Installing Your MS Access Database (Manual Installation Instructions)



Similar documents
Red Sky Desktop Software. Freeware License Agreement

Flobo Hard Disk Repair User guide

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation

SUBSCRIPTION SERVICES.

AMERICAN INSTITUTES FOR RESEARCH OPEN SOURCE SOFTWARE LICENSE

RockWare Click-Wrap Software License Agreement ( License )

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:

1. GRANT OF LICENSE. Formdocs LLC grants you the following rights provided that you comply with all terms and conditions of this EULA:

END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT

MDM Zinc 3.0 End User License Agreement (EULA)

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

FILEMAKER PRO ADVANCED SOFTWARE LICENSE

BACKUPPRO TERMS OF USE AND END USER LICENSE AGREEMENT

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS

MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT

McAfee End User License Agreement

EMBARCADERO ONLINE PRODUCT CERTIFICATION AGREEMENT

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

WORKFLOW INTEGRATOR INSTALLATION GUIDE

ATTENTION: This legal notice applies to the entire contents of this website under the domain name

Covered California. Terms and Conditions of Use

APPLIED BIOSYSTEMS END USER SOFTWARE LICENSE AGREEMENT FOR INSTRUMENT OPERATING AND ASSOCIATED BUNDLED SOFTWARE AND LIMITED PRODUCT WARRANTY

Terms & Conditions. Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com).

End-User Software License Agreement

TERMS and CONDITIONS OF USE - NextSTEPS TM

1. GRANT OF LICENSE. Acunetix Ltd. grants you the following rights provided that you comply with all terms and conditions of this EULA:

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS

General Terms and Conditions for Online Sales of TomTom Inc ( TomTom )

Long Island IVF Terms and Conditions of Use

Terms of Use (basic) 1

END-USER LICENSE AGREEMENT FOR DIGIMETRICS AURORA SOFTWARE

SMARTDRAW SOFTWARE LICENSE AGREEMENT

"You" and "Your" refers to any person or entity that acquires or uses the Software or Documentation.

Best Companies Limited Website Terms and Conditions

INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User)

QuickBack. User s Guide

ecopy Business Automation Services Software License Agreement

Welcome to InFixi Exchange Mailbox Recovery Software. Help Guide. Exchange Mailbox recovery software

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,

Please read these Terms and Conditions carefully. They Govern your access and use of our Website and services on it.

TOLEDOTEL INTERNET SERVICE AGREEMENT (As of July, 2014)

Web Terms & Conditions

The London School of Architecture Website Terms & Conditions

WEBSITE TERMS OF USE

SOLARWINDS, INC. ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED

Website terms and conditions

AB SCIEX LLC END USER SOFTWARE LICENSE AGREEMENT and LIMITED PRODUCT WARRANTY MarkerView Software, version 1.2.1

SAMPLE RETURN POLICY

TERMS AND CONDITIONS

MiSync Personal for Beams

Terms of Use/ Disclaimers/ Contract/ Agreement

Scanner Wedge for Windows Software User Guide

SOFTWARE HOSTING AND SERVICES AGREEMENT

SOFTWARE HOSTING AND SERVICES AGREEMENT PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE SERVICES OR WEBSITE. The SuiteCRM website (hereinafter

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

(the "Website") is provided by Your Choice Counselling.

The software on this device includes software licensed by Company from Microsoft Corporation or its affiliates.

Service Agreement: January 2008

Affiliate means a legal entity that is owned by or under common ownership with Stratus Technologies Ireland Limited.

InnoCaption TM Service Terms of Use

Terms & Conditions Template

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

ZaZaChat End User License Agreement

The Credit Control, LLC Web Site is comprised of various Web pages operated by Credit Control, LLC.

CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE

Zander Identity Theft Solutions Benefits Summary and Terms of Service

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement

Mobile Banking and Mobile Deposit Terms & Conditions

Sun Microsystems, Inc. ("Sun") ENTITLEMENT for SOFTWARE. Licensee/Company: Entity receiving Software.

