Re: Recognize Data Base Manipulation

From: Rene S. Nielsen <renesn_at_image.dk>
Date: Fri, 16 Aug 2002 23:26:03 +0200
Message-ID: <3d5d6f04$0$27697$edfadb0f_at_dspool01.news.tele.dk>


The most secure methode of doing this is by writing a trigger on the tables, that you want this security on.

When writing the trigger you have to activate it both on insert, update and delete.
You can write the trigger so the data is copied onto another table, including the username and time, of the person who is doing the update.

Regards
  Rene Received on Fri Aug 16 2002 - 23:26:03 CEST

Original text of this message