>- Security can be reached by using COM/DCOM/COM+/remote control/ layers which shields the database from the user.Walter,
Given that this is an issue that usually comes up at every prospective client meeting/demo, I was wondering if you could please go into more detail on this point since I'm very curious about how you implement this. I think the key security aspect would be the data files sitting in a shared network directory and other users on the network having access to that shared data via ODBC or OLEDB. Would the VFP layers that you speak of successfully prohibit any user from making modifications to the data?
Laterness,
Jon
Jon Rosenbaum
Devcon Drummer