End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011

Terms of Service. Your Information and Privacy

BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS

These Terms and Conditions supersede all previous Terms and Conditions

TERMS OF USE TomTom Websites

Terms and Conditions

ACOT WEBSITE PRIVACY POLICY

We suggest you retain a copy of these End User Terms of Use for your records.

REPAIR SERVICES AND PROCESSING FEES.

Website TERMS OF USE AND CONDITIONS

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE.

These Terms apply both to your use of, and to all Internet traffic visiting, this Web site.

Aruba Bank Online Terms of Agreement

Copyright Sagicor Life Insurance Company. All rights reserved.

MEDJOBBERS.COM & JOBBERS INC TERMS AND CONDITIONS

Dell Statistica Statistica Enterprise Installation Instructions

Tower Software License Agreement

Licence Agreement (the Agreement )

Transcription:

Installing Your MS Access Database (Manual Installation Instructions) Installation and Setup Instructions... 1 Single User Setup... 1 Multiple User Setup... 2 Adjusting Microsoft Access 2003 Macro Security... 2 Access 2007 & 2010 - Trusted Folder Locations:... 3 Warranty & Limited Liability Information... 4 Installation and Setup Instructions Before installing the database, you should consider whether you want the database set up for use by a single user on a single computer, or setup for use by multiple users, or multiple computers, on a network. If the database will only be used by a single user see the Single User Setup instructions below. If the database is to be used by multiple users and/or accessed from multiple computers on your network, the see the section titled Multiple User Setup. For security of your data you should ensure that you install that database in a local or network folder that is included in your regular data back-up regime. Single User Setup Follow this process to set the database up for a single user: 1. Create a new folder in the location where you want to store the database; this may be your My Documents folder or another folder located on your computer or network. Whatever the location it should be somewhere which is included in your regularly backup. It is important that the location where the folder is created is NOT within a replicated folder structure. You must also ensure that you must have full red, write, delete and execute permissions within the folder. 2. Extract all the files, from the WinZip file provided, to the folder you have created for the database. 3. Create a shortcut from the main database file and place the shortcut on your desktop or other convenient location. The main database file is usually named the same as the actual database. For instance if have downloaded the Assets database the main database file will be called Assets.mde (You may or may not see the.mde extension depending on your computer settings) 4. Before first starting the database: If you are using Microsoft Access version 2003 read the section on Adjusting Microsoft Access 2003 Macro Security. If you are using Microsoft Access version 2007 or 2010 read the section Access 2007 & 2010 - Trusted Folder Locations depending on the version of Microsoft Access that they have installed on their computer. 5. Once you have completed the installation process you can run the database at any time by double clicking the shortcut you created at step 3. Page 1

Multiple User Setup If you have chosen to setup the database for access by multiple users, or for access from multiple computers, in your home or office you should where possible install the database in a shared folder or network location which has been similarly mapped on all computers. If you need to setup the database in a folder which is not similarly mapped on all user s computers then you can still share the database, however each user will need to create their own shortcut to the database (see item 4 below) to ensure that it is appropriate for their own drive mappings. You MUST also ensure that all users have full permissions (read, write, modify and delete) in the folder where the database is stored. If all users do not have full permissions to the database folder other users may be prevented from accessing the database whilst the user with limited permissions has the database open on their computer. (If necessary speak to your network administrator for information on folder permissions or visit the Microsoft website for further information.) Follow this process to setup the database for multiple users: 1. Create a new folder in a shared location on your network (or computer) in which to install the database. The database folder MUST not be in a replicated location or set of folders. 2. Extract all the files, from the WinZip file provided, to the folder you have created for the database. 3. Create a shortcut from the main database file, in the database folder. The main database file is usually named similar to the actual database. For instance if have downloaded the Assets database the main database file will be similar to Assets.mde (You may or may not see the.mde extension depending on your computer settings) 4. Copy the shortcut that you created in the database folder to your desktop or other convenient location. (If the shared folder location is similarly mapped on other user s computers then they need only copy of this same shortcut to their own computer. If the other user has a different drive mapping to the shared folder location then they should create their own shortcut to the main database file.) 5. Before starting the database, each user should read and if applicable follow the steps outlined in Adjusting Microsoft Access 2003 Macro Security or Access 2007 & 2010 - Trusted Folder Locations depending on the version of Microsoft Access that they have installed on their computer. 6. Once a user has completed the installation process they can run the database at any time by double clicking the shortcut created at step 4. Adjusting Microsoft Access 2003 Macro Security By default, the upgraded macro protection in Microsoft Access 2003 is set to medium security level. As a result of this you may experience a Warning Page each time you open a Microsoft Access database which was not created on your own computer. To use the database you will be required to select the option which will allow the macros and code to run before the database will function properly. This will occur whenever the macro security level is set to medium or high. The reason this occurs is because Microsoft Access databases usually contain Visual Basic code and/or Macros which could be programmed with malicious code. This is also the reason why you should not run any Access database unless you have obtained the database from a trusted source. Page 2

