Hi folks -
Any suggestions as to how I can monitor who or what is attempting to access our tables, and then stop them? We have an application that we ship based upon concurrent user. Users are attempting to make the data files available on the internet and/or modfiy through alternate applications. Often not using the correct drivers, resulting in our tables getting corrupted.
Any suggestions, besides incrypting the data ?
Thanks,
LarryH
larry@omicronfinancial.com