Good point, Hank - I appreciate your input.
>Using network rights and impersonation within your application, a DBC is as secure as any other file can be made to be. The problem is most people don't go to the trouble to do it. Just an FYI when you are considering options.
Previous
Reply
View the map of this thread
View the map of this thread starting from this message only
View all messages of this thread
View all messages of this thread starting from this message only