Skip to Content
Access 2010: The Missing Manual
book

Access 2010: The Missing Manual

by Matthew MacDonald
June 2010
Intermediate to advanced
834 pages
29h 12m
English
O'Reilly Media, Inc.
Content preview from Access 2010: The Missing Manual

Macros and Security

In recent years, the people at Microsoft have become paranoid about security. They’ve clamped down in Office programs like Access in a bid to lock out evil virus writers. And although these changes make Access a safer place to be, they also make it a bit inconvenient to use certain types of macros.

Unsafe Macro Actions

Access distinguishes between two types of macros: those that are always harmless, no matter how they’re used, and those that have the potential for abuse. The OpenTable macro is harmless. It could open a table you don’t want to see, but it can’t cause any real mischief. On the other hand, the PrintOut macro isn’t as innocent. In the wrong hands, it could send 400 copies of your data to the printer in 80-point font. Similarly, DeleteObject could wreak real havoc in your database, and RunApplication definitely isn’t safe—it could launch the latest spyware or install a computer virus.

When you create a macro, the drop-down list of actions shows only actions that are 100 percent harmless. These actions are known as safe actions. Of course, you can have valid reasons to use potentially unsafe macros. Maybe you really do want to print a report, delete an object, or run another program. In that case, you need to use potentially unsafe macro actions—ones that Access doesn’t trust quite so readily.

Note

As long as you’re the one in control of your database, you know it doesn’t contain devious code and other trickery. There’s no good reason to stay away from ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Access 2013: The Missing Manual

Access 2013: The Missing Manual

Matthew MacDonald
Microsoft® Access® 2010 24-Hour Trainer

Microsoft® Access® 2010 24-Hour Trainer

Geoffrey L. Griffith, Truitt L. Bradly
Professional Access 2013 Programming

Professional Access 2013 Programming

Teresa Hennig, Ben Clothier, George Hepworth, Dagi Yudovich

Publisher Resources

ISBN: 9781449382384Errata Page