If the databases allow the connection from the Web, it
may probably become the object of the hacker. And how
can we make the setting allow the local connection, at thesame time, achieve the functions of the Web server?
Generally, we often use the access machine to solve this.