Escolar Documentos
Profissional Documentos
Cultura Documentos
M Anil Kumar
(M.Sc, MS Chemical, IIT Madras, Industrial Consultant)
© M Anil Kumar
This book contains information researched by us/ obtained from authentic and highly
regarded sources. Reasonable efforts have been made to publish reliable data and
information, but the author and the publisher cannot assume any responsibility or liability
for the validity of the content of this book or for sny consequences of their use. The user of
information should ensure the correctness, validity and applicability of the information or
principles for his/her specific application by proper testing and verification procedures
before putting in to actual use.
No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by
any electronic, mechanical, or other means, now known or hereafter invented, including
photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
Trademark Notice: Product or corporate names mentioned in this book may be trademarks
or registered trademarks of the respective owners, and are used only for identification and
explanation without intent to infringe.
www.frpdesigns.com/securedexcel.htm
1 Introduction 11
1. Protecting data and Formula
2. Advantages and Limitations of Protecting
3. Protecting and Limiting Worksheet Functionality
4. Securing Your Worksheet
5. Showcasing Your Secure Worksheet
4 Prevent Unhiding 25
1. Protect Workbook
2. Unprotect Workbook
5 Source Locator 27
1. Rendering a Worksheet Nonfunctional
2. Source Identification Function
3. Source Locator Equation
9 Vulnerability 39
---------x---------
Some people think of protecting the worksheet before giving it for testing to
a client with a password. But you have to give password too for your client
to open it. Then again your control over the file is lost for ever. This made us
to think of a method to share the worksheets over internet with a client, in a
secure way. He should not be able to save a working copy of the Excel
program. If a client liked a program, he can purchase the program by email
from you.
This book explains step by step procedures for incorporating such a level of
protection and method to secure the work with Excel worksheets. A method
by which any website owner can increase revenue by allowing visitors to do
calculations on worksheets called on from website is discussed. The method
of deactivating the file automatically if any one try to store a copy to his/her
local computer is discussed. Various methods to effectively share the
worksheet from web site and to install payment acceptance for worksheet
orders right from your web page is discussed .