para mim pela necessidade de aprender, de buscar na literatura e/ou exemplos “mais básicos”.
These doubts became more evident to me based on the need to learn, to look for “more basic” literature and/or examples.
Essas dúvidas ficaram mais evidentes para mim a partir da necessidade de aprender, de buscar literaturas e/ou exemplos “mais básicos”.
And I refer to basics as being a kind of school or colleges or books, where you can read understand and practice.
But I see myself a bit lost with a lot of information without understanding why.
This became clear to me when I read this thread
And there…
I'm here asking for some of your knowledge so that I can walk more firmly in this universe that I learned to like and relax my mind.
Because this question is more related to coding, I put it in this topic, if it is not ideal, I apologize.
We know that access to other DB does not have the same security, so some people create mechanisms to make access difficult and prevent copies of the App.
I know there are some examples on this site and others out there.
But I would like to learn a little more.
Obtain literature to remove so many doubts.
That's why I'm here.
If anyone can give their opinion I would be grateful.
We have the question of encrypted login which would be easier or better or secure? 256? 128?
I noticed that at login some use a standard security type level 1, 2 and 3.
Why these three levels and not more or less?
If we adopt a login for activities or departments, how can we integrate this with the login when the person enters?
Like so-and-so who belongs to the secretariat only accesses records.
If we could integrate this into a mechanism of who came in and did what, would that be ideal?
Finally, regarding copy protection.
Is this idea of limiting by number of records in a key table bad or crazy? Where, when reaching this limit, would you leave all the buttons disabled only enabling them when you entered the code?
All by code ok?
Is it illegal or easy to get around?
If easy how do they do it or how do we prevent it?
Whether illegal? Why?
Thank you all for the teachings.
Thanks.
These doubts became more evident to me from the need to learn, to look for literature and/or “more basic” examples.
These doubts became more evident to me from the need to learn, to look for literature and/or “more basic” examples.
Essas dúvidas ficaram mais evidentes para mim pela necessidade de aprender, de buscar na literatura e/ou exemplos “mais básicos”.
These doubts became more evident to me based on the need to learn, to look for “more basic” literature and/or examples.
Essas dúvidas ficaram mais evidentes para mim a partir da necessidade de aprender, de buscar literaturas e/ou exemplos “mais básicos”.
And I refer to basics as being a kind of school or colleges or books, where you can read understand and practice.
But I see myself a bit lost with a lot of information without understanding why.
This became clear to me when I read this thread
Replacement Switchboard
This Switchboard form is based on the last VBA version which I think was A2k. I expanded it to allow for 12 items rather than 8 and you can easily change it to do more. I've included directions. This updated version has two switchboards. One more traditional and the other is big buttons...
www.access-programmers.co.uk
And there…
I'm here asking for some of your knowledge so that I can walk more firmly in this universe that I learned to like and relax my mind.
Because this question is more related to coding, I put it in this topic, if it is not ideal, I apologize.
We know that access to other DB does not have the same security, so some people create mechanisms to make access difficult and prevent copies of the App.
I know there are some examples on this site and others out there.
But I would like to learn a little more.
Obtain literature to remove so many doubts.
That's why I'm here.
If anyone can give their opinion I would be grateful.
We have the question of encrypted login which would be easier or better or secure? 256? 128?
I noticed that at login some use a standard security type level 1, 2 and 3.
Why these three levels and not more or less?
If we adopt a login for activities or departments, how can we integrate this with the login when the person enters?
Like so-and-so who belongs to the secretariat only accesses records.
If we could integrate this into a mechanism of who came in and did what, would that be ideal?
Finally, regarding copy protection.
Is this idea of limiting by number of records in a key table bad or crazy? Where, when reaching this limit, would you leave all the buttons disabled only enabling them when you entered the code?
All by code ok?
Is it illegal or easy to get around?
If easy how do they do it or how do we prevent it?
Whether illegal? Why?
Thank you all for the teachings.
Thanks.