Attached are a series of security challenges that have been posted on several Access forums including Access World Forums and Utter Access.
All have been designed to show ways of making Access apps reasonably secure as well as (hopefully) being 'fun' challenges to solve.
All the challenges are intended to be solvable without hacking.
Indeed trying to do so will probably make them harder to solve.
Follow the clues provided in each challenge description and the challenges themselves
You may need to search online for solutions to certain parts of the challenges
Access databases, including these, can NEVER be made 100% secure
A capable and determined hacker can break any Access database given sufficient time and motivation
However, by erecting various barriers, it is certainly possible to make the process so difficult and time consuming that it isn't normally worth attempting
The challenges increase in difficulty so it is suggested that they are attempted in the order listed. Click the links for further information and to download the challenge.
1. Show/Hide Tables
2. Hidden Message
3. Activation Challenge
4. Encrypted Split No Strings
5. Complex Deep Hidden Attachment Mystery
I hope you enjoy puzzling out these challenges
Additional challenges may be added in future so please return to find what has been added.
You may also be interested in the following example applications:
6. Kiosk Style Database
7. Combobox Zombies Puzzle
Click the links below for detailed articles on the security of Access file formats
Compare Access File Security : MDB/MDE vs ACCDB/ACCDE
Improve Access File Security