As with most Microsoft Access databases, all of our free samples contain visual basic coding and/or macros and therefore unless you have adjusted the Macro Security level in MS Access 2003 the warning dialog box will be displayed. If you want to run the sample database you must select the OPEN button when prompted. If you do not select the 'OPEN' when prompted the database will not function correctly. If you only ever run Microsoft Access databases that you have obtained from trusted sources, such as G.I. Business Database Solutions, you can elect to lower the Macro Security settings to prevent the warnings being displayed. This is a simple process which takes only a minute or so to setup. For instructions on how to adjust your Microsoft Access 2003 macro security setting, click the following link to view or download the step by step guide for Microsoft Access 2003 from our website. Access 2007 & 2010 - Trusted Folder Locations: When Microsoft Access version 2007 or Microsoft Access version 2010 is installed on your computer and you elect to nun an Access database created by someone else it may be necessary to let your installation of Access know that you trust the database. This is because Access databases usually contain Visual Basic code and/or Macros, which could be programmed with malicious code. For this reason Microsoft Access 2007 and 2010 will by default prevent any visual basic code or macros from running in any database which was not created on your computer. In fact, you should only ever run Access databases that you obtained from a trusted source. As with most Microsoft Access databases, all of our production and free database samples contain visual basic coding and/or macros to provide advanced functionality. Therefore to properly run any of the Access databases that we provide it is necessary for you let your installation of MS Access know that the database is trusted. If you do NOT add the folder containing the database as a trusted location then the database will not function correctly or may not function at all. To let Microsoft Access (2007 or 2010) know that you trust a database that was not created on your computer all you need do is install the database in an existing trusted folder location, or add the folder in which the database is installed to the list of trusted locations in Access. Access allows you to trust a single folder, or to trust a folder and all sub-folders beneathnder that folder. This is a simple process which takes only a minute or so to setup using the Microsoft Access database options. The process for setting up Trusted Locations is similar in both Access 2007 and Access 2010. To assist you we have created step by step guides for both Microsoft Access 2007 and 2010. The guides are available on our website and will step you through the process of adding trusted folder locations for your particular version of Microsoft Access. To view or download the step by step guide for your version of Microsoft Access (2007 or 2010) click the link to visit the relevant page on our website. Page 3

