Re: Recognize Data Base Manipulation
From: Rene S. Nielsen <renesn_at_image.dk>
Date: Fri, 16 Aug 2002 23:26:03 +0200
Message-ID: <3d5d6f04$0$27697$edfadb0f_at_dspool01.news.tele.dk>
Date: Fri, 16 Aug 2002 23:26:03 +0200
Message-ID: <3d5d6f04$0$27697$edfadb0f_at_dspool01.news.tele.dk>
The most secure methode of doing this is by writing a trigger on the tables, that you want this security on.
When writing the trigger you have to activate it both on insert, update and
delete.
You can write the trigger so the data is copied onto another table,
including the username and time, of the person who is doing the update.
Regards
Rene
Received on Fri Aug 16 2002 - 23:26:03 CEST