About Security Settings
The security model in FileMaker 7 has been completely revamped. Instead of the confusing and, frankly, rather quirky security system of previous versions, FileMaker 7 employs a standard system of accounts and passwords. You can't avoid this security systemevery time you open a database, you'll be prompted for your account name and password (Figure 16.12).
Figure 16.12. When a database is opened, it prompts you for an Account Name and Password.

Network Speed and Network Protocols
The more people who use your databases at the same time, the more important the network speed becomes. There are many measures you can take when you configure your network to improve the way your networked FileMaker database performs.FileMaker's minimum practical network is a 10-Base-T Ethernet architecture. If you anticipate more than 10 or 12 users, 100-Base-T is a better choice."Why such a high requirement?" you might ask. FileMaker is a disk-based database program. That means that data is constantly accessed from the server's disk rather than loaded into memory on each guest computer. As a result, FileMaker constantly goes back and forth between guest computer and server while a database is in use. A slow network will make people wait for their files to open, and operations like find and sort could become frustratingly slow.Other network hardware can make a difference as well. Some small networks use an older hub as their central point for sending and receiving information. Consider replacing the hub with a switch, which moves information back and forth much faster.Full Access is for administrators and developers. It allows a user to control the entire database, including setting field definitions, scripts, layouts, and managing security. Data Entry allows a user to read and change any data, but not to change the layouts and the database structure. Read-Only allows a user to view data, but not change it.You can limit yourself to the default Privilege Sets. Alternatively, by creating new Privilege Sets and assigning them to individuals or groups, you can create an infinite range of possible access options.