Warranty & Limited Liability Information END USERS LICENSE AGREEMENT **MUST BE READ BEFORE INSTALLING OR USING THIS SOFTWARE** BY USING THE SOFTWARE YOU ACKNOWLEDGE THAT YOU HAVE READ THIS END USER LICENCE AGREEMENT, UNDERSTAND IT AND AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS. YOU ALSO AGREE THAT THE LIMITED WARRANTY IS THE COMPLETE AND EXCLUSIVE STATEMENT OF AGREEMENT BETWEEN THE PARTIES AND SUPERSEDE ALL PROPOSALS OR PRIOR AGREEMENTS, ORAL OR WRITTEN, AND ANY OTHER COMMUNICATIONS BETWEEN THE PARTIES RELATING TO THE SUBJECT MATTER OF THE LIMITED WARRANTY. IF YOU DO NOT ACCEPT THE LICENSE TERMS AND CONDITIONS SET OUT IN THIS END USERS LICENCE AGREEMENT, DO NOT INSTALL, OPERATE OR OTHERWISE USE THE SOFTWARE. This software and accompanying written materials (if any) including instructions for use are provided "as is" without warranty of any kind. GI Business Database Solutions (Gallery Image) does not warrant, guarantee, or make any representations regarding the use, or the results of use, of the software or written materials (if any) in terms of correctness, accuracy, reliability, correctness, or otherwise. The entire risk as to the performance of the software and the accuracy of results, reports or other information provided by the software is assumed by you. If the software or written materials are defective, you, and not GI Business Database Solutions or its owners, distributors, agents, or employees, assume the entire cost of all necessary servicing, repair or correction. Under no circumstances and under no legal theory, tort, contract or otherwise shall GI Business Database Solutions nor anyone else who has been involved in the creation, production or delivery of this software be liable to you or any other person for any direct, indirect, consequential or incidental damages of any character including without limitation damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses arising from the use of this software. In no event will GI Business Database Solutions be liable for any damages in excess of the amount GI Business Database Solutions received from you (if any) for the software even if GI Business Database Solutions shall have been informed of the possibility of such damages or for any claim by any third party. This limitation of liability shall not apply to liability for death or personal injury resulting from GI Business Database Solutions negligence only to the extent applicable law prohibits such limitation. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages so this exclusion and limitation may not apply to you. The above is the only warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose, that is made by GI Business Database Solutions on this software. No oral or written information or advice given by GI Business Database Solutions, its owners, distributors, agents or employees shall create any further warranty or in any way increase the scope of this warranty and you may not rely on any such information or advice. You the end user is responsible for the maintenance and the security of your computer systems and in particular the confidentiality and privacy law requirements of any information entered into the software. You, the end user is responsible to ensure regular backups of the software and any data entered in or relating to the software. You acknowledge that you are not entitled to any support for the software except for reasonable installation support the first time you install the software. Such support will be provided to you in a manner determined and at the absolute discretion of GI Business Database Solutions. You acknowledge and warrant that prior to purchasing the open source version of the software that you satisfied yourself as to the fitness of the software for the purpose to which you intend to put it and that you did not rely upon any representation made by GI Business Database Solutions which is not expressly stated in this agreement or upon any description, illustration or specification contained in any document including catalogues, web pages, advertising or other publicity material produced by GI Business Database Solutions. Title ownership rights and intellectual property rights in the Software shall remain with GI Business Database Solutions unless otherwise agreed in writing in which event no ownership rights or rights to intellectual property shall be relinquished until such time as the sum agreed to in writing has been received by GI Business Database Solutions. You acknowledge that you must not sell, transfer or otherwise distribute the software to another person and further that you shall fully indemnify GI Business Database Solutions against all liabilities, costs and expenses which GI Business Database Solutions or its distributors, agents, or employees may incur as a result of a breach of the provisions of the agreement by you, or permitted by you. Further, to the extent permitted by law, you fully indemnify GI Business Database Solutions against all liabilities, costs and expenses resulting from any legal action taken by a third party against GI Business Database Solutions arising from your use of this software or any use permitted by you. Page 4

The Software is not fault-tolerant and is not designed manufactured or intended for use or resale as on-line control equipment in hazardous environments requiring fail-safe performance such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic, control, direct life support machines or weapons systems, in which the failure of the software could lead directly to death personal injury or severe physical or environmental damage. Accordingly, GI Business Database Solutions and its suppliers specifically disclaim any express or implied warranty of fitness for High Risk Activities This agreement represents the complete agreement concerning the use of this software. If any provision of this agreement is held to be unenforceable such provision shall be reformed only to the extent necessary to make it enforceable. This agreement shall be governed by the laws of Victoria Australia excluding conflict of law provisions (except to the extent applicable law if any provides otherwise). The application of the United Nations convention of contracts for the international sale of goods is expressly excluded. Page 5